Research Article

Discover the Hidden Attack Path in Multiple Domain Cyberspace Based on Reinforcement Learning

Table 2

Attack sequences steps in different security rules.

Methods3456

DQN3533432372318313
A2C3222421373328812
DDPG2434476572408551
IDDPG995332263217233