Computer Science ›› 2021, Vol. 48 ›› Issue (5): 301-307.doi: 10.11896/jsjkx.200800174
• Information Security • Previous Articles Next Articles
ZHOU Tian-yang, ZENG Zi-yi, ZANG Yi-chao, WANG Qing-xian
CLC Number:
[1]OBES J L,SARRAUTE C,RICHARTE G.Attack planning inthe real world[J].arXiv:1306.4044,2013. [2]SARRAUTE C,RICHARTE G,OBESJ L.AN algorithm to find optimal attack paths in nondeterministic scenarios[C]//Proceedings of th 4th ACM Workshop on Security and Artificial Intelligence.ACM,2011:71-80. [3]SARRAUTE C,BUFFET O,HOFFMANN J.POMDPs makebetter hackers:Accounting for uncertainty in penetration testing[C]//Twenty-Sixth AAAI Conference on Artificail Intelligence.2012. [4]SHMARYAHU D,SHANI G,HOFFMANN J,et al.Partially observable contingent planning for penetration testing[C]//IWAISe:First International Workshop on Artificail Intellijgence in Security.2017,33. [5]MCLENNAN A .The expected number of Nash equilibria of a normal form game[J].Econometrica,2005,73(1):141-174. [6]BOUTILIER C.Planning,learning and coordination in multi-agent decision processes[C]//Proceedings of the 6th conference on Theoretical aspects of rationality and knowledge.Morgan Kaufmann Publishers Inc.1996:195-210. [7]MUSLINER D J,DURFEE E H,WU J,et al.Coordinated Plan Management Using Multiagent MDPs[C]//AAAI Spring Symposium:DIstributed Plan and Schedule Management.2006:73-70. [8]ONTANON S,BURO M.Adversarial hierachical-task network planning for complex real-time games[C]//Twenty-Fourth International Joint Conference on Artificail Intelligence.2015. [9]SARRAUTE C,BUFFET O,HOFFMANN J.Penetration Testing==POMDP Solving?[J].arXiv:1306.4714,2013. [10]KOTENKO I.Agent-based modeling and simulation of cyber-warfare between malefactors and security agents in Internet[C]//the 19th European Simulation Multiconference “Simulation in wider Europe”.2005. [11]ROTH M,SIMMONS R,VELOSO M.What to communicate? Execution-time decision in multi-agent POMDPs[M]//Distributed Autonomous Robotic Systems 7.Springer,Tokyo,2006:177-186. [12]ZHANG C,LESSER V.Coordinated multi-agent reinforcement learning in networked distributed POMDPs[C]//Proceedings of the 25th AAAI Conference on Artificial Intelligence.San Francisco,America,2011:764-770. [13]ZHOU T Y,ZANG Y C,ZHU J H,et al.NIG-AP:a new me-thod for automated penetration testing[J].Frontiers of Information Technology & Electronic Engineering,2019,20(9):1277-1298. |
[1] | SHI Dian-xi, ZHAO Chen-ran, ZHANG Yao-wen, YANG Shao-wu, ZHANG Yong-jun. Adaptive Reward Method for End-to-End Cooperation Based on Multi-agent Reinforcement Learning [J]. Computer Science, 2022, 49(8): 247-256. |
[2] | WANG Yan-song, QIN Yun-chuan, CAI Yu-hui, LI Ken-li. Design and Implementation of RPA System Based on UIA Interface [J]. Computer Science, 2022, 49(8): 225-229. |
[3] | GAO Wen-long, ZHOU Tian-yang, ZHU Jun-hu, ZHAO Zi-heng. Network Attack Path Discovery Method Based on Bidirectional Ant Colony Algorithm [J]. Computer Science, 2022, 49(6A): 516-522. |
[4] | ZHANG Ming-xin. Conceptual Model for Large-scale Social Simulation [J]. Computer Science, 2022, 49(4): 16-24. |
[5] | WANG Qi, WANG Gang-qiao, CHEN Yong-qiang, LIU Yi. Integrated Modeling Method and Application System for Social Computing [J]. Computer Science, 2022, 49(4): 25-29. |
[6] | ZHOU Shi-cheng, LIU Jing-ju, ZHONG Xiao-feng, LU Can-ju. Intelligent Penetration Testing Path Discovery Based on Deep Reinforcement Learning [J]. Computer Science, 2021, 48(7): 40-46. |
[7] | GAO Feng-yue, WANG Yan, ZHU Tie-lan. Resilient Distributed State Estimation Algorithm [J]. Computer Science, 2021, 48(5): 308-312. |
[8] | ZUO Jian-kai, WU Jie-hong, CHEN Jia-tong, LIU Ze-yuan, LI Zhong-zhi. Study on Heterogeneous UAV Formation Defense and Evaluation Strategy [J]. Computer Science, 2021, 48(2): 55-63. |
[9] | LIU Fang, HONG Mei, WANG Xiao, GUO Dan, YANG Zheng-hui, HUANG Xiao-dan. Performance Analysis of Randoop Automated Unit Test Generation Tool for Java [J]. Computer Science, 2020, 47(9): 24-30. |
[10] | LI Li. Classification Algorithm of Distributed Data Mining Based on Judgment Aggregation [J]. Computer Science, 2020, 47(6A): 450-456. |
[11] | REN Yi. Design of Network Multi-server SIP Information Encryption System Based on Block Chain and Artificial Intelligence [J]. Computer Science, 2020, 47(6A): 634-638. |
[12] | XU Zi-xi, MAO Xin-jun, YANG Yi, LU Yao. Modeling and Simulation of Q&A Community and Its Incentive Mechanism [J]. Computer Science, 2020, 47(6): 32-37. |
[13] | WU Tian-tian,WANG Jie. Belief Coordination for Multi-agent System Based on Possibilistic Answer Set Programming [J]. Computer Science, 2020, 47(2): 201-205. |
[14] | ZHANG Hong-ying,SHEN Rong-miao,LUO Qian. Optimization of Aircraft Taxiing Strategy Based on Multi-agent [J]. Computer Science, 2020, 47(2): 306-312. |
[15] | DU Wei, DING Shi-fei. Overview on Multi-agent Reinforcement Learning [J]. Computer Science, 2019, 46(8): 1-8. |
|