共 50 条
- [21] Herold N., 2016, P INT S FDN PRACTICE, P68
- [22] Q-Learning Algorithms: A Comprehensive Classification and Applications [J]. IEEE ACCESS, 2019, 7 : 133653 - 133667
- [23] Jaquith A., 2007, SECURITY METRICS REP
- [24] Kennedy J, 1995, 1995 IEEE INTERNATIONAL CONFERENCE ON NEURAL NETWORKS PROCEEDINGS, VOLS 1-6, P1942, DOI 10.1109/icnn.1995.488968
- [25] Kennedy J., 1995, P IEEE INT C NEURAL, V4, P1942, DOI DOI 10.1109/ICNN.1995.488968
- [26] Kordy Barbara, 2017, Integrated Formal Methods. 13th International Conference, IFM 2017. Proceedings: LNCS 10510, P332, DOI 10.1007/978-3-319-66845-1_22
- [27] Optimal Strategy Selection for Moving Target Defense Based on Markov Game [J]. IEEE ACCESS, 2017, 5 : 156 - 169
- [28] Cybersecurity in Distributed Power Systems [J]. PROCEEDINGS OF THE IEEE, 2017, 105 (07) : 1367 - 1388
- [29] Network vulnerability assessment using Bayesian networks [J]. DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2005, 2005, 5812 : 61 - 71
- [30] Liu YX, 2019, IEEE C EVOL COMPUTAT, P815, DOI [10.1109/cec.2019.8790035, 10.1109/CEC.2019.8790035]