Finding Effective Security Strategies through Reinforcement Learning and Self-Play.
Kim HammarRolf StadlerPublished in: CoRR (2020)
Keyphrases
- reinforcement learning
- high quality
- security requirements
- statistical databases
- network security
- information security
- smart card
- security threats
- security issues
- optimal control
- function approximation
- genetic algorithm
- optimal policy
- intrusion detection
- state space
- dynamic programming
- information systems
- learning algorithm