{"id":1457,"date":"2026-04-09T11:58:35","date_gmt":"2026-04-09T11:58:35","guid":{"rendered":"https:\/\/www.europesays.com\/ai\/1457\/"},"modified":"2026-04-09T11:58:35","modified_gmt":"2026-04-09T11:58:35","slug":"artificial-intelligence-driven-multi-agent-framework-for-adaptive-cyber-attack-simulation-and-automated-incident-response-in-cyber-range-environments","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/ai\/1457\/","title":{"rendered":"Artificial intelligence driven multi agent framework for adaptive cyber attack simulation and automated incident response in cyber range environments"},"content":{"rendered":"<p class=\"c-article-references__text\" id=\"ref-CR1\">Kirmani, F., Unni, A. S., Kulkarni, V. P., Lackey, K. &amp; Rose, J. R. Detecting polar ring galaxies via deep learning. RAS Tech. Instrum. <a href=\"https:\/\/doi.org\/10.1093\/rasti\/rzaf043\" data-track=\"click_references\" data-track-action=\"external reference\" data-track-value=\"external reference\" data-track-label=\"10.1093\/rasti\/rzaf043\" rel=\"nofollow noopener\" target=\"_blank\">https:\/\/doi.org\/10.1093\/rasti\/rzaf043<\/a> (2025).<\/p>\n<p class=\"c-article-references__links u-hide-print\"><a data-track=\"click_references\" rel=\"nofollow noopener\" data-track-label=\"10.1093\/rasti\/rzaf043\" data-track-item_id=\"10.1093\/rasti\/rzaf043\" data-track-value=\"article reference\" data-track-action=\"article reference\" href=\"https:\/\/doi.org\/10.1093%2Frasti%2Frzaf043\" aria-label=\"Article reference 1\" data-doi=\"10.1093\/rasti\/rzaf043\" target=\"_blank\">Article<\/a>\u00a0<br \/>\n    <a data-track=\"click_references\" data-track-action=\"google scholar reference\" data-track-value=\"google scholar reference\" data-track-label=\"link\" data-track-item_id=\"link\" rel=\"nofollow noopener\" aria-label=\"Google Scholar reference 1\" href=\"http:\/\/scholar.google.com\/scholar_lookup?&amp;title=Detecting%20polar%20ring%20galaxies%20via%20deep%20learning&amp;journal=RAS%20Tech.%20Instrum.&amp;doi=10.1093%2Frasti%2Frzaf043&amp;publication_year=2025&amp;author=Kirmani%2CF&amp;author=Unni%2CAS&amp;author=Kulkarni%2CVP&amp;author=Lackey%2CK&amp;author=Rose%2CJR\" target=\"_blank\"><br \/>\n                    Google Scholar<\/a>\u00a0\n                <\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR2\">Miller, E. et al. Classifying cyber ranges: A case-based analysis using the UWF cyber range. Encyclopedia 5, 162. <a href=\"https:\/\/doi.org\/10.3390\/encyclopedia5040162\" data-track=\"click_references\" data-track-action=\"external reference\" data-track-value=\"external reference\" data-track-label=\"10.3390\/encyclopedia5040162\" rel=\"nofollow noopener\" target=\"_blank\">https:\/\/doi.org\/10.3390\/encyclopedia5040162<\/a> (2025).<\/p>\n<p class=\"c-article-references__links u-hide-print\"><a data-track=\"click_references\" rel=\"nofollow noopener\" data-track-label=\"10.3390\/encyclopedia5040162\" data-track-item_id=\"10.3390\/encyclopedia5040162\" data-track-value=\"article reference\" data-track-action=\"article reference\" href=\"https:\/\/doi.org\/10.3390%2Fencyclopedia5040162\" aria-label=\"Article reference 2\" data-doi=\"10.3390\/encyclopedia5040162\" target=\"_blank\">Article<\/a>\u00a0<br \/>\n    <a data-track=\"click_references\" data-track-action=\"google scholar reference\" data-track-value=\"google scholar reference\" data-track-label=\"link\" data-track-item_id=\"link\" rel=\"nofollow noopener\" aria-label=\"Google Scholar reference 2\" href=\"http:\/\/scholar.google.com\/scholar_lookup?&amp;title=Classifying%20cyber%20ranges%3A%20A%20case-based%20analysis%20using%20the%20UWF%20cyber%20range&amp;journal=Encyclopedia&amp;doi=10.3390%2Fencyclopedia5040162&amp;volume=5&amp;publication_year=2025&amp;author=Miller%2CE\" target=\"_blank\"><br \/>\n                    Google Scholar<\/a>\u00a0\n                <\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR3\">Chouliaras, N. et al. Cyber ranges and testbeds for education, training, and research. Appl. Sci. 11, 1809. <a href=\"https:\/\/doi.org\/10.3390\/app11041809\" data-track=\"click_references\" data-track-action=\"external reference\" data-track-value=\"external reference\" data-track-label=\"10.3390\/app11041809\" rel=\"nofollow noopener\" target=\"_blank\">https:\/\/doi.org\/10.3390\/app11041809<\/a> (2021).<\/p>\n<p class=\"c-article-references__links u-hide-print\"><a data-track=\"click_references\" rel=\"nofollow noopener\" data-track-label=\"10.3390\/app11041809\" data-track-item_id=\"10.3390\/app11041809\" data-track-value=\"article reference\" data-track-action=\"article reference\" href=\"https:\/\/doi.org\/10.3390%2Fapp11041809\" aria-label=\"Article reference 3\" data-doi=\"10.3390\/app11041809\" target=\"_blank\">Article<\/a>\u00a0<br \/>\n    <a data-track=\"click_references\" rel=\"nofollow noopener\" data-track-label=\"link\" data-track-item_id=\"link\" data-track-value=\"cas reference\" data-track-action=\"cas reference\" href=\"https:\/\/www.nature.com\/articles\/cas-redirect\/1:CAS:528:DC%2BB3MXhsFSisrrN\" aria-label=\"CAS reference 3\" target=\"_blank\">CAS<\/a>\u00a0<br \/>\n    <a data-track=\"click_references\" data-track-action=\"google scholar reference\" data-track-value=\"google scholar reference\" data-track-label=\"link\" data-track-item_id=\"link\" rel=\"nofollow noopener\" aria-label=\"Google Scholar reference 3\" href=\"http:\/\/scholar.google.com\/scholar_lookup?