Kirmani, F., Unni, A. S., Kulkarni, V. P., Lackey, K. & Rose, J. R. Detecting polar ring galaxies via deep learning. RAS Tech. Instrum. https://doi.org/10.1093/rasti/rzaf043 (2025).
Miller, E. et al. Classifying cyber ranges: A case-based analysis using the UWF cyber range. Encyclopedia 5, 162. https://doi.org/10.3390/encyclopedia5040162 (2025).
Chouliaras, N. et al. Cyber ranges and testbeds for education, training, and research. Appl. Sci. 11, 1809. https://doi.org/10.3390/app11041809 (2021).
Stamatopoulos, D. et al. Exploring the architectural composition of cyber ranges: A systematic review. Future Internet 16, 231. https://doi.org/10.3390/fi16070231 (2024).
Kirmani, S. & Raghavan, P. Scalable parallel graph partitioning. In Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis (SC ’13), 1–10 (2013). https://doi.org/10.1145/2503210.2503280
Alyami, H. et al. Analyzing the data of software security life-span: Quantum computing era. Intell. Autom. Soft Comput. https://doi.org/10.32604/iasc.2022.020780 (2022).
Lateș, I. & Boja, C. Cyber range as a competency based education instrument in cyber security. In 8th BASIQ International Conference on New Trends in Sustainable Business and Consumption, 703–710 (2022).
Wooldridge, M. An Introduction to MultiAgent Systems 2nd edn (Wiley, 2009).
Nadeem, M. et al. Evaluating the factors of CGTMSE scheme in bank by using fuzzy AHP. In 2023 6th International Conference on Contemporary Computing and Informatics (IC3I), 56–61 (2023). https://doi.org/10.1109/IC3I59117.2023.10397669
Cai, J. et al. An overview of security threats, attack detection and defense for large-scale multi-agent systems in IoT. IEEE Trans. Ind. Cyber-Phys. Syst. 3, 70–81. https://doi.org/10.1109/TICPS.2024.3514552 (2025).
Hu, Z., Chen, P., Zhu, M. & Liu, P. Reinforcement learning for adaptive cyber defense against zero-day attacks. In Lecture Notes in Computer Science 11830 54–93 (Springer, 2019). https://doi.org/10.1007/978-3-030-30719-6_4.
Kirmani, F., Lane, B. J. & Rose, J. R. Exploring machine learning techniques to improve peptide identification. In 2019 IEEE 19th International Conference on Bioinformatics and Bioengineering (BIBE), 66–71 (2019). https://doi.org/10.1109/BIBE.2019.00021
Nadeem, M. Analyze quantum security in software design using fuzzy-AHP. Int. J. Inf. Technol. https://doi.org/10.1007/s41870-024-02002-w (2024).
Guo, Y., Wang, L., Liu, Z. & Shen, Y. Reinforcement-learning-based dynamic defense strategy of multistage game against dynamic load altering attack. Int. J. Electr. Power Energy Syst. 131, 107113 (2021).
Zhang, T., Tang, X., Kang, J. & Xu, C. AI-driven moving target defense for VANETs: Route mutation via multiagent reinforcement learning. In Moving Target Defense Based on Artificial Intelligence 81–105 (Springer, 2025). https://doi.org/10.1007/978-981-95-0615-6_5.
Waizel, G. Bridging the AI divide: The evolving arms race between AI-driven cyber attacks and AI-powered cybersecurity defenses. In Machine Intelligence & Security for Smart Cities (TRUST), 141–156 (2024).
Choi, I. S., Hong, J. & Kim, T. W. Multi-agent based cyber attack detection and mitigation for distribution automation system. IEEE Access 8, 183495–183504 (2020).
Jiang, H., Choi, T., Ko, R. K. & Pandora, A cyber range environment for the safe testing and deployment of autonomous cyber attack tools. In Security in Computing and Communication 1–20 (Springer, 2020).
Sharafaldin, I., Lashkari, A. H. & Ghorbani, A. A. Toward generating a new intrusion detection dataset and intrusion traffic characterization. In Proceedings of ICISSP, 108–116 (2018). https://doi.org/10.5220/0006634301080116
Moustafa, N. & Slay, J. UNSW-NB15: A comprehensive data set for network intrusion detection systems. In MilCIS, 1–6 (2015). https://doi.org/10.1109/MilCIS.2015.7348942
Admass, W. S., Munaye, Y. Y. & Diro, A. A. Cyber security: State of the art, challenges and future directions. Cyber Secur. Appl. 2, 100031. https://doi.org/10.1016/j.csa.2023.100031 (2024).
Katsantonis, M. N. et al. Cyber range design framework for cyber security education and training. Int. J. Inf. Secur. 22, 1005–1027 (2023).
Leitner, M. et al. AIT cyber range: Flexible cyber security environment for exercises, training and research. In European Interdisciplinary Cybersecurity Conference, 1–6 (2020).
Kirmani, S., Park, J. & Raghavan, P. An embedded sectioning scheme for multiprocessor topology-aware mapping of irregular applications. Int. J. High Perform. Comput. Appl. 31, 91–103. https://doi.org/10.1177/1094342015597082 (2017).
Kirmani, S., Sun, H. & Raghavan, P. A scalability and sensitivity study of parallel geometric algorithms for graph partitioning. In 2018 30th International Symposium on Computer Architecture and High Performance Computing (SBAC-PAD), 420–427 (2018). https://doi.org/10.1109/CAHPC.2018.8645916
Zhang, J. et al. Springer,. A survey of cyber range: Current status, analysis, and future trends. In International Conference on Network Simulation and Evaluation, 88–101 (2023).
