Reinforcement learning for feedback-enabled cyber resilience
The rapid growth in the number of devices and their connectivity has enlarged the attack
surface and made cyber systems more vulnerable. As attackers become increasingly …
surface and made cyber systems more vulnerable. As attackers become increasingly …
Automated cyber defence: A review
S Vyas, J Hannay, A Bolton, PP Burnap - arXiv preprint arXiv:2303.04926, 2023 - arxiv.org
Within recent times, cybercriminals have curated a variety of organised and resolute cyber
attacks within a range of cyber systems, leading to consequential ramifications to private and …
attacks within a range of cyber systems, leading to consequential ramifications to private and …
A Bayesian Q-Learning Game for Dependable Task Offloading Against DDoS Attacks in Sensor Edge Cloud
J Liu, X Wang, S Shen, G Yue, S Yu… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
To enhance dependable resource allocation against increasing distributed denial-of-service
(DDoS) attacks, in this article, we investigate interactions between a sensor device-edgeVM …
(DDoS) attacks, in this article, we investigate interactions between a sensor device-edgeVM …
[PDF][PDF] A comprehensive tutorial and survey of applications of deep learning for cyber security
A Comprehensive Tutorial and Survey of Applications of Deep Learning for Cyber Security
Page 1 P osted on 5 Jan 2020 — CC-BY 4.0 — h ttps://doi.org/10.36227/tech rxiv.11473377.v1 …
Page 1 P osted on 5 Jan 2020 — CC-BY 4.0 — h ttps://doi.org/10.36227/tech rxiv.11473377.v1 …
Distributed denial-of-service attacks against http/2 services
HTTP/2 is the second major version of the HTTP protocol published by the internet
engineering steering group. The protocol is designed to improve reliability and performance …
engineering steering group. The protocol is designed to improve reliability and performance …
Network topology effects on the detectability of crossfire attacks
C Liaskos, S Ioannidis - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
New strains of distributed denial-of-service (DDoS) attacks have exhibited potential to
disconnect communication networks, even cutting off entire countries from the Internet. The …
disconnect communication networks, even cutting off entire countries from the Internet. The …
Deep learning for cyber security applications: A comprehensive survey
M Alazab, KP Soman, S Srinivasan, S Venkatraman… - Authorea …, 2023 - techrxiv.org
Deep Learning (DL), a novel form of machine learning (ML) is gaining much research
interest due to its successful application in many classical artificial intelligence (AI) tasks as …
interest due to its successful application in many classical artificial intelligence (AI) tasks as …
Security and 5G: Attack mitigation using Reinforcement Learning in SDN networks
JÁ Fernández-Carrasco, L Segurola-Gil… - 2022 IEEE Future …, 2022 - ieeexplore.ieee.org
5G ecosystem is shaping the future of communication networks enabling innovation and
digital transformation not only for individual users but also for companies, industries, and …
digital transformation not only for individual users but also for companies, industries, and …
Denial-of-service attack modelling and detection for HTTP/2 services
E Adi - 2017 - ro.ecu.edu.au
Businesses and society alike have been heavily dependent on Internet-based services,
albeit with experiences of constant and annoying disruptions caused by the adversary class …
albeit with experiences of constant and annoying disruptions caused by the adversary class …
[PDF][PDF] Deep Learning for Cyber Security Applications: A Comprehensive Survey
Deep Learning (DL), a novel form of machine learning (ML) is gaining much research
interest due to its successful application in many classical artificial intelligence (AI) tasks as …
interest due to its successful application in many classical artificial intelligence (AI) tasks as …