Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
reinforcement learning approach
biblio
Q-DATA: Enhanced Traffic Flow Monitoring in Software-Defined Networks applying Q-learning
Submitted by aekwall on Mon, 04/13/2020 - 10:07am
SDN controllers
forwarding performance status
Network Statistics and Software-Defined Networking
optimal traffic flow matching policy
policy formulation
proactive forwarding device protection
Q-DATA framework
Q-learning algorithm
Reinforcement learning
reinforcement learning approach
REST SDN application
SDN based networks
Degradation
SDN environment
SDN switches
SDN-based traffic flow
SDN-based traffic flow matching control system
support vector machine based algorithm
traffic flow granularity
traffic flow information
traffic flow monitoring
traffic forwarding performance degradation protection
Security by Default
control systems
Monitoring
Scalability
telecommunication traffic
computer network management
software defined networking
Support vector machines
learning (artificial intelligence)
Resiliency
pubcrawl
software-defined networking
computer network security
Security analysis
Software-Defined Networks
computer network reliability
data plane
centralised control
centralized network control
centralized network management
control framework
control plane
Control System
biblio
A Reinforcement Learning Approach for Attack Graph Analysis
Submitted by grigby1 on Fri, 02/08/2019 - 4:28pm
Handheld computers
transition graph
simplified graph
security of data
Resiliency
resilience
reinforcement learning approach
Reinforcement learning
q-learning
pubcrawl
possible attack routes
multistage vulnerability analysis
Metrics
learning (artificial intelligence)
internet
Control Theory
graph theory
data privacy
cyber security
Conferences
computer security
computer network security
composability
Big Data
attack graphs
attack graph size
attack graph analysis
attack graph
approximate analysis approach
security