×

Found 7,410 Documents (Results 1–100)

100
MathJax

Game minimax control of automatic system bandwidth under information counteraction. (English. Russian original) Zbl 07528555

Autom. Remote Control 83, No. 2, 282-290 (2022); translation from Avtom. Telemekh. 2022, No. 2, 144-153 (2022).
PDF BibTeX XML Cite
Full Text: DOI

Web and internet economics. 17th international conference, WINE 2021, Potsdam, Germany, December 14–17, 2021. Proceedings. (English) Zbl 07497178

Lecture Notes in Computer Science 13112. Cham: Springer (ISBN 978-3-030-94675-3/pbk; 978-3-030-94676-0/ebook). xiv, 558 p. (2022).
PDF BibTeX XML Cite
Full Text: DOI

Proceedings of the 12th international symposium on games, automata, logics, and formal verification, GandALF, Padua, Italy, September 20–22, 2021. (English) Zbl 07544355

Electronic Proceedings in Theoretical Computer Science (EPTCS) 346. Waterloo: Open Publishing Association (OPA). 307 p., electronic only, open access (2021).
PDF BibTeX XML Cite
Full Text: DOI Link

Microbial community decision making models in batch and chemostat cultures. (English) Zbl 07532540

Cinquemani, Eugenio (ed.) et al., Computational methods in systems biology. 19th international conference, CMSB 2021, Bordeaux, France, September 22–24, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12881, 141-158 (2021).
MSC:  92C70 92C42 91A80
PDF BibTeX XML Cite
Full Text: DOI

Summary and future work. (English) Zbl 07526418

Kamhoua, Charles A. (ed.) et al., Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley & Sons. 499-505 (2021).
MSC:  68M25 68T05 91A80
PDF BibTeX XML Cite
Full Text: DOI

Resilient distributed adaptive cyber-defense using blockchain. (English) Zbl 07526417

Kamhoua, Charles A. (ed.) et al., Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley & Sons. 485-498 (2021).
MSC:  68M25 68T05 91A80
PDF BibTeX XML Cite
Full Text: DOI

Semi-automated parameterization of a probabilistic model using logistic regression – a tutorial. (English) Zbl 07526416

Kamhoua, Charles A. (ed.) et al., Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley & Sons. 438-484 (2021).
MSC:  68M25 68T05 91A80
PDF BibTeX XML Cite
Full Text: DOI

Smart Internet probing: scanning using adaptive machine learning. (English) Zbl 07526415

Kamhoua, Charles A. (ed.) et al., Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley & Sons. 411-437 (2021).
MSC:  68M25 68T05 91A80
PDF BibTeX XML Cite
Full Text: DOI

Resource-aware intrusion response based on deep reinforcement learning for software-defined Internet-of-battle-things. (English) Zbl 07526414

Kamhoua, Charles A. (ed.) et al., Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley & Sons. 389-409 (2021).
MSC:  68M25 68T05 91A80
PDF BibTeX XML Cite
Full Text: DOI

Manipulating reinforcement learning: stealthy attacks on cost signals. (English) Zbl 07526413

Kamhoua, Charles A. (ed.) et al., Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley & Sons. 367-388 (2021).
MSC:  68M25 68T05 91A80
PDF BibTeX XML Cite
Full Text: DOI

Concealment charm (ConcealGAN): automatic generation of steganographic text using generative models to bypass censorship. (English) Zbl 07526412

Kamhoua, Charles A. (ed.) et al., Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley & Sons. 357-365 (2021).
MSC:  68M25 68T05 91A80
PDF BibTeX XML Cite
Full Text: DOI

Evading machine learning based network intrusion detection systems with GANs. (English) Zbl 07526411

Kamhoua, Charles A. (ed.) et al., Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley & Sons. 335-356 (2021).
MSC:  68M25 68T05 91A80
PDF BibTeX XML Cite
Full Text: DOI

Trinity: trust, resilience and interpretability of machine learning models. (English) Zbl 07526410

Kamhoua, Charles A. (ed.) et al., Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley & Sons. 317-333 (2021).
MSC:  68M25 68T05 91A80
PDF BibTeX XML Cite
Full Text: DOI

Machine learning in the hands of a malicious adversary: a near future if not reality. (English) Zbl 07526409

Kamhoua, Charles A. (ed.) et al., Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley & Sons. 289-316 (2021).
MSC:  68M25 68T05 91A80
PDF BibTeX XML Cite
Full Text: DOI

Adversarial machine learning for 5G communications security. (English) Zbl 07526408

Kamhoua, Charles A. (ed.) et al., Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley & Sons. 270-288 (2021).
MSC:  68M25 68T05 91A80
PDF BibTeX XML Cite
Full Text: DOI

Filter Results by …

Document Type

Reviewing State

all top 5

Author

all top 5

Serial

all top 5

Year of Publication

all top 3

Classification

all top 3

Software