Kirmani, F., Unni, A. S., Kulkarni, V. P., Lackey, K. & Rose, J. R. Detecting polar ring galaxies via deep learning. RAS Tech. Instrum. https://doi.org/10.1093/rasti/rzaf043 (2025).

Article 

Google Scholar
 

Miller, E. et al. Classifying cyber ranges: A case-based analysis using the UWF cyber range. Encyclopedia 5, 162. https://doi.org/10.3390/encyclopedia5040162 (2025).

Article 

Google Scholar
 

Chouliaras, N. et al. Cyber ranges and testbeds for education, training, and research. Appl. Sci. 11, 1809. https://doi.org/10.3390/app11041809 (2021).

Article 
CAS 

Google Scholar
 

Stamatopoulos, D. et al. Exploring the architectural composition of cyber ranges: A systematic review. Future Internet 16, 231. https://doi.org/10.3390/fi16070231 (2024).

Article 

Google Scholar
 

Kirmani, S. & Raghavan, P. Scalable parallel graph partitioning. In Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis (SC ’13), 1–10 (2013). https://doi.org/10.1145/2503210.2503280

Alyami, H. et al. Analyzing the data of software security life-span: Quantum computing era. Intell. Autom. Soft Comput. https://doi.org/10.32604/iasc.2022.020780 (2022).

Article 

Google Scholar
 

Lateș, I. & Boja, C. Cyber range as a competency based education instrument in cyber security. In 8th BASIQ International Conference on New Trends in Sustainable Business and Consumption, 703–710 (2022).

Wooldridge, M. An Introduction to MultiAgent Systems 2nd edn (Wiley, 2009).

Nadeem, M. et al. Evaluating the factors of CGTMSE scheme in bank by using fuzzy AHP. In 2023 6th International Conference on Contemporary Computing and Informatics (IC3I), 56–61 (2023). https://doi.org/10.1109/IC3I59117.2023.10397669

Cai, J. et al. An overview of security threats, attack detection and defense for large-scale multi-agent systems in IoT. IEEE Trans. Ind. Cyber-Phys. Syst. 3, 70–81. https://doi.org/10.1109/TICPS.2024.3514552 (2025).

Article 

Google Scholar
 

Hu, Z., Chen, P., Zhu, M. & Liu, P. Reinforcement learning for adaptive cyber defense against zero-day attacks. In Lecture Notes in Computer Science 11830 54–93 (Springer, 2019). https://doi.org/10.1007/978-3-030-30719-6_4.

Chapter 

Google Scholar
 

Kirmani, F., Lane, B. J. & Rose, J. R. Exploring machine learning techniques to improve peptide identification. In 2019 IEEE 19th International Conference on Bioinformatics and Bioengineering (BIBE), 66–71 (2019). https://doi.org/10.1109/BIBE.2019.00021

Nadeem, M. Analyze quantum security in software design using fuzzy-AHP. Int. J. Inf. Technol. https://doi.org/10.1007/s41870-024-02002-w (2024).

Article 

Google Scholar
 

Guo, Y., Wang, L., Liu, Z. & Shen, Y. Reinforcement-learning-based dynamic defense strategy of multistage game against dynamic load altering attack. Int. J. Electr. Power Energy Syst. 131, 107113 (2021).

Article 

Google Scholar
 

Zhang, T., Tang, X., Kang, J. & Xu, C. AI-driven moving target defense for VANETs: Route mutation via multiagent reinforcement learning. In Moving Target Defense Based on Artificial Intelligence 81–105 (Springer, 2025). https://doi.org/10.1007/978-981-95-0615-6_5.

Chapter 

Google Scholar
 

Waizel, G. Bridging the AI divide: The evolving arms race between AI-driven cyber attacks and AI-powered cybersecurity defenses. In Machine Intelligence & Security for Smart Cities (TRUST), 141–156 (2024).

