In recent years, cyber attacks have shown diversified, purposeful, and organized characteristics, which pose significant challenges to cyber defense decision-making on internal networks. Due to the continuous confrontation between attackers and defenders, only using data-based statistical or supervised learning methods cannot cope with increasingly severe security threats. It is urgent to rethink network defense from the perspective of decision-making, and prepare for every possible situation. Reinforcement learning has made great breakthroughs in addressing complicated decision-making problems. We propose a framework that defines four modules based on the life cycle of threats: pentest, design, response, recovery. Our aims are to clarify t...
The selection of the best countermeasures against cyber-attacks is an increasingly important topic. ...
This paper presents a control strategy for CyberPhysical System defense developed in the framework o...
Computer networks are becoming more complex as the reliance on these network increases in this era o...
Autonomic Computer Network Defence aims to achieve self-protection capability of IT networks in orde...
There is a lot of expectation on how Artificial Intelligence (AI) is going to have an impact on Cybe...
The existing cyberspace attack and defense method can be regarded as game, but most of the game only...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...
The main purpose of this paper is to explore and investigate the role of deep reinforcement learning...
Given the continuing advancement of networking applications and our increased dependence upon softwa...
The increasing penetration of DER with smart-inverter functionality is set to transform the electric...
This chapter discusses a central challenge arising from the success of modeling human behavior in ma...
This thesis presents a novel approach to provide adaptive mechanisms to detect and categorise Floodi...
This article investigates the secure control problem for cyber-physical systems when the malicious d...
In the domain of Wireless Sensor Networks (WSNs), where resources are limited and dynamic threats pe...
The selection of the best countermeasures against cyber-attacks is an increasingly important topic. ...
This paper presents a control strategy for CyberPhysical System defense developed in the framework o...
Computer networks are becoming more complex as the reliance on these network increases in this era o...
Autonomic Computer Network Defence aims to achieve self-protection capability of IT networks in orde...
There is a lot of expectation on how Artificial Intelligence (AI) is going to have an impact on Cybe...
The existing cyberspace attack and defense method can be regarded as game, but most of the game only...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...
The main purpose of this paper is to explore and investigate the role of deep reinforcement learning...
Given the continuing advancement of networking applications and our increased dependence upon softwa...
The increasing penetration of DER with smart-inverter functionality is set to transform the electric...
This chapter discusses a central challenge arising from the success of modeling human behavior in ma...
This thesis presents a novel approach to provide adaptive mechanisms to detect and categorise Floodi...
This article investigates the secure control problem for cyber-physical systems when the malicious d...
In the domain of Wireless Sensor Networks (WSNs), where resources are limited and dynamic threats pe...
The selection of the best countermeasures against cyber-attacks is an increasingly important topic. ...
This paper presents a control strategy for CyberPhysical System defense developed in the framework o...
Computer networks are becoming more complex as the reliance on these network increases in this era o...