Sciweavers

6 search results - page 1 / 2
» Reinforcement Learning for Vulnerability Assessment in Peer-...
Sort
View
AAAI
2008
13 years 6 months ago
Reinforcement Learning for Vulnerability Assessment in Peer-to-Peer Networks
Proactive assessment of computer-network vulnerability to unknown future attacks is an important but unsolved computer security problem where AI techniques have significant impact...
Scott Dejmal, Alan Fern, Thinh Nguyen
HAIS
2009
Springer
13 years 9 months ago
Multiobjective Evolutionary Clustering Approach to Security Vulnerability Assesments
Network vulnerability assessments collect large amounts of data to be further analyzed by security experts. Data mining and, particularly, unsupervised learning can help experts an...
Guiomar Corral, A. Garcia-Piquer, Albert Orriols-P...
ESOA
2006
13 years 8 months ago
Reinforcement Learning for Online Control of Evolutionary Algorithms
The research reported in this paper is concerned with assessing the usefulness of reinforcment learning (RL) for on-line calibration of parameters in evolutionary algorithms (EA). ...
A. E. Eiben, Mark Horvath, Wojtek Kowalczyk, Marti...
BMCBI
2008
174views more  BMCBI 2008»
13 years 4 months ago
Evolutionary approaches for the reverse-engineering of gene regulatory networks: A study on a biologically realistic dataset
Background: Inferring gene regulatory networks from data requires the development of algorithms devoted to structure extraction. When only static data are available, gene interact...
Cédric Auliac, Vincent Frouin, Xavier Gidro...
SIGCSE
2010
ACM
181views Education» more  SIGCSE 2010»
13 years 11 months ago
Teaching the principles of the hacker curriculum to undergraduates
The “Hacker Curriculum” exists as a mostly undocumented set of principles and methods for learning about information security. Hacking, in our view, is defined by the ability...
Sergey Bratus, Anna Shubina, Michael E. Locasto