&amp;title=Cyber%20ranges%20and%20testbeds%20for%20education%2C%20training%2C%20and%20research&amp;journal=Appl.%20Sci.&amp;doi=10.3390%2Fapp11041809&amp;volume=11&amp;publication_year=2021&amp;author=Chouliaras%2CN\" target=\"_blank\"><br \/>\n                    Google Scholar<\/a>\u00a0\n                <\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR4\">Stamatopoulos, D. et al. Exploring the architectural composition of cyber ranges: A systematic review. Future Internet 16, 231. <a href=\"https:\/\/doi.org\/10.3390\/fi16070231\" data-track=\"click_references\" data-track-action=\"external reference\" data-track-value=\"external reference\" data-track-label=\"10.3390\/fi16070231\" rel=\"nofollow noopener\" target=\"_blank\">https:\/\/doi.org\/10.3390\/fi16070231<\/a> (2024).<\/p>\n<p class=\"c-article-references__links u-hide-print\"><a data-track=\"click_references\" rel=\"nofollow noopener\" data-track-label=\"10.3390\/fi16070231\" data-track-item_id=\"10.3390\/fi16070231\" data-track-value=\"article reference\" data-track-action=\"article reference\" href=\"https:\/\/doi.org\/10.3390%2Ffi16070231\" aria-label=\"Article reference 4\" data-doi=\"10.3390\/fi16070231\" target=\"_blank\">Article<\/a>\u00a0<br \/>\n    <a data-track=\"click_references\" data-track-action=\"google scholar reference\" data-track-value=\"google scholar reference\" data-track-label=\"link\" data-track-item_id=\"link\" rel=\"nofollow noopener\" aria-label=\"Google Scholar reference 4\" href=\"http:\/\/scholar.google.com\/scholar_lookup?&amp;title=Exploring%20the%20architectural%20composition%20of%20cyber%20ranges%3A%20A%20systematic%20review&amp;journal=Future%20Internet&amp;doi=10.3390%2Ffi16070231&amp;volume=16&amp;publication_year=2024&amp;author=Stamatopoulos%2CD\" target=\"_blank\"><br \/>\n                    Google Scholar<\/a>\u00a0\n                <\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR5\">Kirmani, S. &amp; Raghavan, P. Scalable parallel graph partitioning. In Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis (SC \u201913), 1\u201310 (2013). <a href=\"https:\/\/doi.org\/10.1145\/2503210.2503280\" data-track=\"click_references\" data-track-action=\"external reference\" data-track-value=\"external reference\" data-track-label=\"10.1145\/2503210.2503280\" rel=\"nofollow noopener\" target=\"_blank\">https:\/\/doi.org\/10.1145\/2503210.2503280<\/a><\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR6\">Alyami, H. et al. Analyzing the data of software security life-span: Quantum computing era. Intell. Autom. Soft Comput. <a href=\"https:\/\/doi.org\/10.32604\/iasc.2022.020780\" data-track=\"click_references\" data-track-action=\"external reference\" data-track-value=\"external reference\" data-track-label=\"10.32604\/iasc.2022.020780\" rel=\"nofollow noopener\" target=\"_blank\">https:\/\/doi.org\/10.32604\/iasc.2022.020780<\/a> (2022).<\/p>\n<p class=\"c-article-references__links u-hide-print\"><a data-track=\"click_references\" rel=\"nofollow noopener\" data-track-label=\"10.32604\/iasc.2022.020780\" data-track-item_id=\"10.32604\/iasc.2022.020780\" data-track-value=\"article reference\" data-track-action=\"article reference\" href=\"https:\/\/doi.org\/10.32604%2Fiasc.2022.020780\" aria-label=\"Article reference 6\" data-doi=\"10.32604\/iasc.2022.020780\" target=\"_blank\">Article<\/a>\u00a0<br \/>\n    <a data-track=\"click_references\" data-track-action=\"google scholar reference\" data-track-value=\"google scholar reference\" data-track-label=\"link\" data-track-item_id=\"link\" rel=\"nofollow noopener\" aria-label=\"Google Scholar reference 6\" href=\"http:\/\/scholar.google.com\/scholar_lookup?&amp;title=Analyzing%20the%20data%20of%20software%20security%20life-span%3A%20Quantum%20computing%20era&amp;journal=Intell.%20Autom.%20Soft%20Comput.&amp;doi=10.32604%2Fiasc.2022.020780&amp;publication_year=2022&amp;author=Alyami%2CH\" target=\"_blank\"><br \/>\n                    Google Scholar<\/a>\u00a0\n                <\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR7\">Late\u0219, I. &amp; Boja, C. Cyber range as a competency based education instrument in cyber security. In 8th BASIQ International Conference on New Trends in Sustainable Business and Consumption, 703\u2013710 (2022).<\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR8\">Wooldridge, M. An Introduction to MultiAgent Systems 2nd edn (Wiley, 2009).<\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR9\">Nadeem, M. et al. Evaluating the factors of CGTMSE scheme in bank by using fuzzy AHP. In 2023 6th International Conference on Contemporary Computing and Informatics (IC3I), 56\u201361 (2023). <a href=\"https:\/\/doi.org\/10.1109\/IC3I59117.2023.10397669\" data-track=\"click_references\" data-track-action=\"external reference\" data-track-value=\"external reference\" data-track-label=\"10.1109\/IC3I59117.2023.10397669\" rel=\"nofollow noopener\" target=\"_blank\">https:\/\/doi.org\/10.1109\/IC3I59117.2023.10397669<\/a><\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR10\">Cai, J. et al. An overview of security threats, attack detection and defense for large-scale multi-agent systems in IoT. IEEE Trans. Ind. Cyber-Phys. Syst. 3, 70\u201381. <a href=\"https:\/\/doi.org\/10.1109\/TICPS.2024.3514552\" data-track=\"click_references\" data-track-action=\"external reference\" data-track-value=\"external reference\" data-track-label=\"10.1109\/TICPS.2024.3514552\" rel=\"nofollow noopener\" target=\"_blank\">https:\/\/doi.org\/10.1109\/TICPS.2024.3514552<\/a> (2025).