[go: up one dir, main page]

Servin et al., 2005 - Google Patents

Multi-agent reinforcement learning for intrusion detection

Servin et al., 2005

View PDF
Document ID
10878831185392935263
Author
Servin A
Kudenko D
Publication year
Publication venue
European Symposium on Adaptive Agents and Multi-Agent Systems

External Links

Snippet

Abstract Intrusion Detection Systems (IDS) have been investigated for many years and the field has matured. Nevertheless, there are still important challenges, eg, how an IDS can detect new and complex distributed attacks. To tackle these problems, we propose a …
Continue reading at etheses.whiterose.ac.uk (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Servin et al. Multi-agent reinforcement learning for intrusion detection
Nguyen et al. Deep reinforcement learning for cyber security
Ioannou et al. An intrusion detection system for wireless sensor networks
CN110839031B (en) Malicious user behavior intelligent detection system based on reinforcement learning
Orojloo et al. Modelling and evaluation of the security of cyber‐physical systems using stochastic Petri nets
Rasouli et al. A supervisory control approach to dynamic cyber-security
Alsharafat Applying Artificial Neural Network and eXtended Classifier System for Network Intrusion Detection.
EP3934202B1 (en) Method for forecasting health status of distributed networks by artificial neural networks
Dong et al. Sensor network security defense strategy based on attack graph and improved binary PSO
Feizollah et al. Anomaly detection using cooperative fuzzy logic controller
CN110602062A (en) Network active defense method and device based on reinforcement learning
Wu et al. Intrusion detection for unmanned aerial vehicles security: A tiny machine learning model
Shamshirband et al. Anomaly detection using fuzzy Q-learning algorithm
Servin et al. Multi-agent reinforcement learning for intrusion detection: A case study and evaluation
Hammar et al. Optimal defender strategies for CAGE-2 using causal modeling and tree search
CN118802353A (en) A method for constructing a honey array model based on dynamic perception attack graph
Mern et al. Autonomous attack mitigation for industrial control systems
Şeker Use of Artificial Intelligence Techniques/Applications in Cyber Defense
Nyberg et al. Training automated defense strategies using graph-based cyber attack simulations
Commey et al. Strategic deployment of honeypots in blockchain-based IoT systems
Kuang et al. DNIDS: a dependable network intrusion detection system using the CSI-KNN algorithm
Malik et al. Network intrusion detection system using reinforcement learning techniques
Kumar et al. Intrusion detection using soft computing techniques
Chen et al. Interpretable cross-layer intrusion response system based on deep reinforcement learning for industrial control systems
Singh et al. An investigation of machine learning-based ids for green smart transportation in MANET