{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:10:21Z","timestamp":1756271421428,"version":"3.44.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/csr64739.2025.11130046","type":"proceedings-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:04:27Z","timestamp":1756235067000},"page":"393-400","source":"Crossref","is-referenced-by-count":0,"title":["Accounting for the Impact of Real-World Data and Costs in Autonomous Cyber Defence"],"prefix":"10.1109","author":[{"given":"Adam","family":"Neal","sequence":"first","affiliation":[{"name":"University of Liverpool"}]},{"given":"Alberto","family":"Acuto","sequence":"additional","affiliation":[{"name":"University of Liverpool"}]},{"given":"Peter L.","family":"Green","sequence":"additional","affiliation":[{"name":"University of Liverpool"}]},{"given":"Chris","family":"Lear","sequence":"additional","affiliation":[{"name":"Aleph Insights"}]},{"given":"Nick","family":"Hare","sequence":"additional","affiliation":[{"name":"Aleph Insights"}]},{"given":"Simon","family":"Maskell","sequence":"additional","affiliation":[{"name":"University of Liverpool"}]}],"member":"263","reference":[{"journal-title":"National Cyber Security Centre(NCSC)","first-page":"2025","article-title":"Ncsc warns of enduring and significant threat to the uk\u2019s critical infrastructure","key":"ref1"},{"article-title":"Cognitive load and subjective time pressure: How contextual factors impact the quality of cyber-security decision making","year":"2023","author":"Raywood-Burke","key":"ref2"},{"article-title":"Security at Machine Speed","issue":"2019","author":"Fransen","key":"ref3"},{"key":"ref4","first-page":"329","article-title":"Design and implementation of an availability scoring system for cyber defence exercises","volume-title":"Proc. 14th Int. Conf. Cyber Warfare Secur","author":"Pihelgas"},{"article-title":"Aircraft accident to royal air force tornado gr mk4a zg710","year":"2003","author":"Ministry of Defence","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2819967"},{"key":"ref7","article-title":"Acd-g: Enhancing autonomous cyber defense agent generalization through graph embedded network representation","author":"Collyer","year":"2022","journal-title":"ICML"},{"key":"ref8","first-page":"6105","article-title":"Efficientnet: Rethinking model scaling for convolutional neural networks","author":"Tan","year":"2019","journal-title":"ICML"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-5224-x"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3389\/frsen.2022.932431"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/make3040048"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-5990-9_4"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2016.07.007"},{"volume-title":"SVRs and Uncertainty Estimates","year":"2015","author":"Alonso","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2019.00138"},{"key":"ref16","article-title":"Gaussian process dynamical models","volume":"18","author":"Wang","year":"2005","journal-title":"Advances in neural inf. process. syst"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmp.2018.03.001"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28650-9_4"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2019.2957109"},{"issue":"Dec","key":"ref20","first-page":"299","article-title":"Classes of kernels for machine learning: a statistics perspective","volume":"2","author":"Genton","year":"2001","journal-title":"J. Mach. Learn. Res"},{"key":"ref21","article-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2014","journal-title":"arXiv preprint arXiv:1412.6980"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.2307\/1271432"}],"event":{"name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2025,8,4]]},"location":"Chania, Crete, Greece","end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129696\/11129957\/11130046.pdf?arnumber=11130046","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T04:52:40Z","timestamp":1756270360000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130046\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/csr64739.2025.11130046","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}