<\/p>\n<p class=\"c-article-references__links u-hide-print\"><a data-track=\"click_references\" rel=\"nofollow noopener\" data-track-label=\"10.1109\/TICPS.2024.3514552\" data-track-item_id=\"10.1109\/TICPS.2024.3514552\" data-track-value=\"article reference\" data-track-action=\"article reference\" href=\"https:\/\/doi.org\/10.1109%2FTICPS.2024.3514552\" aria-label=\"Article reference 10\" data-doi=\"10.1109\/TICPS.2024.3514552\" target=\"_blank\">Article<\/a>\u00a0<br \/>\n    <a data-track=\"click_references\" data-track-action=\"google scholar reference\" data-track-value=\"google scholar reference\" data-track-label=\"link\" data-track-item_id=\"link\" rel=\"nofollow noopener\" aria-label=\"Google Scholar reference 10\" href=\"http:\/\/scholar.google.com\/scholar_lookup?&amp;title=An%20overview%20of%20security%20threats%2C%20attack%20detection%20and%20defense%20for%20large-scale%20multi-agent%20systems%20in%20IoT&amp;journal=IEEE%20Trans.%20Ind.%20Cyber-Phys.%20Syst.&amp;doi=10.1109%2FTICPS.2024.3514552&amp;volume=3&amp;pages=70-81&amp;publication_year=2025&amp;author=Cai%2CJ\" target=\"_blank\"><br \/>\n                    Google Scholar<\/a>\u00a0\n                <\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR11\">Hu, Z., Chen, P., Zhu, M. &amp; Liu, P. Reinforcement learning for adaptive cyber defense against zero-day attacks. In Lecture Notes in Computer Science 11830 54\u201393 (Springer, 2019). <a href=\"https:\/\/doi.org\/10.1007\/978-3-030-30719-6_4\" data-track=\"click_references\" data-track-action=\"external reference\" data-track-value=\"external reference\" data-track-label=\"10.1007\/978-3-030-30719-6_4\" rel=\"nofollow noopener\" target=\"_blank\">https:\/\/doi.org\/10.1007\/978-3-030-30719-6_4<\/a>.<\/p>\n<p class=\"c-article-references__links u-hide-print\"><a data-track=\"click_references\" rel=\"noopener nofollow\" data-track-label=\"10.1007\/978-3-030-30719-6_4\" data-track-item_id=\"10.1007\/978-3-030-30719-6_4\" data-track-value=\"chapter reference\" data-track-action=\"chapter reference\" href=\"https:\/\/link.springer.com\/doi\/10.1007\/978-3-030-30719-6_4\" aria-label=\"Chapter reference 11\" data-doi=\"10.1007\/978-3-030-30719-6_4\" target=\"_blank\">Chapter<\/a>\u00a0<br \/>\n    <a data-track=\"click_references\" data-track-action=\"google scholar reference\" data-track-value=\"google scholar reference\" data-track-label=\"link\" data-track-item_id=\"link\" rel=\"nofollow noopener\" aria-label=\"Google Scholar reference 11\" href=\"http:\/\/scholar.google.com\/scholar_lookup?&amp;title=Reinforcement%20learning%20for%20adaptive%20cyber%20defense%20against%20zero-day%20attacks&amp;doi=10.1007%2F978-3-030-30719-6_4&amp;pages=54-93&amp;publication_year=2019&amp;author=Hu%2CZ&amp;author=Chen%2CP&amp;author=Zhu%2CM&amp;author=Liu%2CP\" target=\"_blank\"><br \/>\n                    Google Scholar<\/a>\u00a0\n                <\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR12\">Kirmani, F., Lane, B. J. &amp; Rose, J. R. Exploring machine learning techniques to improve peptide identification. In 2019 IEEE 19th International Conference on Bioinformatics and Bioengineering (BIBE), 66\u201371 (2019). <a href=\"https:\/\/doi.org\/10.1109\/BIBE.2019.00021\" data-track=\"click_references\" data-track-action=\"external reference\" data-track-value=\"external reference\" data-track-label=\"10.1109\/BIBE.2019.00021\" rel=\"nofollow noopener\" target=\"_blank\">https:\/\/doi.org\/10.1109\/BIBE.2019.00021<\/a><\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR13\">Nadeem, M. Analyze quantum security in software design using fuzzy-AHP. Int. J. Inf. Technol. <a href=\"https:\/\/doi.org\/10.1007\/s41870-024-02002-w\" data-track=\"click_references\" data-track-action=\"external reference\" data-track-value=\"external reference\" data-track-label=\"10.1007\/s41870-024-02002-w\" rel=\"nofollow noopener\" target=\"_blank\">https:\/\/doi.org\/10.1007\/s41870-024-02002-w<\/a> (2024).<\/p>\n<p class=\"c-article-references__links u-hide-print\"><a data-track=\"click_references\" rel=\"noopener nofollow\" data-track-label=\"10.1007\/s41870-024-02002-w\" data-track-item_id=\"10.1007\/s41870-024-02002-w\" data-track-value=\"article reference\" data-track-action=\"article reference\" href=\"https:\/\/link.springer.com\/doi\/10.1007\/s41870-024-02002-w\" aria-label=\"Article reference 13\" data-doi=\"10.1007\/s41870-024-02002-w\" target=\"_blank\">Article<\/a>\u00a0<br \/>\n    <a data-track=\"click_references\" data-track-action=\"google scholar reference\" data-track-value=\"google scholar reference\" data-track-label=\"link\" data-track-item_id=\"link\" rel=\"nofollow noopener\" aria-label=\"Google Scholar reference 13\" href=\"http:\/\/scholar.google.com\/scholar_lookup?&amp;title=Analyze%20quantum%20security%20in%20software%20design%20using%20fuzzy-AHP&amp;journal=Int.%20J.%20Inf.%20Technol.&amp;doi=10.1007%2Fs41870-024-02002-w&amp;publication_year=2024&amp;author=Nadeem%2CM\" target=\"_blank\"><br \/>\n                    Google Scholar<\/a>\u00a0\n                <\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR14\">Guo, Y., Wang, L., Liu, Z. &amp; Shen, Y. Reinforcement-learning-based dynamic defense strategy of multistage game against dynamic load altering attack. Int. J. Electr. Power Energy Syst. 131, 107113 (2021).