{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:31:09Z","timestamp":1773246669276,"version":"3.50.1"},"reference-count":49,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T00:00:00Z","timestamp":1747094400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T00:00:00Z","timestamp":1747094400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,5,13]]},"DOI":"10.1109\/icmcis64378.2025.11047884","type":"proceedings-article","created":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T17:36:43Z","timestamp":1751305003000},"page":"1-10","source":"Crossref","is-referenced-by-count":3,"title":["Cyber Operations Gyms to Train Autonomous Cyber Defense Agents for NATO"],"prefix":"10.1109","author":[{"given":"Alexander","family":"Velazquez","sequence":"first","affiliation":[{"name":"U.S. Naval Research Laboratory,Information Technology Division,Washington,DC,USA"}]},{"given":"Johannes F.","family":"Loevenich","sequence":"additional","affiliation":[{"name":"Secure Communications &#x0026; Information (SIX), Thales Deutschland,Ditzingen,Germany"}]},{"given":"Tobias","family":"H\u00fcrten","sequence":"additional","affiliation":[{"name":"Secure Communications &#x0026; Information (SIX), Thales Deutschland,Ditzingen,Germany"}]},{"given":"Konrad","family":"Wrona","sequence":"additional","affiliation":[{"name":"NATO Cyber Security Centre,The Hague,Netherlands"}]},{"given":"Paulo H.L.","family":"Rettore","sequence":"additional","affiliation":[{"name":"Fraunhofer FKIE,Department of Communication Systems,Bonn,Germany"}]},{"given":"Vasil","family":"Boshnakov","sequence":"additional","affiliation":[{"name":"NATO Communication and Information Agency,Catania,Italy"}]},{"given":"Frederica","family":"Free-Nelson","sequence":"additional","affiliation":[{"name":"U.S. Army Research Laboratory,Computational &#x0026; Information Sciences Directorate,Adelphi,MD,USA"}]},{"given":"Tracy","family":"Braun","sequence":"additional","affiliation":[{"name":"U.S. Army Research Laboratory,Technology Forecasting Office,Adelphi,MD,USA"}]},{"given":"Roberto Rigolin F.","family":"Lopes","sequence":"additional","affiliation":[{"name":"Secure Communications &#x0026; Information (SIX), Thales Deutschland,Ditzingen,Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCIS59922.2023.10253614"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCIS59922.2023.10253524"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM58377.2023.10356321"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCIS61231.2024.10540988"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCIS61231.2024.10540952"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SDS64317.2024.10883914"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM61039.2024.10773923"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM55135.2022.10017788"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCIS52405.2021.9486421"},{"key":"ref10","first-page":"1","article-title":"Design and Evaluation of an Autonomous Cyber Defence Agent Using DRL and an Augmented LLM","author":"Loevenich","year":"2024","journal-title":"SSRN"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2025.111162"},{"key":"ref12","article-title":"Challenges and framework for developing autonomous cyber defense agents for tactical edge scenarios","volume-title":"NATO STO Information Systems Technology Research Symposium (IST-208-RSY) - Towards the convergence of Edge Computing, Adaptive Networking, and Information Management at the Tactical Edge","author":"Velazquez"},{"key":"ref13","article-title":"NATO Agency Unveils First-Of-Its-Kind Tech Strategy For Multi-Domain Operations","author":"Copp","year":"2024"},{"key":"ref14","article-title":"Allies agree new NATO Integrated Cyber Defence Centre","volume-title":"NATO Newsroom","year":"2024"},{"key":"ref15","article-title":"Summary of NATO\u2019s revised Artificial Intelligence (AI) strategy","volume-title":"NATO","year":"2024"},{"key":"ref16","volume-title":"Memorandum on Advancing the United States Leadership in Artificial Intelligence: Harnessing Artificial Intelligence to Fulfill National Security Objectives and Fostering the Safety and Security of Americans","year":"2024"},{"key":"ref17","article-title":"The near-term impact of AI on the cyber threat","volume-title":"National Cyber Security Centre (NCSC)","year":"2023"},{"key":"ref18","article-title":"NATO: Time to Adopt a Pre-emptive Approach to Cyber Security in