![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
From Passive Defense to Proactive Defence: Strategies and Technologies
The goal of network defense mechanisms is to enable systems to actively detect and withstand attacks, reduce reliance on external security measures, and quickly recover and repair. This paper elaborates on rel...
-
Chapter and Conference Paper
Policy Advisory Module for Exploration Hindrance Problem in Multi-agent Deep Reinforcement Learning
This paper proposes a method to improve the policies trained with multi-agent deep learning by adding a policy advisory module (PAM) in the testing phase to relax the exploration hindrance problem. Cooperation an...
-
Chapter and Conference Paper
Shoot at a Pigeon and Kill a Crow: On Strike Precision of Link Flooding Attacks
The emerging link flooding attacks (LFAs) increasingly attract significant attention in both academia and industry, due to their huge threat to the routing infrastructure. Compared with traditional distributed...