<\/p>\n<p class=\"c-article-references__links u-hide-print\"><a data-track=\"click_references\" rel=\"nofollow noopener\" data-track-label=\"10.1016\/j.ijepes.2021.107113\" data-track-item_id=\"10.1016\/j.ijepes.2021.107113\" data-track-value=\"article reference\" data-track-action=\"article reference\" href=\"https:\/\/doi.org\/10.1016%2Fj.ijepes.2021.107113\" aria-label=\"Article reference 14\" data-doi=\"10.1016\/j.ijepes.2021.107113\" target=\"_blank\">Article<\/a>\u00a0<br \/>\n    <a data-track=\"click_references\" data-track-action=\"google scholar reference\" data-track-value=\"google scholar reference\" data-track-label=\"link\" data-track-item_id=\"link\" rel=\"nofollow noopener\" aria-label=\"Google Scholar reference 14\" href=\"http:\/\/scholar.google.com\/scholar_lookup?&amp;title=Reinforcement-learning-based%20dynamic%20defense%20strategy%20of%20multistage%20game%20against%20dynamic%20load%20altering%20attack&amp;journal=Int.%20J.%20Electr.%20Power%20Energy%20Syst.&amp;doi=10.1016%2Fj.ijepes.2021.107113&amp;volume=131&amp;publication_year=2021&amp;author=Guo%2CY&amp;author=Wang%2CL&amp;author=Liu%2CZ&amp;author=Shen%2CY\" target=\"_blank\"><br \/>\n                    Google Scholar<\/a>\u00a0\n                <\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR15\">Zhang, T., Tang, X., Kang, J. &amp; Xu, C. AI-driven moving target defense for VANETs: Route mutation via multiagent reinforcement learning. In Moving Target Defense Based on Artificial Intelligence 81\u2013105 (Springer, 2025). <a href=\"https:\/\/doi.org\/10.1007\/978-981-95-0615-6_5\" data-track=\"click_references\" data-track-action=\"external reference\" data-track-value=\"external reference\" data-track-label=\"10.1007\/978-981-95-0615-6_5\" rel=\"nofollow noopener\" target=\"_blank\">https:\/\/doi.org\/10.1007\/978-981-95-0615-6_5<\/a>.<\/p>\n<p class=\"c-article-references__links u-hide-print\"><a data-track=\"click_references\" rel=\"noopener nofollow\" data-track-label=\"10.1007\/978-981-95-0615-6_5\" data-track-item_id=\"10.1007\/978-981-95-0615-6_5\" data-track-value=\"chapter reference\" data-track-action=\"chapter reference\" href=\"https:\/\/link.springer.com\/doi\/10.1007\/978-981-95-0615-6_5\" aria-label=\"Chapter reference 15\" data-doi=\"10.1007\/978-981-95-0615-6_5\" target=\"_blank\">Chapter<\/a>\u00a0<br \/>\n    <a data-track=\"click_references\" data-track-action=\"google scholar reference\" data-track-value=\"google scholar reference\" data-track-label=\"link\" data-track-item_id=\"link\" rel=\"nofollow noopener\" aria-label=\"Google Scholar reference 15\" href=\"http:\/\/scholar.google.com\/scholar_lookup?&amp;title=AI-driven%20moving%20target%20defense%20for%20VANETs%3A%20Route%20mutation%20via%20multiagent%20reinforcement%20learning&amp;doi=10.1007%2F978-981-95-0615-6_5&amp;pages=81-105&amp;publication_year=2025&amp;author=Zhang%2CT&amp;author=Tang%2CX&amp;author=Kang%2CJ&amp;author=Xu%2CC\" target=\"_blank\"><br \/>\n                    Google Scholar<\/a>\u00a0\n                <\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR16\">Waizel, G. Bridging the AI divide: The evolving arms race between AI-driven cyber attacks and AI-powered cybersecurity defenses. In Machine Intelligence &amp; Security for Smart Cities (TRUST), 141\u2013156 (2024).<\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR17\">Choi, I. S., Hong, J. &amp; Kim, T. W. Multi-agent based cyber attack detection and mitigation for distribution automation system. IEEE Access 8, 183495\u2013183504 (2020).<\/p>\n<p class=\"c-article-references__links u-hide-print\"><a data-track=\"click_references\" rel=\"nofollow noopener\" data-track-label=\"10.1109\/ACCESS.2020.3029765\" data-track-item_id=\"10.1109\/ACCESS.2020.3029765\" data-track-value=\"article reference\" data-track-action=\"article reference\" href=\"https:\/\/doi.org\/10.1109%2FACCESS.2020.3029765\" aria-label=\"Article reference 17\" data-doi=\"10.1109\/ACCESS.2020.3029765\" target=\"_blank\">Article<\/a>\u00a0<br \/>\n    <a data-track=\"click_references\" data-track-action=\"google scholar reference\" data-track-value=\"google scholar reference\" data-track-label=\"link\" data-track-item_id=\"link\" rel=\"nofollow noopener\" aria-label=\"Google Scholar reference 17\" href=\"http:\/\/scholar.google.com\/scholar_lookup?&amp;title=Multi-agent%20based%20cyber%20attack%20detection%20and%20mitigation%20for%20distribution%20automation%20system&amp;journal=IEEE%20Access&amp;doi=10.1109%2FACCESS.2020.3029765&amp;volume=8&amp;pages=183495-183504&amp;publication_year=2020&amp;author=Choi%2CIS&amp;author=Hong%2CJ&amp;author=Kim%2CTW\" target=\"_blank\"><br \/>\n                    Google Scholar<\/a>\u00a0\n                <\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR18\">Jiang, H., Choi, T., Ko, R. K. &amp; Pandora, A cyber range environment for the safe testing and deployment of autonomous cyber attack tools. In Security in Computing and Communication 1\u201320 (Springer, 2020).<\/p>\n<p class=\"c-article-references__links u-hide-print\"><a data-track=\"click_references\" data-track-action=\"google scholar reference\" data-track-value=\"google scholar reference\" data-track-label=\"link\" data-track-item_id=\"link\" rel=\"nofollow noopener\" aria-label=\"Google Scholar reference 18\" href=\"http:\/\/scholar.google.com\/scholar_lookup?