Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

RL model

biblio

Visible to the public Can Reinforcement Learning Address Security Issues? an Investigation into a Clustering Scheme in Distributed Cognitive Radio Networks

Submitted by grigby1 on Fri, 09/18/2020 - 1:56pm
  • radio networks
  • White spaces
  • volatile operating environment
  • volatile environment
  • telecommunication security
  • security issues
  • security
  • Scalability
  • RL parameters
  • RL model
  • resource management
  • Resiliency
  • resilience
  • reinforcement learning model
  • Reinforcement learning
  • attacks
  • pubcrawl
  • pattern clustering
  • operating region
  • network scalability
  • learning rate
  • learning (artificial intelligence)
  • launch attacks
  • Heuristic algorithms
  • distributed cognitive radio networks
  • discount factor
  • Cognitive Radio Security
  • cognitive radio
  • clustering scheme
  • clustering
biblio

Visible to the public Cyber security: A game-theoretic analysis of defender and attacker strategies in defacing-website games

Submitted by grigby1 on Tue, 03/07/2017 - 1:37pm
  • cyber-security game
  • Web sites
  • RL model
  • reinforcement-learning model
  • Reinforcement learning
  • pubcrawl170109
  • Probabilistic logic
  • learning (artificial intelligence)
  • Games
  • game-theoretic analysis
  • game theory
  • defender strategies
  • defender
  • defacing Website games
  • attacker
  • cyber-attacks
  • cyber security
  • Cost function
  • computer security
  • computer games
  • Computer crime
  • Computational modeling
  • cognitive science
  • cognitive modeling
  • behavioral game theory
  • attacks dynamics
  • attacker strategies

Terms of Use  |  ©2023. CPS-VO