2021
DOI: 10.1007/978-3-030-82562-1_55
|View full text |Cite
|
Sign up to set email alerts
|

Research on Network Information Security Risk Assessment Based on Artificial Intelligence

Abstract: Adversarial imitation learning has become a widely used imitation learning framework. The discriminator is often trained by taking expert demonstrations and policy trajectories as examples respectively from two categories (positive vs. negative) and the policy is then expected to produce trajectories that are indistinguishable from the expert demonstrations. But in the real world, the collected expert demonstrations are more likely to be imperfect, where only an unknown fraction of the demonstrations are optim… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 61 publications
0
2
0
Order By: Relevance
“…[85], [150], [102], [126], [158] Vulnerability Classi cation [112], [131], [76], [117] Vulnerability Impact Analysis [199], [66], [99] Vulnerability Analytics [139], [9], [41], [77], [128] Risk Assessment Comprehensive Risk Assessment Framework [23], [48], [95], [175], [5], [22], [75], [62], [179], [122] Quantitative Risk Analysis [176], [65], [192], [7], [196], [195], [89], [189] Risk Classi cation and Prioritization [143], [194], [8] Automated and Dynamic Risk Analysis…”
Section: Predictive Vulnerability Modelingmentioning
confidence: 99%
See 1 more Smart Citation
“…[85], [150], [102], [126], [158] Vulnerability Classi cation [112], [131], [76], [117] Vulnerability Impact Analysis [199], [66], [99] Vulnerability Analytics [139], [9], [41], [77], [128] Risk Assessment Comprehensive Risk Assessment Framework [23], [48], [95], [175], [5], [22], [75], [62], [179], [122] Quantitative Risk Analysis [176], [65], [192], [7], [196], [195], [89], [189] Risk Classi cation and Prioritization [143], [194], [8] Automated and Dynamic Risk Analysis…”
Section: Predictive Vulnerability Modelingmentioning
confidence: 99%
“…By enhancing the ability to predict app behavior, this dynamic assessment method supports preventive security measures. Finally, a CNN-based framework for network information security is presented in Article [179], which can adjust to real-time data in order to deliver precise and timely risk assessments. This strategy guarantees thorough and ongoing security assessments, greatly enhancing the decision-making procedures involved in network security management.…”
Section: Comprehensive Risk Assessment Frameworkmentioning
confidence: 99%