{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T21:37:19Z","timestamp":1770845839040,"version":"3.50.1"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T00:00:00Z","timestamp":1759622400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T00:00:00Z","timestamp":1759622400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,5]]},"DOI":"10.1109\/smc58881.2025.11343228","type":"proceedings-article","created":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T20:54:44Z","timestamp":1769633684000},"page":"5054-5059","source":"Crossref","is-referenced-by-count":0,"title":["Automated Penetration on Multi-Subnet Environments with Dual-Stage DRL Models"],"prefix":"10.1109","author":[{"given":"Haoyu","family":"Bu","sequence":"first","affiliation":[{"name":"Chinese Academy of Science,Institute of Information Engineering,Beijing,China"}]},{"given":"Hui","family":"Wen","sequence":"additional","affiliation":[{"name":"Chinese Academy of Science,Institute of Information Engineering,Beijing,China"}]},{"given":"Hongsong","family":"Zhu","sequence":"additional","affiliation":[{"name":"Chinese Academy of Science,Institute of Information Engineering,Beijing,China"}]},{"given":"Hong","family":"Li","sequence":"additional","affiliation":[{"name":"Chinese Academy of Science,Institute of Information Engineering,Beijing,China"}]},{"given":"Xirui","family":"Song","sequence":"additional","affiliation":[{"name":"Chinese Academy of Science,Institute of Information Engineering,Beijing,China"}]},{"given":"Yimo","family":"Ren","sequence":"additional","affiliation":[{"name":"Chinese Academy of Science,Institute of Information Engineering,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Vulhub: Pre-built vulnerable environments based on docker-compose","author":"Gong"},{"key":"ref2","article-title":"Hack the box: Your cyber performance center"},{"key":"ref3","article-title":"Modeling penetration testing with reinforcement learning using capture-the-flag challenges: Trade-offs between model-free learning and a priori knowledge","author":"Zennaro","year":"2021"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2009.5379852"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103055"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.23919\/JCIN.2023.10272349"},{"key":"ref7","article-title":"Cyberbattlesim","year":"2021"},{"key":"ref8","article-title":"Nasim: Network attack simulator","author":"Schwartz","year":"2019"},{"key":"ref9","article-title":"Cyborg: An autonomous cyber operations research gym","author":"Baillie","year":"2020"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW51379.2020.00010"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3678890.3678902"},{"key":"ref12","article-title":"Deep hierarchical reinforcement agents for automated penetration testing","author":"Tran","year":"2021"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN60899.2024.10650368"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-023-04946-1"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA55696.2022.00213"},{"issue":"1","key":"ref16","article-title":"Reinforcement learning for efficient network penetration testing","volume-title":"Information","volume":"11","author":"Ghanem","year":"2020"},{"key":"ref17","article-title":"Deep exploit","author":"Takaesu","year":"2018"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01544"}],"event":{"name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","location":"Vienna, Austria","start":{"date-parts":[[2025,10,5]]},"end":{"date-parts":[[2025,10,8]]}},"container-title":["2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11342430\/11342431\/11343228.pdf?arnumber=11343228","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T20:51:49Z","timestamp":1770843109000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11343228\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,5]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/smc58881.2025.11343228","relation":{},"subject":[],"published":{"date-parts":[[2025,10,5]]}}}