Y Zheng, Z Li, X Xu, Q Zhao - Digital Communications and Networks, 2022 - Elsevier
Driven by the rapid development of the Internet of Things, cloud computing and other emerging technologies, the connotation of cyberspace is constantly expanding and …
One of the major challenges about cyber–physical systems is how to protect system integrity from cyber attacks. There has been a large number of different types of attacks discussed in …
Abstract System resilience captures the ability of the system to withstand a major disruption within acceptable performance degradation and to recover within an acceptable time frame …
K Hammar, R Stadler - 2021 17th International Conference on …, 2021 - ieeexplore.ieee.org
We study automated intrusion prevention using reinforcement learning. In a novel approach, we formulate the problem of intrusion prevention as an optimal stopping problem. This …
K Hammar, R Stadler - IEEE Transactions on Network and …, 2022 - ieeexplore.ieee.org
We study automated intrusion prevention using reinforcement learning. Following a novel approach, we formulate the problem of intrusion prevention as an (optimal) multiple stopping …
Abstract Denial of Service (DoS) attacks prevent legitimate users from accessing resources by compromising availability of a system. Despite advanced prevention mechanisms, DoS …
K Hammar, R Stadler - IEEE Transactions on Network and …, 2023 - ieeexplore.ieee.org
We study automated intrusion response and formulate the interaction between an attacker and a defender as an optimal stopping game where attack and defense strategies evolve …
K Hammar, R Stadler - arXiv preprint arXiv:2205.14694, 2022 - arxiv.org
We study automated intrusion prevention using reinforcement learning. Following a novel approach, we formulate the interaction between an attacker and a defender as an optimal …
R Owoputi, S Ray - IEEE Access, 2022 - ieeexplore.ieee.org
Multi-agent systems are becoming increasingly popular due to their successful implementation in several sectors. However, there are a variety of threats that might …