Research Article

Discover the Hidden Attack Path in Multiple Domain Cyberspace Based on Reinforcement Learning

Figure 5

Different methods reward results: (a) IDDPG method, (b) DDPG method, (c) A2C method, and (d) DQN method.
(a)
(b)
(c)
(d)