Detection algorithm for multi-step attack based on CTPN

被引:0
|
作者
Yan, Fen [1 ,2 ]
Huang, Hao [1 ]
Yin, Xin-Chun [2 ]
机构
[1] State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing 210093, China
[2] Department of Computer Science and Engineering, Technology Institute, Yangzhou University, Yangzhou 225009, China
来源
关键词
Security systems;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:1383 / 1391
相关论文
共 50 条
  • [31] Vulnerability Correlation, Multi-step Attack and Exploit Chain in Breach and Attack Simulation
    Chen, Junhan
    Liang, Rufeng
    Zhang, Man
    Zheng, Chengcong
    Huang, Xun
    Lu, Hui
    Yu, Xiang
    Tian, Zhihong
    2023 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING, CLOUDNET, 2023, : 398 - 402
  • [32] Multi-step truncated Q learning algorithm
    Chen, SL
    Wu, HZ
    Han, XL
    Xiao, L
    PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9, 2005, : 194 - 198
  • [33] Multi-step subdivision algorithm for Chaikin curves
    Wu, L
    Yong, JH
    Zhang, YW
    Zhang, L
    COMPUTATIONAL AND INFORMATION SCIENCE, PROCEEDINGS, 2004, 3314 : 1232 - 1238
  • [34] From a single decision to a multi-step algorithm
    Dehaene, Stanislas
    Sigman, Mariano
    CURRENT OPINION IN NEUROBIOLOGY, 2012, 22 (06) : 937 - 945
  • [35] Multi-Step Reinforcement Learning: A Unifying Algorithm
    De Asis, Kristopher
    Hernandez-Garcia, J. Fernando
    Holland, G. Zacharias
    Sutton, Richard S.
    THIRTY-SECOND AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTIETH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE / EIGHTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2018, : 2902 - 2909
  • [36] AdaBoost algorithm using multi-step correction
    Jiang, Yan
    Ding, Xiaoqing
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2008, 48 (10): : 1613 - 1616
  • [37] An AP-DE Algorithm Based on Multi-step Gradient Method
    Dai Dameng
    Mu Dejun
    CHINESE JOURNAL OF ELECTRONICS, 2016, 25 (01) : 146 - 151
  • [38] The Parameter Optimization Based on LVPSO Algorithm for Detecting Multi-step Attacks
    Jiang, Jianguo
    Wang, Qiwen
    Shi, Zhixin
    Lv, Bin
    Fan, Wei
    Peng, Xiao
    CF '19 - PROCEEDINGS OF THE 16TH ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS, 2019, : 24 - 31
  • [39] Multi-step Sarsa control algorithm based on RBF neural network
    Si Y.-N.
    Pu J.-X.
    Yu X.-S.
    Si P.-J.
    Sun L.-F.
    Kongzhi yu Juece/Control and Decision, 2023, 38 (04): : 944 - 950
  • [40] Temporal-Gated Graph Neural Network with Graph Sampling for Multi-step Attack Detection
    Chen, Shuyu
    Lin, Dawei
    Xie, Zhenping
    Wang, Hongbo
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 1266 - 1271