&amp;title=A%20cyber%20range%20environment%20for%20the%20safe%20testing%20and%20deployment%20of%20autonomous%20cyber%20attack%20tools&amp;pages=1-20&amp;publication_year=2020&amp;author=Jiang%2CH&amp;author=Choi%2CT&amp;author=Ko%2CRK&amp;author=Pandora%2C\" target=\"_blank\"><br \/>\n                    Google Scholar<\/a>\u00a0\n                <\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR19\">Sharafaldin, I., Lashkari, A. H. &amp; Ghorbani, A. A. Toward generating a new intrusion detection dataset and intrusion traffic characterization. In Proceedings of ICISSP, 108\u2013116 (2018). <a href=\"https:\/\/doi.org\/10.5220\/0006634301080116\" data-track=\"click_references\" data-track-action=\"external reference\" data-track-value=\"external reference\" data-track-label=\"10.5220\/0006634301080116\" rel=\"nofollow noopener\" target=\"_blank\">https:\/\/doi.org\/10.5220\/0006634301080116<\/a><\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR20\">Moustafa, N. &amp; Slay, J. UNSW-NB15: A comprehensive data set for network intrusion detection systems. In MilCIS, 1\u20136 (2015). <a href=\"https:\/\/doi.org\/10.1109\/MilCIS.2015.7348942\" data-track=\"click_references\" data-track-action=\"external reference\" data-track-value=\"external reference\" data-track-label=\"10.1109\/MilCIS.2015.7348942\" rel=\"nofollow noopener\" target=\"_blank\">https:\/\/doi.org\/10.1109\/MilCIS.2015.7348942<\/a><\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR21\">Admass, W. S., Munaye, Y. Y. &amp; Diro, A. A. Cyber security: State of the art, challenges and future directions. Cyber Secur. Appl. 2, 100031. <a href=\"https:\/\/doi.org\/10.1016\/j.csa.2023.100031\" data-track=\"click_references\" data-track-action=\"external reference\" data-track-value=\"external reference\" data-track-label=\"10.1016\/j.csa.2023.100031\" rel=\"nofollow noopener\" target=\"_blank\">https:\/\/doi.org\/10.1016\/j.csa.2023.100031<\/a> (2024).<\/p>\n<p class=\"c-article-references__links u-hide-print\"><a data-track=\"click_references\" rel=\"nofollow noopener\" data-track-label=\"10.1016\/j.csa.2023.100031\" data-track-item_id=\"10.1016\/j.csa.2023.100031\" data-track-value=\"article reference\" data-track-action=\"article reference\" href=\"https:\/\/doi.org\/10.1016%2Fj.csa.2023.100031\" aria-label=\"Article reference 21\" data-doi=\"10.1016\/j.csa.2023.100031\" target=\"_blank\">Article<\/a>\u00a0<br \/>\n    <a data-track=\"click_references\" data-track-action=\"google scholar reference\" data-track-value=\"google scholar reference\" data-track-label=\"link\" data-track-item_id=\"link\" rel=\"nofollow noopener\" aria-label=\"Google Scholar reference 21\" href=\"http:\/\/scholar.google.com\/scholar_lookup?&amp;title=Cyber%20security%3A%20State%20of%20the%20art%2C%20challenges%20and%20future%20directions&amp;journal=Cyber%20Secur.%20Appl.&amp;doi=10.1016%2Fj.csa.2023.100031&amp;volume=2&amp;publication_year=2024&amp;author=Admass%2CWS&amp;author=Munaye%2CYY&amp;author=Diro%2CAA\" target=\"_blank\"><br \/>\n                    Google Scholar<\/a>\u00a0\n                <\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR22\">Katsantonis, M. N. et al. Cyber range design framework for cyber security education and training. Int. J. Inf. Secur. 22, 1005\u20131027 (2023).<\/p>\n<p class=\"c-article-references__links u-hide-print\"><a data-track=\"click_references\" rel=\"noopener nofollow\" data-track-label=\"10.1007\/s10207-023-00680-4\" data-track-item_id=\"10.1007\/s10207-023-00680-4\" data-track-value=\"article reference\" data-track-action=\"article reference\" href=\"https:\/\/link.springer.com\/doi\/10.1007\/s10207-023-00680-4\" aria-label=\"Article reference 22\" data-doi=\"10.1007\/s10207-023-00680-4\" target=\"_blank\">Article<\/a>\u00a0<br \/>\n    <a data-track=\"click_references\" data-track-action=\"google scholar reference\" data-track-value=\"google scholar reference\" data-track-label=\"link\" data-track-item_id=\"link\" rel=\"nofollow noopener\" aria-label=\"Google Scholar reference 22\" href=\"http:\/\/scholar.google.com\/scholar_lookup?&amp;title=Cyber%20range%20design%20framework%20for%20cyber%20security%20education%20and%20training&amp;journal=Int.%20J.%20Inf.%20Secur.&amp;doi=10.1007%2Fs10207-023-00680-4&amp;volume=22&amp;pages=1005-1027&amp;publication_year=2023&amp;author=Katsantonis%2CMN\" target=\"_blank\"><br \/>\n                    Google Scholar<\/a>\u00a0\n                <\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR23\">Leitner, M. et al. AIT cyber range: Flexible cyber security environment for exercises, training and research. In European Interdisciplinary Cybersecurity Conference, 1\u20136 (2020).<\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR24\">Kirmani, S., Park, J. &amp; Raghavan, P. An embedded sectioning scheme for multiprocessor topology-aware mapping of irregular applications. Int. J. High Perform. Comput. Appl. 31, 91\u2013103. <a href=\"https:\/\/doi.org\/10.1177\/1094342015597082\" data-track=\"click_references\" data-track-action=\"external reference\" data-track-value=\"external reference\" data-track-label=\"10.1177\/1094342015597082\" rel=\"nofollow noopener\" target=\"_blank\">https:\/\/doi.org\/10.1177\/1094342015597082<\/a> (2017).<\/p>\n<p class=\"c-article-references__links u-hide-print\"><a data-track=\"click_references\" rel=\"nofollow noopener\" data-track-label=\"10.1177\/1094342015597082\" data-track-item_id=\"10.1177\/1094342015597082\" data-track-value=\"article reference\" data-track-action=\"article reference\" href=\"https:\/\/doi.org\/10.1177%2F1094342015597082\" aria-label=\"Article reference 24\" data-doi=\"10.1177\/1094342015597082\" target=\"_blank\">Article<\/a>\u00a0<br \/>\n    <a data-track=\"click_references\" data-track-action=\"google scholar reference\" data-track-value=\"google scholar reference\" data-track-label=\"link\" data-track-item_id=\"link\" rel=\"nofollow noopener\" aria-label=\"Google Scholar reference 24\" href=\"http:\/\/scholar.google.com\/scholar_lookup?