{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:25:55Z","timestamp":1740101155654,"version":"3.37.3"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,19]],"date-time":"2022-10-19T00:00:00Z","timestamp":1666137600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,19]],"date-time":"2022-10-19T00:00:00Z","timestamp":1666137600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100005073","name":"Agency for Defense Development","doi-asserted-by":"publisher","award":["UI210009XD"],"award-info":[{"award-number":["UI210009XD"]}],"id":[{"id":"10.13039\/501100005073","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,19]]},"DOI":"10.1109\/ictc55196.2022.9952533","type":"proceedings-article","created":{"date-parts":[[2022,11,25]],"date-time":"2022-11-25T22:41:09Z","timestamp":1669416069000},"page":"1972-1975","source":"Crossref","is-referenced-by-count":2,"title":["Tutorial on Course-of-Action (COA) Attack Search Methods in Computer Networks"],"prefix":"10.1109","author":[{"given":"Seok Bin","family":"Son","sequence":"first","affiliation":[{"name":"Korea University,Department of Electrical and Computer Engineering,Seoul,Republic of Korea"}]},{"given":"Soohyun","family":"Park","sequence":"additional","affiliation":[{"name":"Korea University,Department of Electrical and Computer Engineering,Seoul,Republic of Korea"}]},{"given":"Haemin","family":"Lee","sequence":"additional","affiliation":[{"name":"Korea University,Department of Electrical and Computer Engineering,Seoul,Republic of Korea"}]},{"given":"Joongheon","family":"Kim","sequence":"additional","affiliation":[{"name":"Korea University,Department of Electrical and Computer Engineering,Seoul,Republic of Korea"}]},{"given":"Soyi","family":"Jung","sequence":"additional","affiliation":[{"name":"School of Software, Hallym University,Chuncheon,Republic of Korea"}]},{"given":"Dong Hwa","family":"Kim","sequence":"additional","affiliation":[{"name":"Agency for Defense Development (ADD),Seoul,Republic of Korea"}]}],"member":"263","reference":[{"key":"ref33","article-title":"Behaviour-Diverse Automatic Penetration Testing: A Curiosity-Driven Multi-Objective Deep Reinforcement Learning Approach","author":"yang","year":"2022","journal-title":"ArXiv Preprint"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/DSC54232.2022.9888919"},{"key":"ref31","article-title":"Deep Hierarchical Reinforcement Agents for Automated Penetration Testing","author":"tran","year":"2021","journal-title":"CoRR"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/app11198823"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2018.8463162"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2844980"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2938755"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2021.01.005"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS51825.2021.9484462"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC52510.2021.9620885"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.28.1.1"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/BF00992698"},{"journal-title":"Military Decisionmaking Process Lessons and Best Practices","year":"2015","author":"reese","key":"ref17"},{"key":"ref18","first-page":"1928","article-title":"Asynchronous Methods for Deep Reinforcement Learning","volume":"48","author":"mnih","year":"2016","journal-title":"Proc of the International Conference on Machine Learning (ICML)"},{"key":"ref19","article-title":"Proximal Policy Optimization Algorithms","author":"schulman","year":"2017","journal-title":"CoRR"},{"key":"ref28","article-title":"Using Cyber Terrain in Reinforcement Learning for Penetration Testing","author":"gangupantulu","year":"2021","journal-title":"CoRR"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-3618-5_1"},{"journal-title":"Automating Penetration Testing using Reinforcement Learning","year":"2020","author":"niculae","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.062612.00056"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3134457"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW51379.2020.00010"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2021.3055679"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3062418"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2988033"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-010-0266-8"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2017.7943455"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3094806"},{"key":"ref20","article-title":"POMDPs Make Better Hackers: Accounting for Uncertainty in Penetration Testing","author":"sarraute","year":"2012","journal-title":"Proc Of the Conference on Artificial Intelligence (AAAI)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/WorldS4.2018.8611595"},{"key":"ref21","article-title":"Penetration Testing == POMDP Solving?","author":"sarraute","year":"2013","journal-title":"CoRR"},{"key":"ref24","article-title":"Autonomous Penetration Testing using Reinforcement Learning","author":"schwartz","year":"2019","journal-title":"CoRR"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/info11010006"},{"journal-title":"Reinforcement Learning vs Genetic Algorithms in Game-Theoretic Cyber-Security","year":"2018","author":"niculae","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICAICA52286.2021.9497911"}],"event":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","start":{"date-parts":[[2022,10,19]]},"location":"Jeju Island, Korea, Republic of","end":{"date-parts":[[2022,10,21]]}},"container-title":["2022 13th International Conference on Information and Communication Technology Convergence (ICTC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9952188\/9952355\/09952533.pdf?arnumber=9952533","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,24]],"date-time":"2023-04-24T18:17:32Z","timestamp":1682360252000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9952533\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,19]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/ictc55196.2022.9952533","relation":{},"subject":[],"published":{"date-parts":[[2022,10,19]]}}}