|
[1]
|
麻文刚, 张亚东, 郭进. 基于LSTM与改进残差网络优化的异常流量检测方法[J]. 通信学报, 2021, 42(5): 23-40.
|
|
[2]
|
Kober, J., Bagnell, J.A. and Peters, J. (2013) Reinforcement Learning in Robotics: A Survey. The International Journal of Robotics Research, 32, 1238-1274. [Google Scholar] [CrossRef]
|
|
[3]
|
Xu, X. and Xie, T. (2005) A Reinforcement Learning Approach for Host-Based Intrusion Detection Using Sequences of System Calls. In: Huang, D.S., Zhang, X.P. and Huang, G.B., Eds., Advances in Intelligent Computing, Springer, 995-1003. [Google Scholar] [CrossRef]
|
|
[4]
|
Di, C., Su, Y., Han, Z. and Li, S. (2018) Learning Automata Based SVM for Intrusion Detection. In: Liang, Q., Mu, J., Jia, M., Wang, W., Feng, X. and Zhang, B., Eds., Communications, Signal Processing, and Systems, Springer, 2067-2074. [Google Scholar] [CrossRef]
|
|
[5]
|
Servin, A. and Kudenko, D. (2008) Multi-Agent Reinforcement Learning for Intrusion Detection. In: Tuyls, K., Nowe, A., Guessoum, Z. and Kudenko, D., Eds., Adaptive Agents and Multi-Agent Systems III, Springer, 211-223. [Google Scholar] [CrossRef]
|
|
[6]
|
Servin, A. and Kudenko, D. (2008) Multi-Agent Reinforcement Learning for Intrusion Detection: A Case Study and Evaluation. In: Bergmann, R., Lindemann, G., Kirn, S. and Pěchouček, M., Eds., Multiagent System Technologies, Springer, 159-170. [Google Scholar] [CrossRef]
|
|
[7]
|
Cao, H. (2024) The Detection of Abnormal Behavior by Artificial Intelligence Algorithms under Network Security. IEEE Access, 12, 118605-118617. [Google Scholar] [CrossRef]
|