no code implementations • 9 Jun 2021 • John Mern, Kyle Hatch, Ryan Silva, Jeff Brush, Mykel J. Kochenderfer
Defending computer networks from cyber attack requires coordinating actions across multiple nodes based on imperfect indicators of compromise while minimizing disruptions to network operations.