Tutorial on Course-of-Action (COA) Attack Search Methods in Computer Networks.
Seok Bin SonSoohyun ParkHaemin LeeJoongheon KimSoyi JungDong Hwa KimPublished in: ICTC (2022)
Keyphrases
- search methods
- computer networks
- search algorithm
- network security
- metaheuristic
- intrusion detection system
- search strategies
- unconstrained optimization
- computer systems
- network management
- nearest neighbor search
- network traffic
- exhaustive search
- security problems
- beam search
- heuristic functions
- systematic search
- heuristic function
- cyber attacks
- machine learning
- database
- computer network security
- network nodes
- heuristic search
- particle swarm optimization
- simulated annealing
- state space
- information systems
- neural network
- databases