Evolution of network enumeration strategies in emulated computer networks.
Sean HarrisEric MichalakKevin SchoonoverAdam GausmannHannah ReinboltJoshua HermanDaniel R. TauritzChris RawlingsAaron Scott PopePublished in: GECCO (Companion) (2018)
Keyphrases
- computer networks
- network security
- communication networks
- network traffic
- computer systems
- network management
- intrusion detection system
- network monitoring
- network nodes
- tcp ip
- search space
- computer network security
- intrusion detection
- reinforcement learning
- information retrieval
- security problems
- real world
- network evolution
- databases