{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T18:34:47Z","timestamp":1773945287523,"version":"3.50.1"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,4,15]],"date-time":"2024-04-15T00:00:00Z","timestamp":1713139200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,4,15]],"date-time":"2024-04-15T00:00:00Z","timestamp":1713139200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100018709","name":"European Defence Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100018709","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,4,15]]},"DOI":"10.1109\/syscon61195.2024.10553626","type":"proceedings-article","created":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T17:55:15Z","timestamp":1718646915000},"page":"1-8","source":"Crossref","is-referenced-by-count":7,"title":["Transforming Cybersecurity Dynamics: Enhanced Self-Play Reinforcement Learning in Intrusion Detection and Prevention System"],"prefix":"10.1109","author":[{"given":"Aws","family":"Jaber","sequence":"first","affiliation":[{"name":"KTH Royal Institute of Technology,Division of Network and Systems Engineering,Stockholm,Sweden"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.4324\/9781003110224-6"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-26845-8_1"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3372823"},{"key":"ref4","author":"Cummings","journal-title":"Threat modeling, decoded"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-50670-3_9"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM50824.2020.9269092"},{"key":"ref7","first-page":"1587","article-title":"Addressing function approximation error in actor-critic methods","volume-title":"International conference on machine learning","author":"Fujimoto"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19945-5_25"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1257\/jel.20181444"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.4324\/9781003350729"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2014.04.033"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/nav.21862"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s12198-018-0187-z"},{"issue":"2","key":"ref14","first-page":"17","article-title":"Patrolling games on general graphs with time-dependent node values","volume":"24","author":"Yolmeh","year":"2019","journal-title":"Military Operations Research"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1177\/0022002707304814"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2005.12.022"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2697965"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1287\/inte.2013.0700"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-012-9209-6"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1057\/jors.2011.49"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1613\/jair.4317"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1287\/ijoc.2016.0690"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2018.06.014"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2012.03.003"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2015.01.022"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1080\/10242694.2010.491668"},{"key":"ref27","volume-title":"Planning with Markov decision processes: An AI perspective","author":"Natarajan","year":"2022"},{"key":"ref28","article-title":"Deep learning and artificial intelligence framework to improve the cyber security","author":"Ghillani","year":"2022","journal-title":"Authorea Preprints"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27645-3_12"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781316471104"},{"key":"ref31","first-page":"25502","article-title":"Why generalization in rl is difficult: Epistemic pomdps and implicit partial observability","volume":"34","author":"Ghosh","year":"2021","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref32","first-page":"2009","article-title":"Goal recognition over pomdps: Inferring the intention of a pomdp agent","volume-title":"IJCAI","author":"Ram\u0131rez","year":"2011"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2022.03.037"},{"key":"ref34","volume-title":"Machine Learning Methods for Network Intrusion Detection and Intrusion Prevention Systems","author":"Svetoslavova Stefanova","year":"2018"},{"key":"ref35","first-page":"364","article-title":"An adaptive reinforcement learning strategy for the security game","volume-title":"International Conference on Decision and Game Theory for Security","author":"Oakley"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-335-6.50027-1"},{"key":"ref37","article-title":"Proximal policy optimization algorithms","author":"Schulman","year":"2017"}],"event":{"name":"2024 IEEE International Systems Conference (SysCon)","location":"Montreal, QC, Canada","start":{"date-parts":[[2024,4,15]]},"end":{"date-parts":[[2024,4,18]]}},"container-title":["2024 IEEE International Systems Conference (SysCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10553374\/10553399\/10553626.pdf?arnumber=10553626","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T19:13:31Z","timestamp":1719342811000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10553626\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,15]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/syscon61195.2024.10553626","relation":{},"subject":[],"published":{"date-parts":[[2024,4,15]]}}}