2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA) 2020
DOI: 10.1109/hora49412.2020.9152841
|View full text |Cite
|
Sign up to set email alerts
|

Q-Learning for Securing Cyber-Physical Systems : A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 59 publications
0
4
0
Order By: Relevance
“…We opted for Q-Learning due to its ability to learn the optimal policy for decision-making based on the observed A. Hidouri, H. Touati, M. Hadded, N. Hajlaoui, P. Muhlethaler, S. Bouzefrane: Preprint submitted to ElsevierPage 7 of 28 system state. In the case of CPA detection, this means that Q-Learning can learn the best strategy for identifying malicious interests based on observed network traffic patterns (52). This ability to learn from experience and adjust the policy accordingly makes Q-Learning an attractive choice for CPA detection.…”
Section: The Proposed Cpa Detection Schemementioning
confidence: 99%
“…We opted for Q-Learning due to its ability to learn the optimal policy for decision-making based on the observed A. Hidouri, H. Touati, M. Hadded, N. Hajlaoui, P. Muhlethaler, S. Bouzefrane: Preprint submitted to ElsevierPage 7 of 28 system state. In the case of CPA detection, this means that Q-Learning can learn the best strategy for identifying malicious interests based on observed network traffic patterns (52). This ability to learn from experience and adjust the policy accordingly makes Q-Learning an attractive choice for CPA detection.…”
Section: The Proposed Cpa Detection Schemementioning
confidence: 99%
“…[15,19,35,54,178] Focus on Network-based IDS. [11] Focus on Reinforcement Learning (RL) based Q-learning methods for securing CPS. [216] Focus on SCADA specific intrusion detection and prevention.…”
Section: Collection Of Articlesmentioning
confidence: 99%
“…The network-based IDS was surveyed in [15,19,35,54,178], but the authors do not address the scenario which differs from conventional networks. A survey reported in [11] focuses on reinforcement learning based Q-Learning method for securing a CPS. The survey focused on CPS in terms of supported techniques, domains, and attacks.…”
Section: Related Surveysmentioning
confidence: 99%
“…Artificial intelligence and machine learning methods are used in anomaly-based detection systems. Machine learning methods perform reinforcement, supervised and unsupervised learning to build models (Alabadi, &Albayrak, 2020). These methods are usually preferred in implementations where there is a small amount of data (Baykara, & Daş, 2019).…”
Section: Introductionmentioning
confidence: 99%