![]() | Monter d'un niveau |
McDonald, G., Li, L., & Al Mallah, R. (2024). Finding the optimal security policies for autonomous cyber operations with competitive reinforcement learning. IEEE Access, 12, 120292-120305. Lien externe
Alja’Afreh, M., Hasan, O., Al Mallah, R., & Karime, A. (novembre 2024). Blockchain-driven networking and communications in the metaverse [Communication écrite]. 6th International Conference on Blockchain Computing and Applications (BCCA 2024), Dubai, United Arab Emirates. Lien externe
Badu-Marfo, G., Al Mallah, R., & Farooq, B. (juin 2024). Defense via behavior attestation against attacks in connected and automated vehicles based federated learning systems [Communication écrite]. 99th IEEE Vehicular Technology Conference (VTC 2024-Spring), Singapore, Singapore (7 pages). Lien externe
Broda-Milian, K., Dagdougui, H., & Al Mallah, R. (septembre 2024). The Bifurcation Method: White-Box Observation Perturbation Attacks on Reinforcement Learning Agents on a Cyber Physical System [Communication écrite]. International Conference on Machine Learning and Cybernetics (ICMLC 2024), Miyazaki, Japan. Lien externe
Légère, A., Li, L., Rivest, F., & Al Mallah, R. (juillet 2024). Training environments for reinforcement learning cybersecurity agents [Communication écrite]. International Conference on Computing, Internet of Things and Microwave Systems (ICCIMS 2024), Gatineau, QC, Canada (5 pages). Lien externe