{"id":"https://openalex.org/W4385574807","doi":"https://doi.org/10.1109/mim.2023.10208253","title":"Whole Campaign Emulation with Reinforcement Learning for Cyber Test","display_name":"Whole Campaign Emulation with Reinforcement Learning for Cyber Test","publication_year":2023,"publication_date":"2023-08-01","ids":{"openalex":"https://openalex.org/W4385574807","doi":"https://doi.org/10.1109/mim.2023.10208253"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/mim.2023.10208253","pdf_url":null,"source":{"id":"https://openalex.org/S121167460","display_name":"IEEE Instrumentation & Measurement Magazine","issn_l":"1094-6969","issn":["1094-6969","1941-0123"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007842569","display_name":"Tyler Cody","orcid":"https://orcid.org/0000-0001-9215-5816"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tyler Cody","raw_affiliation_strings":["Intelligent Systems Division, Virginia Tech National Security Institute, Arlington, Virginia, USA"],"affiliations":[{"raw_affiliation_string":"Intelligent Systems Division, Virginia Tech National Security Institute, Arlington, Virginia, USA","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003634841","display_name":"Emma Meno","orcid":null},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Emma Meno","raw_affiliation_strings":["Intelligent Systems Division, Virginia Tech National Security Institute, Arlington, Virginia, USA"],"affiliations":[{"raw_affiliation_string":"Intelligent Systems Division, Virginia Tech National Security Institute, Arlington, Virginia, USA","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056670558","display_name":"Peter A. Beling","orcid":"https://orcid.org/0000-0003-2196-6982"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Peter Beling","raw_affiliation_strings":["Grado Department of Industrial and Systems Engineering, Virginia Tech, USA","Intelligent Systems Division, Virginia Tech National Security Institute, Arlington, Virginia, USA"],"affiliations":[{"raw_affiliation_string":"Intelligent Systems Division, Virginia Tech National Security Institute, Arlington, Virginia, USA","institution_ids":["https://openalex.org/I859038795"]},{"raw_affiliation_string":"Grado Department of Industrial and Systems Engineering, Virginia Tech, USA","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086478762","display_name":"Laura E. Beane Freeman","orcid":"https://orcid.org/0000-0003-1294-4124"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Laura Freeman","raw_affiliation_strings":["Virginia Tech National Security Institute, Arlington, Virginia, USA"],"affiliations":[{"raw_affiliation_string":"Virginia Tech National Security Institute, Arlington, Virginia, USA","institution_ids":["https://openalex.org/I859038795"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":4.033,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.761498,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":88,"max":91},"biblio":{"volume":"26","issue":"5","first_page":"25","last_page":"30"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information Security Policy Compliance and Awareness","score":0.9991,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information Security Policy Compliance and Awareness","score":0.9991,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Characterization and Detection of Android Malware","score":0.9977,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Automated Software Testing Techniques","score":0.9926,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/automated-testing","display_name":"Automated Testing","score":0.534322},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security Analysis","score":0.505279},{"id":"https://openalex.org/keywords/prosperity","display_name":"Prosperity","score":0.4666156},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.45646492}],"concepts":[{"id":"https://openalex.org/C149810388","wikidata":"https://www.wikidata.org/wiki/Q5374873","display_name":"Emulation","level":2,"score":0.8568831},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.70309794},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6390172},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5604279},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.540341},{"id":"https://openalex.org/C2776554220","wikidata":"https://www.wikidata.org/wiki/Q1760011","display_name":"Prosperity","level":2,"score":0.4666156},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.45646492},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3637886},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.3625812},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/mim.2023.10208253","pdf_url":null,"source":{"id":"https://openalex.org/S121167460","display_name":"IEEE Instrumentation & Measurement Magazine","issn_l":"1094-6969","issn":["1094-6969","1941-0123"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[{"funder":"https://openalex.org/F4320306078","funder_display_name":"U.S. Department of Defense","award_id":"HQ003419D0003"},{"funder":"https://openalex.org/F4320316158","funder_display_name":"Systems Engineering Research Center","award_id":null},{"funder":"https://openalex.org/F4320316408","funder_display_name":"Stevens Institute of Technology","award_id":null}],"datasets":[],"versions":[],"referenced_works_count":10,"referenced_works":["https://openalex.org/W2144472595","https://openalex.org/W2539955859","https://openalex.org/W3194526190","https://openalex.org/W3194625192","https://openalex.org/W3199303841","https://openalex.org/W4297098541","https://openalex.org/W4308527971","https://openalex.org/W4309675179","https://openalex.org/W4312284197","https://openalex.org/W4360764871"],"related_works":["https://openalex.org/W4390466743","https://openalex.org/W4388712696","https://openalex.org/W3189241911","https://openalex.org/W3144844674","https://openalex.org/W2514561108","https://openalex.org/W2373224681","https://openalex.org/W2372773672","https://openalex.org/W2372081361","https://openalex.org/W2364724682","https://openalex.org/W2348361849"],"abstract_inverted_index":{"Cyber-attacks":[0],"pose":[1],"existential,":[2],"nation-level":[3],"threats":[4],"and":[5,18,27,34,42,55,110,138],"directly":[6],"challenge":[7,108],"societal":[8],"stability.":[9],"The":[10],"breadth":[11],"of":[12,21,46,78,101],"targets":[13],"(small":[14],"businesses":[15],"to":[16,31,71,85,136],"nation-states)":[17],"continuous":[19],"nature":[20],"cyber-attacks":[22],"make":[23],"automated":[24,69,113,130],"cyber":[25,47,52],"test":[26,53],"evaluation":[28],"(T&E)":[29],"crucial":[30],"national":[32],"security":[33],"domestic":[35],"prosperity.":[36],"Importantly,":[37],"automation":[38],"lowers":[39],"the":[40,44,81,126,144],"cost":[41],"increases":[43],"frequency":[45],"T&E,":[48],"thereby":[49],"simultaneously":[50],"increasing":[51],"availability":[54],"coverage.":[56],"Spurred":[57],"by":[58],"market":[59],"demand":[60],"as":[61,63,106],"well":[62],"advancements":[64],"in":[65,80,128],"artificial":[66],"intelligence":[67],"(AI),":[68],"approaches":[70],"penetration":[72,114,131],"testing":[73,115],"have":[74],"seen":[75],"a":[76,92,99,107,140],"resurgence":[77],"interest":[79],"academic":[82],"literature.":[83],"Yet":[84],"date,":[86],"this":[87,122],"burgeoning":[88],"research":[89],"community":[90],"lacks":[91],"shared,":[93],"long-term":[94],"vision.":[95],"Recently,":[96],"we":[97,124],"proposed":[98],"concept":[100],"whole":[102],"campaign":[103],"emulation":[104],"(WCE)":[105],"problem":[109],"framework":[111],"for":[112],"with":[116],"reinforcement":[117],"learning":[118],"(RL)":[119],"[1].":[120],"In":[121],"article,":[123],"review":[125],"state-of-the-art":[127],"RL-based":[129],"testing,":[132],"assess":[133],"its":[134],"relation":[135],"WCE,":[137],"provide":[139],"case":[141],"study":[142],"using":[143],"open-source":[145],"Network":[146],"Attack":[147],"Simulator":[148],"(NASim)":[149],"[2].":[150]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4385574807","counts_by_year":[{"year":2024,"cited_by_count":4}],"updated_date":"2024-12-03T12:26:50.689557","created_date":"2023-08-05"}