Abstract: Postulating the behavior of attackers is important in the design of cybersecurity protection measures. Attack graph is a technique employed for this purpose, which aids in identifying and ...
Abstract: Recently, graph reinforcement learning (GRL)-based methods have demonstrated superior performance in solving decision-making issues. However, existing GRL-based methods encounter challenges ...