Servin et al., 2005 - Google Patents
Multi-agent reinforcement learning for intrusion detectionServin et al., 2005
View PDF- Document ID
- 10878831185392935263
- Author
- Servin A
- Kudenko D
- Publication year
- Publication venue
- European Symposium on Adaptive Agents and Multi-Agent Systems
External Links
Snippet
Abstract Intrusion Detection Systems (IDS) have been investigated for many years and the field has matured. Nevertheless, there are still important challenges, eg, how an IDS can detect new and complex distributed attacks. To tackle these problems, we propose a …
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Servin et al. | Multi-agent reinforcement learning for intrusion detection | |
Nguyen et al. | Deep reinforcement learning for cyber security | |
Ioannou et al. | An intrusion detection system for wireless sensor networks | |
CN110839031B (en) | Malicious user behavior intelligent detection system based on reinforcement learning | |
Orojloo et al. | Modelling and evaluation of the security of cyber‐physical systems using stochastic Petri nets | |
Rasouli et al. | A supervisory control approach to dynamic cyber-security | |
Alsharafat | Applying Artificial Neural Network and eXtended Classifier System for Network Intrusion Detection. | |
EP3934202B1 (en) | Method for forecasting health status of distributed networks by artificial neural networks | |
Dong et al. | Sensor network security defense strategy based on attack graph and improved binary PSO | |
Feizollah et al. | Anomaly detection using cooperative fuzzy logic controller | |
CN110602062A (en) | Network active defense method and device based on reinforcement learning | |
Wu et al. | Intrusion detection for unmanned aerial vehicles security: A tiny machine learning model | |
Shamshirband et al. | Anomaly detection using fuzzy Q-learning algorithm | |
Servin et al. | Multi-agent reinforcement learning for intrusion detection: A case study and evaluation | |
Hammar et al. | Optimal defender strategies for CAGE-2 using causal modeling and tree search | |
CN118802353A (en) | A method for constructing a honey array model based on dynamic perception attack graph | |
Mern et al. | Autonomous attack mitigation for industrial control systems | |
Şeker | Use of Artificial Intelligence Techniques/Applications in Cyber Defense | |
Nyberg et al. | Training automated defense strategies using graph-based cyber attack simulations | |
Commey et al. | Strategic deployment of honeypots in blockchain-based IoT systems | |
Kuang et al. | DNIDS: a dependable network intrusion detection system using the CSI-KNN algorithm | |
Malik et al. | Network intrusion detection system using reinforcement learning techniques | |
Kumar et al. | Intrusion detection using soft computing techniques | |
Chen et al. | Interpretable cross-layer intrusion response system based on deep reinforcement learning for industrial control systems | |
Singh et al. | An investigation of machine learning-based ids for green smart transportation in MANET |