{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:28:05Z","timestamp":1772555285204,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,24]]},"DOI":"10.1109\/icccnt61001.2024.10725126","type":"proceedings-article","created":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T23:06:46Z","timestamp":1730761606000},"page":"1-7","source":"Crossref","is-referenced-by-count":1,"title":["Meta-Reinforcement Learning for Adaptation in Dynamic Cyber Security Environment"],"prefix":"10.1109","author":[{"given":"Sambhavi","family":"Tiwari","sequence":"first","affiliation":[{"name":"Indian Institute of Information Technology Allahabad,Information Technology,Prayagraj,India"}]},{"given":"Aadharsh","family":"Roshan","sequence":"additional","affiliation":[{"name":"Indian Institute of Information Technology Allahabad,Information Technology,Prayagraj,India"}]},{"given":"Ayush","family":"Baranwal","sequence":"additional","affiliation":[{"name":"Indian Institute of Information Technology Allahabad,Information Technology,Prayagraj,India"}]},{"given":"Sahil","family":"Sharma","sequence":"additional","affiliation":[{"name":"Indian Institute of Information Technology Allahabad,Information Technology,Prayagraj,India"}]},{"given":"Manas","family":"Gogoi","sequence":"additional","affiliation":[{"name":"Indian Institute of Information Technology Allahabad,Information Technology,Prayagraj,India"}]},{"given":"Shekhar","family":"Verma","sequence":"additional","affiliation":[{"name":"Indian Institute of Information Technology Allahabad,Information Technology,Prayagraj,India"}]}],"member":"263","reference":[{"key":"ref1","article-title":"FAM: fast adaptive meta-learning","author":"Sinha","year":"2023","journal-title":"arXiv preprint arXiv:2308.13970"},{"key":"ref2","article-title":"An intrusion detection game with limited observations","volume-title":"12th Int. Symp. on Dynamic Games and Applications","volume":"26","author":"Alpcan"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2009.5399894"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM52442.2021.9615542"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.5220\/0006197105590566"},{"key":"ref6","article-title":"Model-agnostic meta-learning for fast adaptation of deep networks","volume-title":"International conference on machine learning","author":"Finn"},{"key":"ref7","article-title":"Learning to adapt in dynamic, real-world environments through meta-reinforcement learning","author":"Nagabandi","year":"2018","journal-title":"arXiv preprint arXiv:1803.11347"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3057960"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3467470"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM52442.2021.9615542"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIAS.2006.295318"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM50824.2020.9269092"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2480741.2480742"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3066620"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/su131810057"},{"key":"ref16","article-title":"ATMoS: Autonomous Threat Mitigation in SDN using Reinforcement Learning","volume-title":"IEEE Conference on Communications and Network Security","author":"Zeng"},{"key":"ref17","volume-title":"Reinforcement learning: An introduction","author":"Sutton","year":"2018"},{"key":"ref18","volume-title":"RMA: Rapid Motor Adaptation for Legged Robots\u201d Conference on Robotics and Automation"},{"key":"ref19","article-title":"TTCP CAGE Challenge 2","volume-title":"AAAI-22 Workshop on Artificial Intelligence for Cyber Security (AICS)"},{"key":"ref20","article-title":"Proximal policy optimization algorithms","author":"Schulman","year":"2017","journal-title":"arXiv preprint arXiv:1707.06347"},{"key":"ref21","volume-title":"TTCP CAGE Challenge 3"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P18-1203"},{"key":"ref23","article-title":"Learning to adapt in dynamic, real-world environments through meta-reinforcement learning","author":"Nagabandi","year":"2018","journal-title":"arXiv preprint arXiv:1803.11347"}],"event":{"name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","location":"Kamand, India","start":{"date-parts":[[2024,6,24]]},"end":{"date-parts":[[2024,6,28]]}},"container-title":["2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10723818\/10723316\/10725126.pdf?arnumber=10725126","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T07:31:12Z","timestamp":1732692672000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10725126\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,24]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icccnt61001.2024.10725126","relation":{},"subject":[],"published":{"date-parts":[[2024,6,24]]}}}