Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Research and challenges of reinforcement learning in cyber defense decision-making for intranet security
In recent years, cyber attacks have shown diversified, purposeful, and organized
characteristics, which pose significant challenges to cyber defense decision-making on …
characteristics, which pose significant challenges to cyber defense decision-making on …
Seeking the relation between performance and security in modern systems: metrics and measures
R Fujdiak, P Mlynek, P Blazek… - 2018 41st …, 2018 - ieeexplore.ieee.org
Nowadays, the security, safety and performance became a crucial part of the product life
cycle (PLC) in which the requirements for these parameters are continuously growing …
cycle (PLC) in which the requirements for these parameters are continuously growing …
Cross-layer secure and resilient control of delay-sensitive networked robot operating systems
A Robot Operating System (ROS) plays a significant role in organizing industrial robots for
manufacturing. With an increasing number of the robots, the operators integrate a ROS with …
manufacturing. With an increasing number of the robots, the operators integrate a ROS with …
Towards the Creation of Interdisciplinary Consumer-Oriented Security Metrics
Information systems are evolving: IoT devices and Cyber-physical systems (CPS) impact on
the security of assets and people in the real world. Old cybersecurity approaches, which …
the security of assets and people in the real world. Old cybersecurity approaches, which …
Reinforcement Learning's Contribution to the Cyber Security of Distributed Systems: Systematization of Knowledge
C Feltus - International Journal of Distributed Artificial Intelligence …, 2020 - igi-global.com
Reinforcement learning (RL) is a machine learning paradigm, like supervised or
unsupervised learning, which learns the best actions an agent needs to perform to maximize …
unsupervised learning, which learns the best actions an agent needs to perform to maximize …
Equifinality in Cybersecurity Research: Opportunities and Future Research
Cybersecurity is inherently uncertain due to the evolving threat vectors. Indeed, the constant
battle between attackers and defenders in cyberspace is compounded by the multiplicity of …
battle between attackers and defenders in cyberspace is compounded by the multiplicity of …
Modeling and simulation to support cyber defense
Complex environments, such as the cyber domain, can benefit from modeling and
simulation (mod/sim) to understand the impact of new concepts and capabilities to cyber …
simulation (mod/sim) to understand the impact of new concepts and capabilities to cyber …
Building a Computer Security Incident Response Team: Required Skills and Characteristics
DT Cullen - 2018 - search.proquest.com
The problem to be addressed by this study is that due to the increasing number and
sophistication of threats, there is a need to identify the skills and characteristics required to …
sophistication of threats, there is a need to identify the skills and characteristics required to …
A Reinforcement Learning Model to Adaptive Strategy Determination for Dynamic Defense
Z Gu, W Liu, Z Liu, X Zhu - 2023 6th International Conference …, 2023 - ieeexplore.ieee.org
To combat advanced unknown cyber-attacks, dynamic defense technology is constantly
being studied. In this research, aiming at the balance of defense benefits and costs in …
being studied. In this research, aiming at the balance of defense benefits and costs in …
State of the art and future perspectives on security metrics and their applications
G Gori - amslaurea.unibo.it
In modern society, security issues of IT Systems are intertwined with interdisciplinary
aspects, from social life to sustainability, and threats endanger many aspects of every-one's …
aspects, from social life to sustainability, and threats endanger many aspects of every-one's …