&amp;title=An%20embedded%20sectioning%20scheme%20for%20multiprocessor%20topology-aware%20mapping%20of%20irregular%20applications&amp;journal=Int.%20J.%20High%20Perform.%20Comput.%20Appl.&amp;doi=10.1177%2F1094342015597082&amp;volume=31&amp;pages=91-103&amp;publication_year=2017&amp;author=Kirmani%2CS&amp;author=Park%2CJ&amp;author=Raghavan%2CP\" target=\"_blank\"><br \/>\n                    Google Scholar<\/a>\u00a0\n                <\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR25\">Kirmani, S., Sun, H. &amp; Raghavan, P. A scalability and sensitivity study of parallel geometric algorithms for graph partitioning. In 2018 30th International Symposium on Computer Architecture and High Performance Computing (SBAC-PAD), 420\u2013427 (2018). <a href=\"https:\/\/doi.org\/10.1109\/CAHPC.2018.8645916\" data-track=\"click_references\" data-track-action=\"external reference\" data-track-value=\"external reference\" data-track-label=\"10.1109\/CAHPC.2018.8645916\" rel=\"nofollow noopener\" target=\"_blank\">https:\/\/doi.org\/10.1109\/CAHPC.2018.8645916<\/a><\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR26\">Zhang, J. et al. Springer,. A survey of cyber range: Current status, analysis, and future trends. In International Conference on Network Simulation and Evaluation, 88\u2013101 (2023).<\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR27\">Shin, Y., Kwon, H., Jeong, J. &amp; Shin, D. A study on designing cyber training and cyber range to effectively respond to cyber threats. Electronics 13, 3867 (2024).<\/p>\n<p class=\"c-article-references__links u-hide-print\"><a data-track=\"click_references\" rel=\"nofollow noopener\" data-track-label=\"10.3390\/electronics13193867\" data-track-item_id=\"10.3390\/electronics13193867\" data-track-value=\"article reference\" data-track-action=\"article reference\" href=\"https:\/\/doi.org\/10.3390%2Felectronics13193867\" aria-label=\"Article reference 27\" data-doi=\"10.3390\/electronics13193867\" target=\"_blank\">Article<\/a>\u00a0<br \/>\n    <a data-track=\"click_references\" data-track-action=\"google scholar reference\" data-track-value=\"google scholar reference\" data-track-label=\"link\" data-track-item_id=\"link\" rel=\"nofollow noopener\" aria-label=\"Google Scholar reference 27\" href=\"http:\/\/scholar.google.com\/scholar_lookup?&amp;title=A%20study%20on%20designing%20cyber%20training%20and%20cyber%20range%20to%20effectively%20respond%20to%20cyber%20threats&amp;journal=Electronics&amp;doi=10.3390%2Felectronics13193867&amp;volume=13&amp;publication_year=2024&amp;author=Shin%2CY&amp;author=Kwon%2CH&amp;author=Jeong%2CJ&amp;author=Shin%2CD\" target=\"_blank\"><br \/>\n                    Google Scholar<\/a>\u00a0\n                <\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR28\">Mills, A., White, J. &amp; Legg, P. GoibhniUWE: A lightweight and modular container-based cyber range. Journal of Cybersecurity and Privacy 4, 615\u2013628 (2024).<\/p>\n<p class=\"c-article-references__links u-hide-print\"><a data-track=\"click_references\" rel=\"nofollow noopener\" data-track-label=\"10.3390\/jcp4030029\" data-track-item_id=\"10.3390\/jcp4030029\" data-track-value=\"article reference\" data-track-action=\"article reference\" href=\"https:\/\/doi.org\/10.3390%2Fjcp4030029\" aria-label=\"Article reference 28\" data-doi=\"10.3390\/jcp4030029\" target=\"_blank\">Article<\/a>\u00a0<br \/>\n    <a data-track=\"click_references\" data-track-action=\"google scholar reference\" data-track-value=\"google scholar reference\" data-track-label=\"link\" data-track-item_id=\"link\" rel=\"nofollow noopener\" aria-label=\"Google Scholar reference 28\" href=\"http:\/\/scholar.google.com\/scholar_lookup?&amp;title=GoibhniUWE%3A%20A%20lightweight%20and%20modular%20container-based%20cyber%20range&amp;journal=Journal%20of%20Cybersecurity%20and%20Privacy&amp;doi=10.3390%2Fjcp4030029&amp;volume=4&amp;pages=615-628&amp;publication_year=2024&amp;author=Mills%2CA&amp;author=White%2CJ&amp;author=Legg%2CP\" target=\"_blank\"><br \/>\n                    Google Scholar<\/a>\u00a0\n                <\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR29\">Kirmani, F., Lane, B. &amp; Rose, J. Identifying proteotypic peptides via deep learning. In Proceedings of the 11th International Conference on Bioinformatics Research and Applications, 42\u201347 (2025). <a href=\"https:\/\/doi.org\/10.1145\/3700666.3700691\" data-track=\"click_references\" data-track-action=\"external reference\" data-track-value=\"external reference\" data-track-label=\"10.1145\/3700666.3700691\" rel=\"nofollow noopener\" target=\"_blank\">https:\/\/doi.org\/10.1145\/3700666.3700691<\/a><\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR30\">Tyler, J. et al. Exposing, formalizing and reasoning over the latent semantics of tags in multimodal data sources. Appl. Ontol. 8, 95\u2013130. <a href=\"https:\/\/doi.org\/10.3233\/AO-130124\" data-track=\"click_references\" data-track-action=\"external reference\" data-track-value=\"external reference\" data-track-label=\"10.3233\/AO-130124\" rel=\"nofollow noopener\" target=\"_blank\">https:\/\/doi.org\/10.3233\/AO-130124<\/a> (2013).