Choi, I. S., Hong, J. & Kim, T. W. Multi-agent based cyber attack detection and mitigation for distribution automation system. IEEE Access 8, 183495–183504 (2020).

Article 

Google Scholar
 

Jiang, H., Choi, T., Ko, R. K. & Pandora, A cyber range environment for the safe testing and deployment of autonomous cyber attack tools. In Security in Computing and Communication 1–20 (Springer, 2020).


Google Scholar
 

Sharafaldin, I., Lashkari, A. H. & Ghorbani, A. A. Toward generating a new intrusion detection dataset and intrusion traffic characterization. In Proceedings of ICISSP, 108–116 (2018). https://doi.org/10.5220/0006634301080116

Moustafa, N. & Slay, J. UNSW-NB15: A comprehensive data set for network intrusion detection systems. In MilCIS, 1–6 (2015). https://doi.org/10.1109/MilCIS.2015.7348942

Admass, W. S., Munaye, Y. Y. & Diro, A. A. Cyber security: State of the art, challenges and future directions. Cyber Secur. Appl. 2, 100031. https://doi.org/10.1016/j.csa.2023.100031 (2024).

Article 

Google Scholar
 

Katsantonis, M. N. et al. Cyber range design framework for cyber security education and training. Int. J. Inf. Secur. 22, 1005–1027 (2023).

Article 

Google Scholar
 

Leitner, M. et al. AIT cyber range: Flexible cyber security environment for exercises, training and research. In European Interdisciplinary Cybersecurity Conference, 1–6 (2020).

Kirmani, S., Park, J. & Raghavan, P. An embedded sectioning scheme for multiprocessor topology-aware mapping of irregular applications. Int. J. High Perform. Comput. Appl. 31, 91–103. https://doi.org/10.1177/1094342015597082 (2017).

Article 

Google Scholar
 

Kirmani, S., Sun, H. & Raghavan, P. A scalability and sensitivity study of parallel geometric algorithms for graph partitioning. In 2018 30th International Symposium on Computer Architecture and High Performance Computing (SBAC-PAD), 420–427 (2018). https://doi.org/10.1109/CAHPC.2018.8645916

Zhang, J. et al. Springer,. A survey of cyber range: Current status, analysis, and future trends. In International Conference on Network Simulation and Evaluation, 88–101 (2023).

Shin, Y., Kwon, H., Jeong, J. & Shin, D. A study on designing cyber training and cyber range to effectively respond to cyber threats. Electronics 13, 3867 (2024).

Article 

Google Scholar
 

Mills, A., White, J. & Legg, P. GoibhniUWE: A lightweight and modular container-based cyber range. Journal of Cybersecurity and Privacy 4, 615–628 (2024).

Article 

Google Scholar
 

Kirmani, F., Lane, B. & Rose, J. Identifying proteotypic peptides via deep learning. In Proceedings of the 11th International Conference on Bioinformatics Research and Applications, 42–47 (2025). https://doi.org/10.1145/3700666.3700691

Tyler, J. et al. Exposing, formalizing and reasoning over the latent semantics of tags in multimodal data sources. Appl. Ontol. 8, 95–130. https://doi.org/10.3233/AO-130124 (2013).

Article 

Google Scholar
 

Chadha, R. et al. CyberVAN: A cyber security virtual assured network testbed. In MILCOM, 1125–1130 (2016). https://doi.org/10.1109/MILCOM.2016.7795481

Popoola, D., Bhattacharya, S., & Govindarasu, M. CySIDER Cybersecurity situational intelligence framework for DER networks. In Resilience Week (RWS), 1–10 (2025). https://doi.org/10.1109/RWS66711.2025.11304446

Tian, J. & Zhu, Q. Reinforcement learning for cybersecurity: A review. Computers & Security 106, 102280 (2021).


Google Scholar
 

Aberkane, S. & Elarbi-Boudihir, M. Deep reinforcement learning-based anomaly detection for video surveillance. Informatica 46 (2022).

