Research and challenges of reinforcement learning in cyber defense decision-making for intranet security

W Wang, D Sun, F Jiang, X Chen, C Zhu - Algorithms, 2022 - mdpi.com
In recent years, cyber attacks have shown diversified, purposeful, and organized
characteristics, which pose significant challenges to cyber defense decision-making on …

Seeking the relation between performance and security in modern systems: metrics and measures

R Fujdiak, P Mlynek, P Blazek… - 2018 41st …, 2018 - ieeexplore.ieee.org
Nowadays, the security, safety and performance became a crucial part of the product life
cycle (PLC) in which the requirements for these parameters are continuously growing …

Cross-layer secure and resilient control of delay-sensitive networked robot operating systems

Z Xu, Q Zhu - 2018 IEEE Conference on Control Technology …, 2018 - ieeexplore.ieee.org
A Robot Operating System (ROS) plays a significant role in organizing industrial robots for
manufacturing. With an increasing number of the robots, the operators integrate a ROS with …

Towards the Creation of Interdisciplinary Consumer-Oriented Security Metrics

G Gori, A Melis, D Berardi, M Prandini… - 2023 IEEE 20th …, 2023 - ieeexplore.ieee.org
Information systems are evolving: IoT devices and Cyber-physical systems (CPS) impact on
the security of assets and people in the real world. Old cybersecurity approaches, which …

Reinforcement Learning's Contribution to the Cyber Security of Distributed Systems: Systematization of Knowledge

C Feltus - International Journal of Distributed Artificial Intelligence …, 2020 - igi-global.com
Reinforcement learning (RL) is a machine learning paradigm, like supervised or
unsupervised learning, which learns the best actions an agent needs to perform to maximize …

Equifinality in Cybersecurity Research: Opportunities and Future Research

BJL Landry, R Murimi, G Bell - Effective Cybersecurity Operations for …, 2023 - igi-global.com
Cybersecurity is inherently uncertain due to the evolving threat vectors. Indeed, the constant
battle between attackers and defenders in cyberspace is compounded by the multiplicity of …

Modeling and simulation to support cyber defense

SK Damodaran, N Wagner - The Journal of Defense …, 2020 - journals.sagepub.com
Complex environments, such as the cyber domain, can benefit from modeling and
simulation (mod/sim) to understand the impact of new concepts and capabilities to cyber …

Building a Computer Security Incident Response Team: Required Skills and Characteristics

DT Cullen - 2018 - search.proquest.com
The problem to be addressed by this study is that due to the increasing number and
sophistication of threats, there is a need to identify the skills and characteristics required to …

A Reinforcement Learning Model to Adaptive Strategy Determination for Dynamic Defense

Z Gu, W Liu, Z Liu, X Zhu - 2023 6th International Conference …, 2023 - ieeexplore.ieee.org
To combat advanced unknown cyber-attacks, dynamic defense technology is constantly
being studied. In this research, aiming at the balance of defense benefits and costs in …

State of the art and future perspectives on security metrics and their applications

G Gori - amslaurea.unibo.it
In modern society, security issues of IT Systems are intertwined with interdisciplinary
aspects, from social life to sustainability, and threats endanger many aspects of every-one's …