Reinforcement learning for feedback-enabled cyber resilience

Y Huang, L Huang, Q Zhu - Annual reviews in control, 2022 - Elsevier
The rapid growth in the number of devices and their connectivity has enlarged the attack
surface and made cyber systems more vulnerable. As attackers become increasingly …

Automated cyber defence: A review

S Vyas, J Hannay, A Bolton, PP Burnap - arXiv preprint arXiv:2303.04926, 2023 - arxiv.org
Within recent times, cybercriminals have curated a variety of organised and resolute cyber
attacks within a range of cyber systems, leading to consequential ramifications to private and …

A Bayesian Q-Learning Game for Dependable Task Offloading Against DDoS Attacks in Sensor Edge Cloud

J Liu, X Wang, S Shen, G Yue, S Yu… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
To enhance dependable resource allocation against increasing distributed denial-of-service
(DDoS) attacks, in this article, we investigate interactions between a sensor device-edgeVM …

[PDF][PDF] A comprehensive tutorial and survey of applications of deep learning for cyber security

KP Soman, M Alazab, S Sriram - Authorea Preprints, 2023 - techrxiv.org
A Comprehensive Tutorial and Survey of Applications of Deep Learning for Cyber Security
Page 1 P osted on 5 Jan 2020 — CC-BY 4.0 — h ttps://doi.org/10.36227/tech rxiv.11473377.v1 …

Distributed denial-of-service attacks against http/2 services

E Adi, ZA Baig, P Hingston, CP Lam - Cluster Computing, 2016 - Springer
HTTP/2 is the second major version of the HTTP protocol published by the internet
engineering steering group. The protocol is designed to improve reliability and performance …

Network topology effects on the detectability of crossfire attacks

C Liaskos, S Ioannidis - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
New strains of distributed denial-of-service (DDoS) attacks have exhibited potential to
disconnect communication networks, even cutting off entire countries from the Internet. The …

Deep learning for cyber security applications: A comprehensive survey

M Alazab, KP Soman, S Srinivasan, S Venkatraman… - Authorea …, 2023 - techrxiv.org
Deep Learning (DL), a novel form of machine learning (ML) is gaining much research
interest due to its successful application in many classical artificial intelligence (AI) tasks as …

Security and 5G: Attack mitigation using Reinforcement Learning in SDN networks

JÁ Fernández-Carrasco, L Segurola-Gil… - 2022 IEEE Future …, 2022 - ieeexplore.ieee.org
5G ecosystem is shaping the future of communication networks enabling innovation and
digital transformation not only for individual users but also for companies, industries, and …

Denial-of-service attack modelling and detection for HTTP/2 services

E Adi - 2017 - ro.ecu.edu.au
Businesses and society alike have been heavily dependent on Internet-based services,
albeit with experiences of constant and annoying disruptions caused by the adversary class …

[PDF][PDF] Deep Learning for Cyber Security Applications: A Comprehensive Survey

V Ravi, M Alazab, KP Soman, S Srinivasan… - 2021 - researchgate.net
Deep Learning (DL), a novel form of machine learning (ML) is gaining much research
interest due to its successful application in many classical artificial intelligence (AI) tasks as …