Robust Network Slicing: Multi-Agent Policies, Adversarial Attacks, and Defensive Strategies.
Feng WangMustafa Cenk GursoySenem VelipasalarPublished in: CoRR (2023)
Keyphrases
- multi agent
- traffic analysis
- security threats
- cooperative
- network anomaly detection
- network structure
- complex networks
- image watermarking
- leader follower
- computer networks
- network intrusion
- ddos attacks
- network attacks
- security measures
- network traffic
- multiagent systems
- cyber attacks
- security issues
- security risks
- communication networks
- evaluation function
- multi agent systems
- intrusion detection and prevention