{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T00:17:52Z","timestamp":1768349872187,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1422594,CNS-1505664"],"award-info":[{"award-number":["CNS-1422594,CNS-1505664"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-13-1-0421"],"award-info":[{"award-number":["W911NF-13-1-0421"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research","doi-asserted-by":"publisher","award":["W911NF1210055"],"award-info":[{"award-number":["W911NF1210055"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3140549.3140556","type":"proceedings-article","created":{"date-parts":[[2017,10,31]],"date-time":"2017-10-31T12:31:37Z","timestamp":1509453097000},"page":"99-109","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Online Algorithms for Adaptive Cyber Defense on Bayesian Attack Graphs"],"prefix":"10.1145","author":[{"given":"Zhisheng","family":"Hu","sequence":"first","affiliation":[{"name":"Pennsylvania State University, University Park, PA, USA"}]},{"given":"Minghui","family":"Zhu","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, University Park, PA, USA"}]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, University Park, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-247X(65)90154-X"},{"key":"e_1_3_2_1_2_1","unstructured":"Richard E. Bellman. 2003. Dynamic Programming. Dover Publications.  Richard E. Bellman. 2003. Dynamic Programming. Dover Publications."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1515\/9781400874651"},{"key":"e_1_3_2_1_4_1","unstructured":"Dimitri P. Bertsekas and John N. Tsitsiklis. 1996. Neuro-Dynamic Programming (1st ed.). Athena Scientific.  Dimitri P. Bertsekas and John N. Tsitsiklis. 1996. Neuro-Dynamic Programming (1st ed.). Athena Scientific."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813691"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the Twelfth National Conference on Artificial Intelligence (Vol. 2) (AAAI'94)","author":"Cassandra Anthony R."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24174-6_4"},{"key":"e_1_3_2_1_8_1","unstructured":"CVE-2014-0160. 2014. Heartbleed Bug. https:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2014-0160. (2014).  CVE-2014-0160. 2014. Heartbleed Bug. https:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2014-0160. (2014)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13841-1_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663755"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIC.2016.027"},{"key":"e_1_3_2_1_12_1","unstructured":"Zhisheng Hu Minghui Zhu Ping Chen and Peng Liu. 2016. On convergence rates of robust adaptive game theoretic learning algorithms. ArXiv e-prints (Dec. 2016). arXiv:math.OC\/1612.04724 https:\/\/arxiv.org\/abs\/1612.04724.  Zhisheng Hu Minghui Zhu Ping Chen and Peng Liu. 2016. On convergence rates of robust adaptive game theoretic learning algorithms. ArXiv e-prints (Dec. 2016). arXiv:math.OC\/1612.04724 https:\/\/arxiv.org\/abs\/1612.04724."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2008.295"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1046920.1088694"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2004.10.016"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.25"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.604240"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808475.2808482"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.28.1.1"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11379-1_20"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.34"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1002\/9780470316887"},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence (AAAI'12)","author":"Sarraute Carlos","year":"2012"},{"key":"e_1_3_2_1_24_1","unstructured":"Mike Schiffman. 2017. Common Vulnerability Scoring System (CVSS). (2017). http:\/\/www.first.org\/cvss.  Mike Schiffman. 2017. Common Vulnerability Scoring System (CVSS). (2017). http:\/\/www.first.org\/cvss."},{"key":"e_1_3_2_1_25_1","unstructured":"Mike Schiffman. 2017. Common Vulnerability Scoring System v3.0: Specification Document. (2017). https:\/\/www.first.org\/cvss\/cvss-v30-specification-v1.7.pdf.  Mike Schiffman. 2017. Common Vulnerability Scoring System v3.0: Specification Document. (2017). https:\/\/www.first.org\/cvss\/cvss-v30-specification-v1.7.pdf."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-012-9200-2"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1287\/opre.26.2.282"},{"key":"e_1_3_2_1_28_1","unstructured":"Symantec. 2015. Internet Security Threat Report. (2015). https:\/\/know.elq.symantec.com\/LP=1542.  Symantec. 2015. Internet Security Threat Report. (2015). https:\/\/know.elq.symantec.com\/LP=1542."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Christopher J. C. H. Watkins and Peter Dayan. 1992. Q-learning. In Machine Learning. 279--292.  Christopher J. C. H. Watkins and Peter Dayan. 1992. Q-learning. In Machine Learning. 279--292.","DOI":"10.1007\/BF00992698"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781412983617"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663474.2663486"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop (CSIIRW '13)","author":"Yu Lu"},{"key":"e_1_3_2_1_33_1","unstructured":"Emmanuele Zambon and Damiano Bolzoni. 2006. Network Intrusion Detection Systems: False Positive reduction through Anomaly Detection. (2006). http:\/\/www.blackhat.com\/presentations\/bh-usa-06\/BH-US-06-Zambon.pdf.  Emmanuele Zambon and Damiano Bolzoni. 2006. Network Intrusion Detection Systems: False Positive reduction through Anomaly Detection. (2006). http:\/\/www.blackhat.com\/presentations\/bh-usa-06\/BH-US-06-Zambon.pdf."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663474.2663481"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1137\/110843332"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2009.5399894"},{"key":"e_1_3_2_1_37_1","unstructured":"Quanyan Zhu Hamidou Tembine and Tamer Ba\u015far. 2013. Hybrid learning in stochastic games and its applications in network security. Reinforcement Learning and Approximate Dynamic Programming for Feedback Control (2013) 305--329.  Quanyan Zhu Hamidou Tembine and Tamer Ba\u015far. 2013. Hybrid learning in stochastic games and its applications in network security. Reinforcement Learning and Approximate Dynamic Programming for Feedback Control (2013) 305--329."}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 Workshop on Moving Target Defense"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3140549.3140556","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3140549.3140556","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3140549.3140556","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:21Z","timestamp":1750212681000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3140549.3140556"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":37,"alternative-id":["10.1145\/3140549.3140556","10.1145\/3140549"],"URL":"https:\/\/doi.org\/10.1145\/3140549.3140556","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}