An Experimental Study to Explore Attacker Response to Changes in Security and Reward.
Mark RoundsNorman PendegraftJim Alves-FossPublished in: HICSS (2013)
Keyphrases
- information security
- intrusion detection
- security issues
- reinforcement learning
- security threats
- access control
- network security
- security requirements
- security policies
- key management
- computer security
- security problems
- security management
- statistical databases
- biometric systems
- encryption scheme
- neural network
- information assurance
- defense mechanisms