Entity usage
From MaRDI portal
This page lists pages that use the given entity (e.g. Q42). The list is sorted by descending page ID, so that newer pages are listed first.
Showing below up to 24 results in range #1 to #24.
- Summary and Future Work: Label: en
- Resilient Distributed Adaptive Cyber‐Defense Using Blockchain: Label: en
- Semi‐automated Parameterization of a Probabilistic Model Using Logistic Regression—A Tutorial: Label: en
- Smart Internet Probing: Scanning Using Adaptive Machine Learning: Label: en
- Resource‐Aware Intrusion Response Based on Deep Reinforcement Learning for Software‐Defined Internet‐of‐Battle‐Things: Label: en
- Manipulating Reinforcement Learning: Stealthy Attacks on Cost Signals: Label: en
- Concealment Charm (<scp>ConcealGAN</scp>): Automatic Generation of Steganographic Text Using Generative Models to Bypass Censorship: Label: en
- Evading Machine Learning Based Network Intrusion Detection Systems with GANs: Label: en
- Trinity: Trust, Resilience and Interpretability of Machine Learning Models: Label: en
- Machine Learning in the Hands of a Malicious Adversary: A Near Future If Not Reality1: Label: en
- Adversarial Machine Learning for 5G Communications Security: Label: en
- A Game Theoretic Perspective on Adversarial Machine Learning and Related Cybersecurity Applications: Label: en
- Cyber Autonomy in Software Security: Techniques and Tactics: Label: en
- Continuous Authentication Security Games: Label: en
- Moving Target Defense Games for Cyber Security: Theory and Applications: Label: en
- Adversarial Gaussian Process Regression in Sensor Networks: Label: en
- Sensor Manipulation Games in Cyber Security: Label: en
- Minimax Detection (MAD) for Computer Security: A Dynamic Program Characterization: Label: en
- A Theory of Hypergames on Graphs for Synthesizing Dynamic Cyber Defense with Deception: Label: en
- Evaluating Adaptive Deception Strategies for Cyber Defense with Human Adversaries: Label: en
- Honeypot Allocation Games over Attack Graphs for Cyber Deception: Label: en
- Scalable Algorithms for Identifying Stealthy Attackers in a Game‐Theoretic Framework Using Deception: Label: en
- Introduction to Game Theory: Label: en
- Introduction: Label: en