Empowering Security and Trust in 5G and Beyond: A Deep Reinforcement Learning Approach.
Hajar MoudoudSoumaya CherkaouiPublished in: IEEE Open J. Commun. Soc. (2023)
Keyphrases
- reinforcement learning
- security services
- trust management
- trusted computing
- information security
- trust relationships
- access control
- trust negotiation
- trust model
- security issues
- network security
- function approximation
- privacy concerns
- multi agent
- markov decision processes
- model free
- reinforcement learning algorithms
- internet banking
- learning algorithm
- policy enforcement
- security requirements
- statistical databases
- state space
- elliptic curve
- security management
- optimal control
- optimal policy
- malicious nodes
- trust evaluation
- intrusion detection
- data security
- security mechanisms
- security level
- public key infrastructure
- usage control