{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T11:00:53Z","timestamp":1777892453543,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T00:00:00Z","timestamp":1653868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"The Defence and Security Programme at The Alan Turing Institute funded by the Government Communications Headquarters (GCHQ)."}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,30]]},"DOI":"10.1145\/3488932.3527286","type":"proceedings-article","created":{"date-parts":[[2022,5,24]],"date-time":"2022-05-24T04:23:26Z","timestamp":1653366206000},"page":"1252-1254","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":36,"title":["Autonomous Network Defence using Reinforcement Learning"],"prefix":"10.1145","author":[{"given":"Myles","family":"Foley","sequence":"first","affiliation":[{"name":"Imperial College London, London, United Kingdom"}]},{"given":"Chris","family":"Hicks","sequence":"additional","affiliation":[{"name":"The Alan Turing Institute, London, United Kingdom"}]},{"given":"Kate","family":"Highnam","sequence":"additional","affiliation":[{"name":"The Alan Turing Institute, Imperial College London, London, United Kingdom"}]},{"given":"Vasilios","family":"Mavroudis","sequence":"additional","affiliation":[{"name":"The Alan Turing Institute, London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2022,5,30]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"IJCAI-21 1st International Workshop on Adaptive Cyber Defense.","author":"CAGE.","year":"2021","unstructured":"CAGE. 2021 . CAGE Challenge 1 . In IJCAI-21 1st International Workshop on Adaptive Cyber Defense. CAGE. 2021. CAGE Challenge 1. In IJCAI-21 1st International Workshop on Adaptive Cyber Defense."},{"key":"e_1_3_2_2_2_1","volume-title":"IMPALA: Scalable Distributed Deep-RL with Importance Weighted Actor-Learner Architectures. arXiv:1802.01561 [cs].","author":"Espeholt L.","year":"2018","unstructured":"L. Espeholt , H. Soyer , R. Munos , K. Simonyan , V. Mnih , T. Ward , Y. Doron , V. Firoiu , T. Harley , I. Dunning , S. Legg , and K. Kavukcuoglu . 2018 . IMPALA: Scalable Distributed Deep-RL with Importance Weighted Actor-Learner Architectures. arXiv:1802.01561 [cs]. L. Espeholt, H. Soyer, R. Munos, K. Simonyan, V. Mnih, T. Ward, Y. Doron, V. Firoiu, T. Harley, I. Dunning, S. Legg, and K. Kavukcuoglu. 2018. IMPALA: Scalable Distributed Deep-RL with Importance Weighted Actor-Learner Architectures. arXiv:1802.01561 [cs]."},{"key":"e_1_3_2_2_3_1","unstructured":"OpenAI et al. 2019. Dota 2 with Large Scale Deep Reinforcement Learning. arXiv:1912.06680 [cs stat].  OpenAI et al. 2019. Dota 2 with Large Scale Deep Reinforcement Learning. arXiv:1912.06680 [cs stat]."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"crossref","unstructured":"M. Feng and H. Xu. 2017. Deep reinforecement learning based optimal defense for cyber-physical system in presence of unknown cyber-attack. In 2017 IEEE Symposium Series on Computational Intelligence (SSCI). IEEE.  M. Feng and H. Xu. 2017. Deep reinforecement learning based optimal defense for cyber-physical system in presence of unknown cyber-attack. In 2017 IEEE Symposium Series on Computational Intelligence (SSCI). IEEE.","DOI":"10.1109\/SSCI.2017.8285298"},{"key":"e_1_3_2_2_5_1","unstructured":"D. Horgan J. Quan D. Budden G. Barth-Maron M. Hessel H. van Hasselt and D. Silver. 2018. Distributed Prioritized Experience Replay. In arXiv:1803.00933 [cs].  D. Horgan J. Quan D. Budden G. Barth-Maron M. Hessel H. van Hasselt and D. Silver. 2018. Distributed Prioritized Experience Replay. In arXiv:1803.00933 [cs]."},{"key":"e_1_3_2_2_6_1","volume-title":"Automated Penetration Testing Using Deep Reinforcement Learning. In 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&P W).","author":"Hu Z.","unstructured":"Z. Hu , R. Beuran , and Y. Tan . 2020 . Automated Penetration Testing Using Deep Reinforcement Learning. In 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&P W). Z. Hu, R. Beuran, and Y. Tan. 2020. Automated Penetration Testing Using Deep Reinforcement Learning. In 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&P W)."