1. H. Sherazi, R. Iqbal, Z. A. Khan, M. H. Chaudary,F. Ahmad, “DDoS Attack Detection: A Key Enabler for Sustainable Communication in Internet of Vehicles,”Sustainable Computing: Informatics and Systems, Vol. 23, pp. 13-20, 2019 2. L. An and G. H. Yang, “Data‐based Optimal Denial‐of‐Service Attack Scheduling Against Robust Control based on Q‐Learning,” International Journal of Robust and Nonlinear Control, Vol. 29, No. 15, pp. 5178-5194, 2019 3. S. Shamshirband, A. Patel, N. B. Anuar, A. Abraham,M. L. M.Kiah, “Cooperative Game Theoretic Approach using Fuzzy Q-Learning for Detecting and Preventing Intrusions in Wireless Sensor Networks,”Engineering Applications of Artificial Intelligence, Vol. 32, pp. 228-241, 2014 4. S. Shamshirband, N. B. Anuar, S. Misra,M. L. M.Kiah, “Anomaly Detection using Fuzzy Q-Learning Algorithm,” Acta Polytechnica Hungarica, Vol. 11, No. 8, pp. 5-28, 2014 5. S. Shamshirband, B. Daghighi, N. B. Anuar, M. L. M.Kiah, A. Patel, and A. Abraham, “Co-FQL: Anomaly Detection using Cooperative Fuzzy Q-Learning in Network,” Journal of Intelligent and Fuzzy Systems, Vol. 28, No. 3, pp. 1345-1357, 2015 6. Y. Li, D. E. Quevedo, S. Dey,L. Shi, “SINR-based DoS Attack on Remote State Estimation: A Game-Theoretic Approach,” IEEE Transactions on Control of Network Systems, Vol. 4, No. 3, pp. 632-642, 2016 7. L. Xiao, D. Jiang, X. Wan,W. Su, “Anti-Jamming Underwater Transmission with Mobility and Learning,” IEEE Communications Letters, Vol. 22, No. 3, pp. 542-545, 2018 8. K. Ding, Y. Li, D. Quevedo,S. Dey, “A Multi-Channel Transmission Schedule for Remote State Estimation under DoS Attacks,”Automatica, Vol. 78, pp. 194-201, 2017 9. O. Osanaiye, H. Cai, K. K. R. Choo, Z. Xu, M. E. Dlodlo,A. Dehghantanha, “Ensemble-based Multi-Filter Feature Selection Method for DDoS Detection in Cloud Computing,” EURASIP Journal on Wireless Communications and Networking, Vol.2016, No. 1, pp. 130, 2016 10. L. Xiao, X. Wan, C. Dai, et al., “Security in Mobile Edge Caching with Reinforcement Learning,” IEEE Wireless Communications, Vol. 25, No. 3, pp. 116-122, 2018 11. N. Z. Bawany, J. A. Shamsi,K. Salah, “DDoS Attack Detection and Mitigation using SDN: Methods, Practices, and Solutions,” Arabian Journal for Science and Engineering, Vol. 42, No. 2, pp. 425-441, 2017 12. Q. Wei, F. L. Lewis, Q. Sun, P. Yan,R. Song, “Discrete-Time Deterministic $ Q $-Learning: A Novel Convergence Analysis,” IEEE Transactions on Cybernetics, Vol. 47, No. 5, pp. 1224-1237, 2016 13. W. S. Chung, E. J. Jang,J. Y. Kim, “On the q-Deformed Thermodynamics and q-Deformed Fermi Level in Intrinsic Semiconductor,” Advanced Studies in Theoretical Physics, Vol. 11, No. 5, pp. 213-223, 2017 14. X. Yuan, C. Li,X. Li, “DeepDefense: Identifying DDoS Attack via Deep Learning,” inProceedings of 2017 IEEE International Conference on Smart Computing (SMARTCOMP), pp. 1-8, IEEE, 2017 15. X. Liang, X. Du, G. Wang,Z. Han, “A Deep Q Learning Network for Traffic Lights' Cycle Control in Vehicular Networks,” IEEE Transactions on Vehicular Technology, Vol. 1, No. 1, pp. 99, 2019 16. Z. Tang, L. Luo, P. Hong,S. Li, “A Joint Residual Network with Paired ReLUs Activation for Image Super-Resolution,”Neurocomputing, Vol. 273, pp. 37-46, 2018 17. G. Han, L. Xiao,H. V. Poor, “Two-Dimensional Anti-Jamming Communication based on Deep Reinforcement Learning,” inProceedings of 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2087-2091, IEEE, 2017 18. G. Yu, J. Xu,X. Cheng, “Platform of Quality Evaluation System for Multimedia Video Communication based NS2,”Journal of Ambient Intelligence and Humanized Computin, pp. 1-12, 2018 19. K. Jensen, L. M. Kristensen,L. Wells, “Coloured Petri Nets and CPN Tools for Modelling and Validation of Concurrent Systems,” International Journal on Software Tools for Technology Transfer, Vol. 9, No.3-4, pp. 213-254, 2007 |