Shin, Y., Kwon, H., Jeong, J. & Shin, D. A study on designing cyber training and cyber range to effectively respond to cyber threats. Electronics 13, 3867 (2024).
Mills, A., White, J. & Legg, P. GoibhniUWE: A lightweight and modular container-based cyber range. Journal of Cybersecurity and Privacy 4, 615–628 (2024).
Kirmani, F., Lane, B. & Rose, J. Identifying proteotypic peptides via deep learning. In Proceedings of the 11th International Conference on Bioinformatics Research and Applications, 42–47 (2025). https://doi.org/10.1145/3700666.3700691
Tyler, J. et al. Exposing, formalizing and reasoning over the latent semantics of tags in multimodal data sources. Appl. Ontol. 8, 95–130. https://doi.org/10.3233/AO-130124 (2013).
Chadha, R. et al. CyberVAN: A cyber security virtual assured network testbed. In MILCOM, 1125–1130 (2016). https://doi.org/10.1109/MILCOM.2016.7795481
Popoola, D., Bhattacharya, S., & Govindarasu, M. CySIDER Cybersecurity situational intelligence framework for DER networks. In Resilience Week (RWS), 1–10 (2025). https://doi.org/10.1109/RWS66711.2025.11304446
Tian, J. & Zhu, Q. Reinforcement learning for cybersecurity: A review. Computers & Security 106, 102280 (2021).
Aberkane, S. & Elarbi-Boudihir, M. Deep reinforcement learning-based anomaly detection for video surveillance. Informatica 46 (2022).
Bharadiya, J. Machine learning in cybersecurity: Techniques and challenges. Eur. J. Technol. 7, 1–14 (2023).
Terranova, F., Lahmadi, A. & Chrisment, I. Scalable and generalizable RL agents for attack path discovery via continuous invariant spaces. In 28th International Symposium on Research in Attacks, Intrusions and Defenses (RAID) (2025).
Chenghai, W., Kaiyu, O. & Jiying, W. Multi-agent based information warfare system modeling and simulation. In IEEE CSAA Guidance, Navigation and Control Conference (CGNCC), 1–7 (2018).
Kirmani, S. & Shankar, M. Generating keywords by associative context with input words. Google Patents (2022).
Mishra, A., Kirmani, S. & Madduri, K. Fast spectral graph layout on multicore platforms. In Proceedings of the ACM International Conference on Supercomputing (2020). https://doi.org/10.1145/3404397.3404471
Bougueroua, N. et al. A survey on multi-agent based collaborative intrusion detection systems. J. Artif. Intell. Soft Comput. Res. 11, 111–142 (2021).
Zhang, Z. et al. Psysafe: A comprehensive framework for psychological-based attack, defense, and evaluation of multi-agent system safety. In Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics, 15202–15231 (2024).
Nelson, A., Rekhi, S., Souppaya, M. & Scarfone, K. Incident response recommendations and considerations for cybersecurity risk management: A CSF 2.0 community profile. NIST Special Publication 800 − 61 Rev. 3. https://doi.org/10.6028/NIST.SP.800-61r3 (2025).
Kirmani, S. & Madduri, K. Spectral graph drawing: Building blocks and performance analysis. In 2018 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), 269–277 (2018). https://doi.org/10.1109/IPDPSW.2018.00053
Upadhyay, S. et al. Application of reinforcement learning in adaptive cyber defence mechanism. In Lecture Notes in Networks and Systems 1287, 443–455 (Springer, 2025). https://doi.org/10.1007/978-981-96-3284-8_33.
Alauthman, M. et al. Reinforcement learning for adaptive cyber defense training autonomous systems for dynamic threat response and strategy optimization. In AI-Driven Security Systems and Intelligent Threat Response Using Autonomous Cyber Defense, 209–234 (IGI Global, 2025).
Hammad, A. & Tarik, J. F. Adaptive cyber defense using advanced deep reinforcement learning algorithms: A real-time comparative analysis. J. Comput. Theor. Appl. 2, 523–535 (2025).
Chen, J. et al. Defending against APT attacks in cloud computing environments using grouped multiagent deep reinforcement learning. IEEE Internet Things J. 12, 19459–19470. https://doi.org/10.1109/JIOT.2025.3542119 (2025).
Verma, S. AI-driven autonomous incident response: Revolutionizing cybersecurity operations with real-time threat mitigation. Int. J. Commun. Networks Inf. Secur. 17, 69–78 (2025).
Rebet, J. AI automated incident response and threat mitigation using AI. In Revolutionizing Cybersecurity With Deep Learning and Large Language Models 201–236 (2025).
Omar, M. et al. (eds) Integrating Artificial Intelligence in Cybersecurity and Forensic Practices (IGI Global, 2025). https://doi.org/10.4018/979-8-3373-0588-2.
Al-Thani, G. M. The AIM-PRISM framework: A novel strategic model for machine learning and artificial intelligence deployment in national infrastructure cybersecurity. Adv. Artif. Intell. Mach. Learn. 5, 4053–4073 (2025).
Sharafaldin, I., Habibi Lashkari, A. & Ghorbani, A. A. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization. In Proceedings of the 4th International Conference on Information Systems Security and Privacy, Funchal, 22–24 January 2018, 108–116 (2018). https://doi.org/10.5220/0006639801080116