From post

Knowledge Empowered Deep Reinforcement Learning to Prioritize Alerts Generated by Intrusion Detection Systems.

, , и . AINA (4), том 202 из Lecture Notes on Data Engineering and Communications Technologies, стр. 400-411. Springer, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Toward Implementing Spatio-Temporal RBAC Extensions., , , и . ICISS, том 11952 из Lecture Notes in Computer Science, стр. 59-78. Springer, (2019)Traffic Convergence Detection in IoT LLNs: A Multilayer Perceptron based Mechanism., , , и . SSCI, стр. 1715-1722. IEEE, (2018)A Feedforward Neural Network based Model to Predict Sub-optimal Path Attack in IoT-LLNs., , и . CCGRID, стр. 400-409. IEEE, (2020)PAMMELA: Policy Administration Methodology using Machine Learning., , , , , , и . SECRYPT, стр. 147-157. SCITEPRESS, (2022)Off-policy actor-critic deep reinforcement learning methods for alert prioritization in intrusion detection systems., , , , и . Comput. Secur., (2024)Knowledge Empowered Deep Reinforcement Learning to Prioritize Alerts Generated by Intrusion Detection Systems., , и . AINA (4), том 202 из Lecture Notes on Data Engineering and Communications Technologies, стр. 400-411. Springer, (2024)A Comparative Study of Margin Noise Removal Algorithms on MarNR: A Margin Noise Dataset of Document Images., , , и . OST@ICDAR, стр. 35-39. IEEE, (2017)978-1-5386-3586-5.Policy Engineering in RBAC and ABAC., , , , и . From Database to Cyber Security, том 11170 из Lecture Notes in Computer Science, стр. 24-54. Springer, (2018)Malware Analysis Using Transformer Based Models: An Empirical Study., , , , , , и . SECRYPT, стр. 858-865. SCITEPRESS, (2024)Designing an Efficient Delay Sensitive Routing Metric for IEEE 802.16 Mesh Networks., , , , , и . CoRR, (2013)