<\/p>\n<p class=\"c-article-references__links u-hide-print\"><a data-track=\"click_references\" rel=\"nofollow noopener\" data-track-label=\"10.3233\/AO-130124\" data-track-item_id=\"10.3233\/AO-130124\" data-track-value=\"article reference\" data-track-action=\"article reference\" href=\"https:\/\/doi.org\/10.3233%2FAO-130124\" aria-label=\"Article reference 30\" data-doi=\"10.3233\/AO-130124\" target=\"_blank\">Article<\/a>\u00a0<br \/>\n    <a data-track=\"click_references\" data-track-action=\"google scholar reference\" data-track-value=\"google scholar reference\" data-track-label=\"link\" data-track-item_id=\"link\" rel=\"nofollow noopener\" aria-label=\"Google Scholar reference 30\" href=\"http:\/\/scholar.google.com\/scholar_lookup?&amp;title=Exposing%2C%20formalizing%20and%20reasoning%20over%20the%20latent%20semantics%20of%20tags%20in%20multimodal%20data%20sources&amp;journal=Appl.%20Ontol.&amp;doi=10.3233%2FAO-130124&amp;volume=8&amp;pages=95-130&amp;publication_year=2013&amp;author=Tyler%2CJ\" target=\"_blank\"><br \/>\n                    Google Scholar<\/a>\u00a0\n                <\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR31\">Chadha, R. et al. CyberVAN: A cyber security virtual assured network testbed. In MILCOM, 1125\u20131130 (2016).\u00a0<a href=\"https:\/\/doi.org\/10.1109\/MILCOM.2016.7795481\" data-track=\"click_references\" data-track-action=\"external reference\" data-track-value=\"external reference\" data-track-label=\"10.1109\/MILCOM.2016.7795481\" rel=\"nofollow noopener\" target=\"_blank\">https:\/\/doi.org\/10.1109\/MILCOM.2016.7795481<\/a><\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR32\">Popoola, D., Bhattacharya, S., &amp; Govindarasu, M. CySIDER Cybersecurity situational intelligence framework for DER networks. In Resilience Week (RWS), 1\u201310 (2025). <a href=\"https:\/\/doi.org\/10.1109\/RWS66711.2025.11304446\" data-track=\"click_references\" data-track-action=\"external reference\" data-track-value=\"external reference\" data-track-label=\"10.1109\/RWS66711.2025.11304446\" rel=\"nofollow noopener\" target=\"_blank\">https:\/\/doi.org\/10.1109\/RWS66711.2025.11304446<\/a><\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR33\">Tian, J. &amp; Zhu, Q. Reinforcement learning for cybersecurity: A review. Computers &amp; Security 106, 102280 (2021).<\/p>\n<p class=\"c-article-references__links u-hide-print\"><a data-track=\"click_references\" data-track-action=\"google scholar reference\" data-track-value=\"google scholar reference\" data-track-label=\"link\" data-track-item_id=\"link\" rel=\"nofollow noopener\" aria-label=\"Google Scholar reference 33\" href=\"http:\/\/scholar.google.com\/scholar_lookup?&amp;title=Reinforcement%20learning%20for%20cybersecurity%3A%20A%20review&amp;journal=Computers%20%26%20Security&amp;volume=106&amp;publication_year=2021&amp;author=Tian%2CJ&amp;author=Zhu%2CQ\" target=\"_blank\"><br \/>\n                    Google Scholar<\/a>\u00a0\n                <\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR34\">Aberkane, S. &amp; Elarbi-Boudihir, M. Deep reinforcement learning-based anomaly detection for video surveillance. Informatica 46 (2022).<\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR35\">Bharadiya, J. Machine learning in cybersecurity: Techniques and challenges. Eur. J. Technol. 7, 1\u201314 (2023).<\/p>\n<p class=\"c-article-references__links u-hide-print\"><a data-track=\"click_references\" rel=\"nofollow noopener\" data-track-label=\"10.47672\/ejt.1486\" data-track-item_id=\"10.47672\/ejt.1486\" data-track-value=\"article reference\" data-track-action=\"article reference\" href=\"https:\/\/doi.org\/10.47672%2Fejt.1486\" aria-label=\"Article reference 35\" data-doi=\"10.47672\/ejt.1486\" target=\"_blank\">Article<\/a>\u00a0<br \/>\n    <a data-track=\"click_references\" data-track-action=\"google scholar reference\" data-track-value=\"google scholar reference\" data-track-label=\"link\" data-track-item_id=\"link\" rel=\"nofollow noopener\" aria-label=\"Google Scholar reference 35\" href=\"http:\/\/scholar.google.com\/scholar_lookup?&amp;title=Machine%20learning%20in%20cybersecurity%3A%20Techniques%20and%20challenges&amp;journal=Eur.%20J.%20Technol.&amp;doi=10.47672%2Fejt.1486&amp;volume=7&amp;pages=1-14&amp;publication_year=2023&amp;author=Bharadiya%2CJ\" target=\"_blank\"><br \/>\n                    Google Scholar<\/a>\u00a0\n                <\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR36\">Terranova, F., Lahmadi, A. &amp; Chrisment, I. Scalable and generalizable RL agents for attack path discovery via continuous invariant spaces. In 28th International Symposium on Research in Attacks, Intrusions and Defenses (RAID) (2025).<\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR37\">Chenghai, W., Kaiyu, O. &amp; Jiying, W. Multi-agent based information warfare system modeling and simulation. In IEEE CSAA Guidance, Navigation and Control Conference (CGNCC), 1\u20137 (2018).<\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR38\">Kirmani, S. &amp; Shankar, M. Generating keywords by associative context with input words. Google Patents (2022).<\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR39\">Mishra, A., Kirmani, S. &amp; Madduri, K. Fast spectral graph layout on multicore platforms. In Proceedings of the ACM International Conference on Supercomputing (2020). <a href=\"https:\/\/doi.org\/10.1145\/3404397.3404471\" data-track=\"click_references\" data-track-action=\"external reference\" data-track-value=\"external reference\" data-track-label=\"10.1145\/3404397.3404471\" rel=\"nofollow noopener\" target=\"_blank\">https:\/\/doi.org\/10.1145\/3404397.3404471<\/a><\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR40\">Bougueroua, N. et al. A survey on multi-agent based collaborative intrusion detection systems. J. Artif. Intell. Soft Comput. Res. 11, 111\u2013142 (2021).