{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:13:07Z","timestamp":1730297587921,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T00:00:00Z","timestamp":1696118400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T00:00:00Z","timestamp":1696118400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,1]]},"DOI":"10.1109\/smc53992.2023.10394564","type":"proceedings-article","created":{"date-parts":[[2024,1,29]],"date-time":"2024-01-29T18:32:04Z","timestamp":1706553124000},"page":"3594-3599","source":"Crossref","is-referenced-by-count":0,"title":["Towards a Multi-Agent Simulation of Cyber-attackers and Cyber-defenders Battles"],"prefix":"10.1109","author":[{"given":"Julien","family":"Soul\u00e9","sequence":"first","affiliation":[{"name":"University Grenoble Alpes,Grenoble INP, LCIS,Valence,France,26000"}]},{"given":"Jean-Paul","family":"Jamont","sequence":"additional","affiliation":[{"name":"University Grenoble Alpes,Grenoble INP, LCIS,Valence,France,26000"}]},{"given":"Michel","family":"Occello","sequence":"additional","affiliation":[{"name":"University Grenoble Alpes,Grenoble INP, LCIS,Valence,France,26000"}]},{"given":"Paul","family":"Th\u00e9ron","sequence":"additional","affiliation":[{"name":"AICA IWG,La Guillermie,France"}]},{"given":"Louis-Marie","family":"Traonouez","sequence":"additional","affiliation":[{"name":"BL IAS,Thales Land and Air Systems,Rennes,France"}]}],"member":"263","reference":[{"volume-title":"MITRE ATTA&CK","year":"2023","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/310889.310919"},{"key":"ref3","first-page":"80","article-title":"Foundations of attack-defense trees","author":"Barbara","year":"2011","journal-title":"Formal Aspects of Security and Trust"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3476883.3520209"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31239-8_18"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/s20020556"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MED.2018.8442695"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422719"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CSSE.2008.949"},{"key":"ref10","first-page":"277","volume-title":"DEC-MDP \/ DEC-POMDP","author":"Aurelie","year":"2010"},{"volume-title":"Pettingzoo: Gym for multi-agent reinforcement learning","year":"2020","author":"Terry","key":"ref11"},{"key":"ref12","article-title":"The complexity of decentralized control of markov decision processes","volume":"abs\/1301.3836","author":"Bernstein","year":"2013","journal-title":"CoRR"},{"volume-title":"Autonomous Intelligent Cyber Defence Agent Prototype 2021 - Project Report","year":"2021","author":"Theron","key":"ref13"},{"volume-title":"A Concise Introduction to Decentralized POMDPs, ser. Springer Briefs in Intelligent Systems","year":"2016","author":"Oliehoek","key":"ref14"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"48 360","DOI":"10.1109\/ACCESS.2018.2867556","article-title":"A master attack methodology for an ai-based automated attack planner for smart cities","volume":"6","author":"Gregory","year":"2018","journal-title":"IEEE Access"},{"issue":"01","key":"ref16","first-page":"1325","volume":"2","author":"Dennis","year":"2011","journal-title":"Agent-based network security simulation"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2007.4488494"},{"key":"ref18","first-page":"35","volume-title":"OMNeT++","author":"Varga","year":"2010"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/DS-RT50469.2020.9213690"},{"volume-title":"Cyberbattlesim","year":"2021","author":"Team","key":"ref20"},{"volume-title":"Multi cyber agent simulator","year":"2023","key":"ref21"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1007\/BF00992698","article-title":"Technical note: Q-learning","volume":"8","author":"Watkins","year":"1992","journal-title":"Machine Learning"}],"event":{"name":"2023 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","start":{"date-parts":[[2023,10,1]]},"location":"Honolulu, Oahu, HI, USA","end":{"date-parts":[[2023,10,4]]}},"container-title":["2023 IEEE International Conference on Systems, Man, and Cybernetics (SMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10391856\/10393862\/10394564.pdf?arnumber=10394564","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T13:15:57Z","timestamp":1706793357000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10394564\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,1]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/smc53992.2023.10394564","relation":{},"subject":[],"published":{"date-parts":[[2023,10,1]]}}}