Skip to main content
. 2025 Jan 2;25(1):211. doi: 10.3390/s25010211

Figure 2.

Figure 2

General diagram of the proposed architecture showing the interaction between the RL agent and the recommender system to obtain as output a suggestion of attacks to be performed on the available machine.