Login / Signup
Towards a Graph Neural Network-Based Approach for Estimating Hidden States in Cyber Attack Simulations.
Pontus Johnson
Mathias Ekstedt
Published in:
CoRR (2023)
Keyphrases
</>
hidden states
cyber attacks
hidden markov models
cyber security
hidden variables
security policies
exponential family
hidden state
data mining
machine learning
information systems
higher order
markov chain
privacy preserving
conditional random fields