A machine learning approach for smart computer security audit
K Pozdniakov - 2017 - openaccess.city.ac.uk
This thesis presents a novel application of machine learning technology to automate
network security audit and penetration testing processes in particular. A model-free …
network security audit and penetration testing processes in particular. A model-free …
Smart security audit: Reinforcement learning with a deep neural network approximator
K Pozdniakov, E Alonso, V Stankovic… - … conference on cyber …, 2020 - ieeexplore.ieee.org
A significant challenge in modern computer security is the growing skill gap as intruder
capabilities increase, making it necessary to begin automating elements of penetration …
capabilities increase, making it necessary to begin automating elements of penetration …
Reinforcement learning vs genetic algorithms in game-theoretic cyber-security
S Niculae - 2018 - osf.io
Penetration testing is the practice of performing a simulated attack on a computer system in
order to reveal its vulnerabilities. The most common approach is to gain information and …
order to reveal its vulnerabilities. The most common approach is to gain information and …
[图书][B] Machine Learning Techniques for Cybersecurity
The protection of information and information infrastructures from unauthorized access, use,
disclosure, disruption, modification, or destruction is today more critical than ever as they …
disclosure, disruption, modification, or destruction is today more critical than ever as they …
Artificial intelligence in computer security: Detection, temporary repair and defense
A Randrianasolo - 2012 - ttu-ir.tdl.org
Computer security system providers are unable to provide timely security updates. Most
security systems are not designed to be adaptive to the increasing number of new threats …
security systems are not designed to be adaptive to the increasing number of new threats …
AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs
Y Pan, L Cai, T Leng, L Zhao, J Ma, A Yu… - … Conference on Security …, 2022 - Springer
In an enterprise environment, intrusion detection systems generate many threat alerts on
anomalous events every day, and these alerts may involve certain steps of a long-dormant …
anomalous events every day, and these alerts may involve certain steps of a long-dormant …
Deep hierarchical reinforcement agents for automated penetration testing
Penetration testing the organised attack of a computer system in order to test existing
defences has been used extensively to evaluate network security. This is a time consuming …
defences has been used extensively to evaluate network security. This is a time consuming …
Machine Learning–Enabled Security Parameter Selection to Identify Attacks on the Cloud and Host
The Internet has become such an important part of people's lives that they can't live without
it. It helps people with business, education, and entertainment, among other things, on …
it. It helps people with business, education, and entertainment, among other things, on …
Game theory with learning for cyber security monitoring
K Chung, CA Kamhoua, KA Kwiat… - 2016 IEEE 17th …, 2016 - ieeexplore.ieee.org
Recent attacks show that threats to cyber infrastructure are not only increasing in volume,
but are getting more sophisticated. The attacks may comprise multiple actions that are hard …
but are getting more sophisticated. The attacks may comprise multiple actions that are hard …
Counteracting security attacks in virtual machines in the cloud using property based attestation
V Varadharajan, U Tupakula - Journal of network and computer …, 2014 - Elsevier
Cloud computing technologies are receiving a great deal of attention. Furthermore most of
the hardware devices such as the PCs and mobile phones are increasingly having a trusted …
the hardware devices such as the PCs and mobile phones are increasingly having a trusted …