New Age Security Architecture","author":"Efthymiopoulos","year":"2024","journal-title":"Georgetown Journal of International Affairs"},{"key":"ref19","article-title":"Cyber operations research gym","author":"Standen","year":"2022"},{"key":"ref20","author":"Baillie","year":"2020","journal-title":"CybORG: An autonomous cyber operations research gym"},{"key":"ref21","article-title":"CybORG: A gym for the development of autonomous cyber agents","volume-title":"IJCAI-21 1st International Workshop on Adaptive Cyber Defense","author":"Standen","year":"2021"},{"key":"ref22","article-title":"TTCP CAGE challenge 2","volume-title":"AAAI-22 Workshop on Artificial Intelligence for Cyber Security (AICS). GitHub","year":"2022"},{"key":"ref23","volume-title":"TTCP CAGE challenge 4","year":"2023"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3389\/fnbeh.2021.735387"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM50824.2020.9269092"},{"key":"ref26","article-title":"The cyber security learning environment (CSLE)","author":"Hammar","year":"2020"},{"key":"ref27","article-title":"Developing optimal causal cyber-defence agents via cyber security simulation","volume-title":"Workshop on Machine Learning for Cybersecurity (ML4Cyber) as part of the Proceedings of the 39 th International Conference on Machine Learning","author":"Andrew"},{"key":"ref28","article-title":"YAWNING-TITAN","author":"Andrew","year":"2021"},{"key":"ref29","article-title":"PrimAITE","volume-title":"QinetrQ and UK Defence Science and Technology Laboratory","year":"2023"},{"key":"ref30","author":"Molina-Markham","year":"2021","journal-title":"Network environment design for autonomous cyberdefense"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM61039.2024.10773848"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/DS-RT50469.2020.9213690"},{"key":"ref33","article-title":"CYST","author":"Drasar","year":"2022"},{"key":"ref34","article-title":"Broad agency announcement: Cyber agents for security testing and learning environments (CASTLE)","volume-title":"Defense Advanced Research Projects Agency","year":"2022"},{"key":"ref35","article-title":"CyGIL: A cyber gym for training autonomous agents over emulated network systems","author":"Li","year":"2021"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI58124.2022.00034"},{"key":"ref37","article-title":"Towards autonomous cyber operation agents: Exploring the red case","author":"Li","year":"2023"},{"key":"ref38","article-title":"CyberBattleSim","volume-title":"M. D. R. Team.","author":"Seifert","year":"2021"},{"key":"ref39","article-title":"NASim: Network attack simulator","author":"Schwartz","year":"2019"},{"key":"ref40","article-title":"Network attack simulator (NASim)","author":"Schwartz","year":"2018"},{"key":"ref41","article-title":"NASimEmu: Network attack simulator & emulator for training agents generalizing to novel scenarios","author":"Janisch","year":"2023"},{"key":"ref42","article-title":"NASimEmu","author":"Janisch","year":"2023"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.5220\/0012367300003648"},{"key":"ref44","article-title":"PenGym: Pentesting training framework for reinforcement learning agents","author":"Nguyen","year":"2023"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2017EDP7207"},{"key":"ref46","author":"Deng","year":"2023","journal-title":"PentestGPT: An LLM-empowered automatic penetration testing tool"},{"key":"ref47","volume-title":"MITRE Caldera: A Scalable, Automated Adversary Emulation Platform","year":"2024"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3675741.3675752"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3208283"}],"event":{"name":"2025 International Conference on Military Communication and Information Systems (ICMCIS)","location":"Oerias, Portugal","start":{"date-parts":[[2025,5,13]]},"end":{"date-parts":[[2025,5,14]]}},"container-title":["2025 International Conference on Military Communication and Information Systems (ICMCIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11047255\/11047555\/11047884.pdf?arnumber=11047884","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T05:33:20Z","timestamp":1751348000000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11047884\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,13]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/icmcis64378.2025.11047884","relation":{},"subject":[],"published":{"date-parts":[[2025,5,13]]}}}