{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T22:07:25Z","timestamp":1759961245555,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,2,19]],"date-time":"2024-02-19T00:00:00Z","timestamp":1708300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,2,19]],"date-time":"2024-02-19T00:00:00Z","timestamp":1708300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,2,19]]},"DOI":"10.1109\/icnc59896.2024.10556056","type":"proceedings-article","created":{"date-parts":[[2024,6,21]],"date-time":"2024-06-21T17:20:54Z","timestamp":1718990454000},"page":"641-647","source":"Crossref","is-referenced-by-count":3,"title":["Accelerating Autonomous Cyber Operations: A Symbolic Logic Planner Guided Reinforcement Learning Approach"],"prefix":"10.1109","author":[{"given":"Ryan","family":"Kerr","sequence":"first","affiliation":[{"name":"Queen&#x0027;s School of Computing,Kingston, Ontario,Canada"}]},{"given":"Steven","family":"Ding","sequence":"additional","affiliation":[{"name":"Queen&#x0027;s School of Computing,Kingston, Ontario,Canada"}]},{"given":"Li","family":"Li","sequence":"additional","affiliation":[{"name":"Defence Research and Development Canada,Ottawa, Ontario,Canada"}]},{"given":"Adrian","family":"Taylor","sequence":"additional","affiliation":[{"name":"Defence Research and Development Canada,Ottawa, Ontario,Canada"}]}],"member":"263","reference":[{"key":"ref1","first-page":"71","article-title":"A graph-based system for network-vulnerability analysis","volume-title":"Proceedings of the 1998 Workshop on New Security Paradigms, ser. NSPW 98","author":"Phillips"},{"key":"ref2","article-title":"Attack planning in the real world","volume-title":"Proceedings of the Second International Workshop on Security and Artificial Intelligence, AAAI 2010","author":"Obes","year":"2013"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2011.6127490"},{"key":"ref4","article-title":"Automated adversary emulation: A case for planning and acting with unknowns","author":"Miller","year":"2018","journal-title":"MITRE Technical Papers"},{"key":"ref5","article-title":"Autonomous penetration testing using reinforcement learning","volume":"abs\/1905.05965","author":"Schwartz","year":"2019","journal-title":"CoRR"},{"volume-title":"CyberBattleSim","year":"2021","key":"ref6"},{"key":"ref7","article-title":"Deep hierarchical reinforcement agents for automated penetration testing","volume-title":"Proceedings of the First International Workshop on Adaptive Cyber Defense, IJCAI 2021","author":"Tran","year":"2021"},{"key":"ref8","article-title":"Cyborg: A gym for the development of autonomous cyber agents","volume-title":"Proceedings of the First International Workshop on Adaptive Cyber Defense, IJCAI 2021","author":"Standen","year":"2021"},{"key":"ref9","article-title":"Cygil: A cyber gym for training autonomous agents over emulated network systems","volume-title":"Proceedings of the First International Workshop on Adaptive Cyber Defense, IJCAI 2021","author":"Li","year":"2021"},{"journal-title":"Network environment design for autonomous cyberde-fense","year":"2021","author":"Molina-Markham","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1613\/jair.855"},{"key":"ref12","first-page":"1936","article-title":"Planning under partial observability by classical replanning: Theory and experiments","volume-title":"IJCAI 2011, Proceedings of the 22nd International Joint Conference on Artificial Intelligence","author":"Bonet","year":"2011"},{"key":"ref13","article-title":"Cyborg: A gym for the development of autonomous cyber agents","volume":"abs\/2108.09118","author":"Standen","year":"2021","journal-title":"CoRR"},{"key":"ref14","first-page":"364","article-title":"Simulated Penetration Testing: From \u201cDijkstra\u201d to \u201cTuring Test++\u201d","volume-title":"Proceedings of the Twenty-Fifth International Conference on Automated Planning and Scheduling, ICAPS 2015","author":"Hoffmann","year":"2015"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.32473\/flairs.v35i.130584"},{"volume-title":"Stable Baselines","year":"2018","author":"Hill","key":"ref16"}],"event":{"name":"2024 International Conference on Computing, Networking and Communications (ICNC)","start":{"date-parts":[[2024,2,19]]},"location":"Big Island, HI, USA","end":{"date-parts":[[2024,2,22]]}},"container-title":["2024 International Conference on Computing, Networking and Communications (ICNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10555566\/10555889\/10556056.pdf?arnumber=10556056","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T05:33:38Z","timestamp":1726032818000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10556056\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,19]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icnc59896.2024.10556056","relation":{},"subject":[],"published":{"date-parts":[[2024,2,19]]}}}