ICT systems are part of the vital infrastructure in today’s society. These systems are under constant threat and efforts are continually being put forth by cyber security experts to protect them. By applying modern AI methods, can these efforts both be improved and alleviated of the cost of expert work. This thesis examines whether a reinforcement learning (RL) algorithm can be applied to a cyber security modelling of ICT systems. The research question answered is that of how well an RL algorithm can optimise the resource cost of successful cyber attacks, as represented by a cyber security model? The modelling, called Meta Attack Language (MAL), is a meta language for attack graphs that details the individual steps to be taken in a cyber at...
As cyber threats continue to grow and expertise resources are limited, organisationsneed to find way...
Cyber napadi sve su inovativniji i učestaliji. Stoga se javlja potreba za novim strategijama osigura...
In the 21st century, information is the new currency. With the omnipresence of devices connected to ...
ICT systems are part of the vital infrastructure in today’s society. These systems are under constan...
Cyber-attacks are an increasing problem for organizations across the world. The attacks on systems a...
With the advent of the digital era there has been an exponential increase in complex cyber systems.A...
When more and more devices are getting connected to each other and to the internet, the security of ...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...
Autonomous Cyber Defence is required to respond to high-tempo cyber-attacks. To facilitate the resea...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...
Reinforcement learning (RL) operating on attack graphs leveraging cyber terrain principles are used ...
In this project we investigate the susceptibility ofreinforcement rearning (RL) algorithms to advers...
IT systems are indispensable nowadays. With thousands of hacking attempts happening daily, cyber def...
There is a lot of expectation on how Artificial Intelligence (AI) is going to have an impact on Cybe...
Future engineering systems with new capabilities that far exceed today’s levels of autonomy, functio...
As cyber threats continue to grow and expertise resources are limited, organisationsneed to find way...
Cyber napadi sve su inovativniji i učestaliji. Stoga se javlja potreba za novim strategijama osigura...
In the 21st century, information is the new currency. With the omnipresence of devices connected to ...
ICT systems are part of the vital infrastructure in today’s society. These systems are under constan...
Cyber-attacks are an increasing problem for organizations across the world. The attacks on systems a...
With the advent of the digital era there has been an exponential increase in complex cyber systems.A...
When more and more devices are getting connected to each other and to the internet, the security of ...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...
Autonomous Cyber Defence is required to respond to high-tempo cyber-attacks. To facilitate the resea...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...
Reinforcement learning (RL) operating on attack graphs leveraging cyber terrain principles are used ...
In this project we investigate the susceptibility ofreinforcement rearning (RL) algorithms to advers...
IT systems are indispensable nowadays. With thousands of hacking attempts happening daily, cyber def...
There is a lot of expectation on how Artificial Intelligence (AI) is going to have an impact on Cybe...
Future engineering systems with new capabilities that far exceed today’s levels of autonomy, functio...
As cyber threats continue to grow and expertise resources are limited, organisationsneed to find way...
Cyber napadi sve su inovativniji i učestaliji. Stoga se javlja potreba za novim strategijama osigura...
In the 21st century, information is the new currency. With the omnipresence of devices connected to ...