Pages that link to "Item:Q5075357"
From MaRDI portal
The following pages link to Game Theory and Machine Learning for Cyber Security (Q5075357):
Displaying 24 items.
- Introduction (Q5075358) (← links)
- Introduction to Game Theory (Q5075360) (← links)
- Scalable Algorithms for Identifying Stealthy Attackers in a Game‐Theoretic Framework Using Deception (Q5075362) (← links)
- Honeypot Allocation Games over Attack Graphs for Cyber Deception (Q5075363) (← links)
- Evaluating Adaptive Deception Strategies for Cyber Defense with Human Adversaries (Q5075364) (← links)
- A Theory of Hypergames on Graphs for Synthesizing Dynamic Cyber Defense with Deception (Q5075365) (← links)
- Minimax Detection (MAD) for Computer Security: A Dynamic Program Characterization (Q5075366) (← links)
- Sensor Manipulation Games in Cyber Security (Q5075367) (← links)
- Adversarial Gaussian Process Regression in Sensor Networks (Q5075368) (← links)
- Moving Target Defense Games for Cyber Security: Theory and Applications (Q5075370) (← links)
- Continuous Authentication Security Games (Q5075371) (← links)
- Cyber Autonomy in Software Security: Techniques and Tactics (Q5075372) (← links)
- A Game Theoretic Perspective on Adversarial Machine Learning and Related Cybersecurity Applications (Q5075373) (← links)
- Adversarial Machine Learning for 5G Communications Security (Q5075375) (← links)
- Machine Learning in the Hands of a Malicious Adversary: A Near Future If Not Reality<sup>1</sup> (Q5075380) (← links)
- Trinity: Trust, Resilience and Interpretability of Machine Learning Models (Q5075381) (← links)
- Evading Machine Learning Based Network Intrusion Detection Systems with GANs (Q5075385) (← links)
- Concealment Charm (<scp>ConcealGAN</scp>): Automatic Generation of Steganographic Text Using Generative Models to Bypass Censorship (Q5075387) (← links)
- Manipulating Reinforcement Learning: Stealthy Attacks on Cost Signals (Q5075388) (← links)
- Resource‐Aware Intrusion Response Based on Deep Reinforcement Learning for Software‐Defined Internet‐of‐Battle‐Things (Q5075391) (← links)
- Smart Internet Probing: Scanning Using Adaptive Machine Learning (Q5075392) (← links)
- Semi‐automated Parameterization of a Probabilistic Model Using Logistic Regression—A Tutorial (Q5075393) (← links)
- Resilient Distributed Adaptive Cyber‐Defense Using Blockchain (Q5075395) (← links)
- Summary and Future Work (Q5075396) (← links)