[1]陈星,贾卓生. 工业控制网络的信息安全威胁与脆弱性分析与研究[J]. 计算机科学, 2012,39(z2):188-190.
[2]CANNADY J. Next generation intrusion detection: Autonomous reinforcement learning of network attacks[C]// Proceedings of the 23rd National Information Systems Security Conference. 2000:1-12.
[3]〖KG-*4〗XU X. Sequential anomaly detection based on temporal-difference learning: Principles, models and case studies[J]. Applied Soft Computing, 2010,10(3):859-867.
[4]周志华. 机器学习[M]. 北京:清华大学出版社, 2016:371-373.
[5]〖JP2〗徐志雄,曹雷,陈希亮. 基于强化学习的无人坦克对战仿真研究[J]. 计算机工程与应用, 2018,54(8):166-171.
[6]KOBER J, PETERS J. Reinforcement learning in robotics: A survey[M]// Learning Motor Skills. Springer, 2014:9-67.
[7]高阳,周如益,王皓,等. 平均奖赏强化学习算法研究[J]. 计算机学报, 2007,30(8):1372-1378.
[8]〖KG-*4〗KOBER J, BAGNELL J A, PETERS J. Reinforcement learning in robotics: A survey[J]. International Journal of Robotics Research, 2013,32(11):1238-1274.
[9]高阳,陈世福,陆鑫. 强化学习研究综述[J]. 自动化学报, 2004,30(1):86-100.
[10]WATKINS C, DAYAN P. Q-learning[J]. Machine Learning, 1992,8(3):279-292.
[11]RUMMERY G, NIRANJAN M. On-line Q-learning Using Connectionist Systems[R]. Department of Engineering, University of Cambridge, 1994.
[12]GULLAPALLI V. Reinforcement Learning and Its Application to Control[D]. University of Massachusetts, 1992.
[13]MOORE A W. Efficient Memory-based Learning for Robot Control[D]. University of Cambridge, 1990.
[14]MNIH V, KAVUKCUOGLU K, SILVER D, et al. Human-level control through deep reinforcement learning[J]. Nature, 2015,518(7540):529-533.
[15]MNIH V, KAVUKCUOGLU K, SILVER D, et al. Playing Atari with Deep Reinforcement Learning[DB/OL]. (2013-12-19)[2019-04-10]. https://arxiv.org/pdf/1312.5602.pdf.
[16]LECUN Y, BENGIO Y, HINTON G. Deep learning[J]. Nature, 2015,521(7553):436-444.
[17]GOODFELLOW I, BENGIO Y, COURVILLE A. Deep Learning[M]. MIT Press, 2016.
[18]CHANDOLA V, BANERJEE A, KUMAR V. Anomaly detection: A survey[J]. ACM Computing Surveys, 2009,41(3): Article No. 15. DOI: 10.1145/1541880.1541882.
[19]LASKOVP, DUSSEL P, SCHAFER C, et al. Learning intrusion detection: Supervised or unsupervised?[C]// Proceedings of the 13th International Conference on Image Analysis and Processing. 2005:50-57.
[20]王海凤. 工业控制网络的异常检测与防御资源分配研究[D]. 杭州:浙江大学, 2014.
[21]LECUN Y, BOTTOU L, BENGIO Y, et al. Gradient-based learning applied to document recognition[J]. Proceedings of the IEEE, 1998,86(11):2278-2324. |