This study leverages reinforcement learning techniques to identify optimal strategies for cyber defense. These techniques are applied within a cybersecurity game framework, resulting in a continuous, adversarial decision-making scenario between two agents – an attacker and a defender. The findings offer valuable insights for defenders aiming to protect data from cyber threats.
The Impact of Workload on Phishing Susceptibility: An Experiment
Phishing is when social engineering is used to deceive a person into sharing sensitive information or downloading...