Military network security using self organized multi-agent entangled hierarchies.
Gary B. LamontEric M. HollowayPublished in: GECCO (Companion) (2009)
Keyphrases
- network security
- multi agent
- intrusion detection
- computer networks
- intrusion detection system
- traffic analysis
- network traffic
- information security
- multi agent systems
- network administrators
- network intrusion
- security policies
- computer security
- dos attacks
- anomaly detection
- risk assessment
- reinforcement learning
- situation assessment
- security protection
- smart grid
- real world
- anti phishing
- network attacks
- wired networks
- machine learning