Bharadiya, J. Machine learning in cybersecurity: Techniques and challenges. Eur. J. Technol. 7, 1–14 (2023).

Article 

Google Scholar
 

Terranova, F., Lahmadi, A. & Chrisment, I. Scalable and generalizable RL agents for attack path discovery via continuous invariant spaces. In 28th International Symposium on Research in Attacks, Intrusions and Defenses (RAID) (2025).

Chenghai, W., Kaiyu, O. & Jiying, W. Multi-agent based information warfare system modeling and simulation. In IEEE CSAA Guidance, Navigation and Control Conference (CGNCC), 1–7 (2018).

Kirmani, S. & Shankar, M. Generating keywords by associative context with input words. Google Patents (2022).

Mishra, A., Kirmani, S. & Madduri, K. Fast spectral graph layout on multicore platforms. In Proceedings of the ACM International Conference on Supercomputing (2020). https://doi.org/10.1145/3404397.3404471

Bougueroua, N. et al. A survey on multi-agent based collaborative intrusion detection systems. J. Artif. Intell. Soft Comput. Res. 11, 111–142 (2021).

Article 

Google Scholar
 

Zhang, Z. et al. Psysafe: A comprehensive framework for psychological-based attack, defense, and evaluation of multi-agent system safety. In Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics, 15202–15231 (2024).

Nelson, A., Rekhi, S., Souppaya, M. & Scarfone, K. Incident response recommendations and considerations for cybersecurity risk management: A CSF 2.0 community profile. NIST Special Publication 800 − 61 Rev. 3. https://doi.org/10.6028/NIST.SP.800-61r3 (2025).

Kirmani, S. & Madduri, K. Spectral graph drawing: Building blocks and performance analysis. In 2018 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), 269–277 (2018). https://doi.org/10.1109/IPDPSW.2018.00053

Upadhyay, S. et al. Application of reinforcement learning in adaptive cyber defence mechanism. In Lecture Notes in Networks and Systems 1287, 443–455 (Springer, 2025). https://doi.org/10.1007/978-981-96-3284-8_33.

Alauthman, M. et al. Reinforcement learning for adaptive cyber defense training autonomous systems for dynamic threat response and strategy optimization. In AI-Driven Security Systems and Intelligent Threat Response Using Autonomous Cyber Defense, 209–234 (IGI Global, 2025).

Hammad, A. & Tarik, J. F. Adaptive cyber defense using advanced deep reinforcement learning algorithms: A real-time comparative analysis. J. Comput. Theor. Appl. 2, 523–535 (2025).

Article 

Google Scholar
 

Chen, J. et al. Defending against APT attacks in cloud computing environments using grouped multiagent deep reinforcement learning. IEEE Internet Things J. 12, 19459–19470. https://doi.org/10.1109/JIOT.2025.3542119 (2025).

Article 

Google Scholar
 

Verma, S. AI-driven autonomous incident response: Revolutionizing cybersecurity operations with real-time threat mitigation. Int. J. Commun. Networks Inf. Secur. 17, 69–78 (2025).


Google Scholar
 

Rebet, J. AI automated incident response and threat mitigation using AI. In Revolutionizing Cybersecurity With Deep Learning and Large Language Models 201–236 (2025).


Google Scholar
 

Omar, M. et al. (eds) Integrating Artificial Intelligence in Cybersecurity and Forensic Practices (IGI Global, 2025). https://doi.org/10.4018/979-8-3373-0588-2.

Al-Thani, G. M. The AIM-PRISM framework: A novel strategic model for machine learning and artificial intelligence deployment in national infrastructure cybersecurity. Adv. Artif. Intell. Mach. Learn. 5, 4053–4073 (2025).


Google Scholar
 

Sharafaldin, I., Habibi Lashkari, A. & Ghorbani, A. A. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization. In Proceedings of the 4th International Conference on Information Systems Security and Privacy, Funchal, 22–24 January 2018, 108–116 (2018). https://doi.org/10.5220/0006639801080116