{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:17:49Z","timestamp":1761808669715,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,20]],"date-time":"2023-10-20T00:00:00Z","timestamp":1697760000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,20]]},"DOI":"10.1145\/3650400.3650693","type":"proceedings-article","created":{"date-parts":[[2024,4,17]],"date-time":"2024-04-17T08:33:18Z","timestamp":1713342798000},"page":"1760-1765","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Penetration Test Path Discovery Based on NHSC-PPO"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-9926-2218","authenticated-orcid":false,"given":"Fang","family":"Li","sequence":"first","affiliation":[{"name":"Guilin University of Electronic Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-8434-8300","authenticated-orcid":false,"given":"Xueyan","family":"Wang","sequence":"additional","affiliation":[{"name":"Guilin University of Electronic Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6487-7595","authenticated-orcid":false,"given":"Yining","family":"Liu","sequence":"additional","affiliation":[{"name":"Guilin University of Electronic Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-2039-9839","authenticated-orcid":false,"given":"Li","family":"Luo","sequence":"additional","affiliation":[{"name":"Guilin University of Electronic Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2024,4,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/LISAT.2018.8378035"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.11999\/JEIT191056"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","unstructured":"Schwartz J. & Kurniawati H. 2019. Autonomous penetration testing using reinforcement learning. arXiv preprint arXiv:1905.05965. https:\/\/doi.org\/10.48550\/arXiv.1905.05965.","DOI":"10.48550\/arXiv.1905.05965"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251398.1251406"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","unstructured":"Durkota K. & Lis\u00fd V. 2014. Computing Optimal Policies for Attack Graphs with Action Failures and Costs. In STAIRS (pp. 101-110). doi:10.3233\/978-1-61499-421-3-101.","DOI":"10.3233\/978-1-61499-421-3-101"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","unstructured":"Mantha B. R. Jung Y. & Garcia De Soto B. 2020. Implementation of the common vulnerability scoring system to assess the cyber vulnerability in construction projects. In Creative Construction e-Conference 2020 (pp. 117-124). https:\/\/doi.org\/10.3311\/CCC2020-030.","DOI":"10.3311\/CCC2020-030"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2743240"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW51379.2020.00010"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","unstructured":"Schulman J. Wolski F. Dhariwal P. Radford A. & Klimov O. 2017. Proximal policy optimization algorithms. arXiv preprint arXiv:1707.06347. https:\/\/doi.org\/10.48550\/arXiv.1707.06347.","DOI":"10.48550\/arXiv.1707.06347"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.11896\/jsjkx.210400057"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS54207.2022.9789835"}],"event":{"name":"EITCE 2023: 2023 7th International Conference on Electronic Information Technology and Computer Engineering","acronym":"EITCE 2023","location":"Xiamen China"},"container-title":["Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650400.3650693","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3650400.3650693","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T05:01:13Z","timestamp":1755752473000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650400.3650693"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,20]]},"references-count":11,"alternative-id":["10.1145\/3650400.3650693","10.1145\/3650400"],"URL":"https:\/\/doi.org\/10.1145\/3650400.3650693","relation":{},"subject":[],"published":{"date-parts":[[2023,10,20]]},"assertion":[{"value":"2024-04-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}