擦试不掉 发表于 2025-3-28 15:10:36

http://reply.papertrans.cn/16/1505/150413/150413_41.png

别炫耀 发表于 2025-3-28 21:58:49

http://reply.papertrans.cn/16/1505/150413/150413_42.png

无思维能力 发表于 2025-3-29 02:21:13

Control-Theoretic Approaches to Cyber-Security,t-case damage (minmax). The probabilistic approach gives rise to efficient computational procedures (namely sampling-based approaches) for finding an optimal defense policy, but requires modeling assumptions that may be difficult to justify in real-world cyber-security settings. On the other hand, t

远地点 发表于 2025-3-29 07:04:49

http://reply.papertrans.cn/16/1505/150413/150413_44.png
页: 1 2 3 4 [5]
查看完整版本: Titlebook: Adversarial and Uncertain Reasoning for Adaptive Cyber Defense; Control- and Game-Th Sushil Jajodia,George Cybenko,Michael Wellman Book 201