},{"key":"e_1_3_2_2_8_1","volume-title":"Proceedings of the 35th International Conference on Machine Learning (ICML'18)","author":"Liang E.","unstructured":"E. Liang , R. Liaw , P. Moritz , R. Nishihara , R. Fox , K. Goldberg , J E. Gonzalez , M I. Jordan , and I. Stoica . 2018. RLlib: Abstractions for Distributed Reinforcement Learning . In Proceedings of the 35th International Conference on Machine Learning (ICML'18) . E. Liang, R. Liaw, P. Moritz, R. Nishihara, R. Fox, K. Goldberg, J E. Gonzalez, M I. Jordan, and I. Stoica. 2018. RLlib: Abstractions for Distributed Reinforcement Learning. In Proceedings of the 35th International Conference on Machine Learning (ICML'18)."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3121870"},{"key":"e_1_3_2_2_10_1","volume-title":"Proceedings of the 34th International Conference on Machine Learning (ICML'17)","author":"Pathak D.","unstructured":"D. Pathak , P. Agrawal , Alexei A. Efros , and T. Darrell . 2017. Curiosity-Driven Exploration by Self-Supervised Prediction . In Proceedings of the 34th International Conference on Machine Learning (ICML'17) . D. Pathak, P. Agrawal, Alexei A. Efros, and T. Darrell. 2017. Curiosity-Driven Exploration by Self-Supervised Prediction. In Proceedings of the 34th International Conference on Machine Learning (ICML'17)."},{"key":"e_1_3_2_2_11_1","unstructured":"J. Schulman F. Wolski P. Dhariwal A. Radford and O. Klimov. 2017. Proximal Policy Optimization Algorithms. In arXiv:1707.06347 [cs].  J. Schulman F. Wolski P. Dhariwal A. Radford and O. Klimov. 2017. Proximal Policy Optimization Algorithms. In arXiv:1707.06347 [cs]."},{"key":"e_1_3_2_2_12_1","volume-title":"Proceedings of the 34th ACM\/SIGAPP Symposium on Applied Computing (SAC '19)","author":"Speicher P.","unstructured":"P. Speicher , M. Steinmetz , J. Hoffmann , M. Backes , and R. Kunnemann . 2019. Towards automated network mitigation analysis . In Proceedings of the 34th ACM\/SIGAPP Symposium on Applied Computing (SAC '19) . P. Speicher, M. Steinmetz, J. Hoffmann, M. Backes, and R. Kunnemann. 2019. Towards automated network mitigation analysis. In Proceedings of the 34th ACM\/SIGAPP Symposium on Applied Computing (SAC '19)."},{"key":"e_1_3_2_2_13_1","unstructured":"M. Standen D. Bowman S. Hoang T. Richer M. Lucas and R. Van Tassel. 2021 a. Cyber Autonomy Gym for Experimentation Challenge 1. https:\/\/github.com\/cage-challenge\/cage-challenge-1.  M. Standen D. Bowman S. Hoang T. Richer M. Lucas and R. Van Tassel. 2021 a. Cyber Autonomy Gym for Experimentation Challenge 1. https:\/\/github.com\/cage-challenge\/cage-challenge-1."},{"key":"e_1_3_2_2_14_1","volume-title":"CybORG: A Gym for the Development of Autonomous Cyber Agents. In IJCAI-21 1st International Workshop on Adaptive Cyber Defense.","author":"Standen M.","unstructured":"M. Standen , M. Lucas , David B., T J. Richer , J. Kim , and D. Marriott . 2021 b . CybORG: A Gym for the Development of Autonomous Cyber Agents. In IJCAI-21 1st International Workshop on Adaptive Cyber Defense. M. Standen, M. Lucas, David B., T J. Richer, J. Kim, and D. Marriott. 2021 b. CybORG: A Gym for the Development of Autonomous Cyber Agents. In IJCAI-21 1st International Workshop on Adaptive Cyber Defense."},{"key":"e_1_3_2_2_15_1","volume-title":"Reinforcement Learning: An Introduction","author":"Sutton R S.","year":"2018","unstructured":"R S. Sutton and A G. Barto . 2018 . Reinforcement Learning: An Introduction 2 nd ed.). R S. Sutton and A G. Barto. 2018. Reinforcement Learning: An Introduction 2nd ed.).","edition":"2"}],"event":{"name":"ASIA CCS '22: ACM Asia Conference on Computer and Communications Security","location":"Nagasaki Japan","acronym":"ASIA CCS '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488932.3527286","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3488932.3527286","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:27Z","timestamp":1750188687000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488932.3527286"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,30]]},"references-count":14,"alternative-id":["10.1145\/3488932.3527286","10.1145\/3488932"],"URL":"https:\/\/doi.org\/10.1145\/3488932.3527286","relation":{},"subject":[],"published":{"date-parts":[[2022,5,30]]},"assertion":[{"value":"2022-05-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}