{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T14:06:18Z","timestamp":1772633178513,"version":"3.50.1"},"reference-count":94,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T00:00:00Z","timestamp":1762905600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T00:00:00Z","timestamp":1762905600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100030807","name":"Commonwealth Cyber Initiative","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100030807","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,12]]},"DOI":"10.1109\/tps-isa67132.2025.00041","type":"proceedings-article","created":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T20:50:15Z","timestamp":1772571015000},"page":"325-333","source":"Crossref","is-referenced-by-count":0,"title":["Leveraging Transformer Models and eXplainable Reinforcement Learning Methods for Advanced Intrusion Detection and Response System"],"prefix":"10.1109","author":[{"given":"Mohammad","family":"Ghasemigol","sequence":"first","affiliation":[{"name":"School of Cybersecurity, Old Dominion University,Department of Computer Science,Norfolk,VA,USA"}]},{"given":"Daniel","family":"Takabi","sequence":"additional","affiliation":[{"name":"School of Cybersecurity, Old Dominion University,Norfolk,VA,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3381998"},{"key":"ref2","article-title":"Decision transformer: reinforcement learning via sequence modeling","volume-title":"Proceedings of the 35th International Conference on Neural Information Processing Systems, in NIPS \u201921","author":"Chen","year":"2024"},{"key":"ref3","volume-title":"Explainable Reinforcement Learning via Reward Decomposition","author":"Juozapaitis","year":"2019"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-09640-2_14"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/NAPS52732.2021.9654767"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2894819"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IEMCON53756.2021.9623067"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3578366"},{"key":"ref9","article-title":"Using a K-Nearest Neighbors Machine Learning Approach to Detect Cyberattacks on the Navy Smart Grid","author":"Chan","year":"2020","journal-title":"NAVAL POSTGRADUATE SCHOOL MONTEREY CA"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2011.6039697"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.07.002"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-74325-7_5"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CSCS.2019.00018"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2016.32"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3078381"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2983911"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2013.22"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SAI.2014.6918252"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.02.008"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/s20185305"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/QSHINE.2014.6928673"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2409775"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2728681"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISMS.2010.11"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-010-9165-x"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2018.5258"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05918-7_20"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ARGENCON.2016.7585247"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP.2017.7946998"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2017.2772792"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.07.025"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02271-w"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.09.004"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-019-0038-7"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-023-09943-8"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.measen.2023.100827"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-022-07412-1"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3158468"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.12783\/dtcse\/cnai2018\/24149"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2015.1031082"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1002\/9781119723950.ch20"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.03.018"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/FAS-W.2019.00047"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3168446"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2010.5542603"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2016.7568529"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2016.11"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.233"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/icste.2010.5608747"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICINFA.2010.5512396"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.06.005"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.11.005"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-014-0858-z"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32258-8_59"},{"key":"ref55","volume-title":"Using machine learning to guide automated intrusion response","author":"Lopes","year":"2020"},{"key":"ref56","article-title":"Developing Attack Defense Ideas for Ad Hoc Wireless Networks","volume-title":"2nd International Workshop on Dependable Network Computing and Mobile Systems (DNCMS 2009)(in Conjunction with IEEE SRDS 2009)","author":"Oliveira","year":"2009"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSC.2008.4525297"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICACA.2016.7887940"},{"key":"ref59","volume-title":"Game-theoretic intrusion response and recovery","author":"Zonouz","year":"2011"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3015042"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/179839"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-012-0127-9"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2006.376981"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2009.5069450"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3232848"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/CSSE.2008.1651"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2912114"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLC.2004.1382066"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102359"},{"issue":"4","key":"ref70","first-page":"55","article-title":"FIRE: Fuzzy-logic based theoretic intrusion response and recovery engine","volume":"3","author":"Irugu","year":"2015","journal-title":"Int. J. Comput. Sci. Trends Technol"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.05.004"},{"issue":"3","key":"ref72","first-page":"471","article-title":"Contextual fuzzy cognitive map for intrusion response system","volume":"2","author":"Zaghdoud","year":"2013","journal-title":"Computer (Long Beach Calif)"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.02.139"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9149083"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2009.5202379"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/1082473.1082513"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/iciea.2006.257117"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/s1571-0661(04)80336-0"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/cacwd.2004.1349044"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/iccnmc.2001.962615"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/kamw.2008.4810553"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/icnc47757.2020.9049740"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2009.070536"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.03.012"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/mue.2007.81"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/icn.2007.92"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/wi-iatw.2006.41"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/icinfa.2008.4608295"},{"key":"ref89","first-page":"18932","article-title":"Revisiting deep learning models for tabular data","volume":"34","author":"Gorishniy","year":"2021","journal-title":"Adv Neural Inf Process Syst"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-14-106"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1145\/3178582"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.32614\/cran.package.xgboost"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/FNWF63303.2024.11028740"}],"event":{"name":"2025 IEEE 7th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)","location":"Pittsburgh, PA, USA","start":{"date-parts":[[2025,11,12]]},"end":{"date-parts":[[2025,11,14]]}},"container-title":["2025 IEEE 7th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11410113\/11410157\/11410417.pdf?arnumber=11410417","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T07:18:09Z","timestamp":1772608689000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11410417\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,12]]},"references-count":94,"URL":"https:\/\/doi.org\/10.1109\/tps-isa67132.2025.00041","relation":{},"subject":[],"published":{"date-parts":[[2025,11,12]]}}}