<\/p>\n<p class=\"c-article-references__links u-hide-print\"><a data-track=\"click_references\" rel=\"nofollow noopener\" data-track-label=\"10.2478\/jaiscr-2021-0008\" data-track-item_id=\"10.2478\/jaiscr-2021-0008\" data-track-value=\"article reference\" data-track-action=\"article reference\" href=\"https:\/\/doi.org\/10.2478%2Fjaiscr-2021-0008\" aria-label=\"Article reference 40\" data-doi=\"10.2478\/jaiscr-2021-0008\" target=\"_blank\">Article<\/a>\u00a0<br \/>\n    <a data-track=\"click_references\" data-track-action=\"google scholar reference\" data-track-value=\"google scholar reference\" data-track-label=\"link\" data-track-item_id=\"link\" rel=\"nofollow noopener\" aria-label=\"Google Scholar reference 40\" href=\"http:\/\/scholar.google.com\/scholar_lookup?&amp;title=A%20survey%20on%20multi-agent%20based%20collaborative%20intrusion%20detection%20systems&amp;journal=J.%20Artif.%20Intell.%20Soft%20Comput.%20Res.&amp;doi=10.2478%2Fjaiscr-2021-0008&amp;volume=11&amp;pages=111-142&amp;publication_year=2021&amp;author=Bougueroua%2CN\" target=\"_blank\"><br \/>\n                    Google Scholar<\/a>\u00a0\n                <\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR41\">Zhang, Z. et al. Psysafe: A comprehensive framework for psychological-based attack, defense, and evaluation of multi-agent system safety. In Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics, 15202\u201315231 (2024).<\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR42\">Nelson, A., Rekhi, S., Souppaya, M. &amp; Scarfone, K. Incident response recommendations and considerations for cybersecurity risk management: A CSF 2.0 community profile. NIST Special Publication 800\u2009\u2212\u200961 Rev. 3.\u00a0<a href=\"https:\/\/doi.org\/10.6028\/NIST.SP.800-61r3\" data-track=\"click_references\" data-track-action=\"external reference\" data-track-value=\"external reference\" data-track-label=\"10.6028\/NIST.SP.800-61r3\" rel=\"nofollow noopener\" target=\"_blank\">https:\/\/doi.org\/10.6028\/NIST.SP.800-61r3<\/a> (2025).<\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR43\">Kirmani, S. &amp; Madduri, K. Spectral graph drawing: Building blocks and performance analysis. In 2018 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), 269\u2013277 (2018). <a href=\"https:\/\/doi.org\/10.1109\/IPDPSW.2018.00053\" data-track=\"click_references\" data-track-action=\"external reference\" data-track-value=\"external reference\" data-track-label=\"10.1109\/IPDPSW.2018.00053\" rel=\"nofollow noopener\" target=\"_blank\">https:\/\/doi.org\/10.1109\/IPDPSW.2018.00053<\/a><\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR44\">Upadhyay, S. et al. Application of reinforcement learning in adaptive cyber defence mechanism. In Lecture Notes in Networks and Systems 1287, 443\u2013455 (Springer, 2025). <a href=\"https:\/\/doi.org\/10.1007\/978-981-96-3284-8_33\" data-track=\"click_references\" data-track-action=\"external reference\" data-track-value=\"external reference\" data-track-label=\"10.1007\/978-981-96-3284-8_33\" rel=\"nofollow noopener\" target=\"_blank\">https:\/\/doi.org\/10.1007\/978-981-96-3284-8_33<\/a>.<\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR45\">Alauthman, M. et al. Reinforcement learning for adaptive cyber defense training autonomous systems for dynamic threat response and strategy optimization. In AI-Driven Security Systems and Intelligent Threat Response Using Autonomous Cyber Defense, 209\u2013234 (IGI Global, 2025).<\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR46\">Hammad, A. &amp; Tarik, J. F. Adaptive cyber defense using advanced deep reinforcement learning algorithms: A real-time comparative analysis. J. Comput. Theor. Appl. 2, 523\u2013535 (2025).<\/p>\n<p class=\"c-article-references__links u-hide-print\"><a data-track=\"click_references\" rel=\"nofollow noopener\" data-track-label=\"10.62411\/jcta.12560\" data-track-item_id=\"10.62411\/jcta.12560\" data-track-value=\"article reference\" data-track-action=\"article reference\" href=\"https:\/\/doi.org\/10.62411%2Fjcta.12560\" aria-label=\"Article reference 46\" data-doi=\"10.62411\/jcta.12560\" target=\"_blank\">Article<\/a>\u00a0<br \/>\n    <a data-track=\"click_references\" data-track-action=\"google scholar reference\" data-track-value=\"google scholar reference\" data-track-label=\"link\" data-track-item_id=\"link\" rel=\"nofollow noopener\" aria-label=\"Google Scholar reference 46\" href=\"http:\/\/scholar.google.com\/scholar_lookup?&amp;title=Adaptive%20cyber%20defense%20using%20advanced%20deep%20reinforcement%20learning%20algorithms%3A%20A%20real-time%20comparative%20analysis&amp;journal=J.%20Comput.%20Theor.%20Appl.&amp;doi=10.62411%2Fjcta.12560&amp;volume=2&amp;pages=523-535&amp;publication_year=2025&amp;author=Hammad%2CA&amp;author=Tarik%2CJF\" target=\"_blank\"><br \/>\n                    Google Scholar<\/a>\u00a0\n                <\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR47\">Chen, J. et al. Defending against APT attacks in cloud computing environments using grouped multiagent deep reinforcement learning. IEEE Internet Things J. 12, 19459\u201319470. <a href=\"https:\/\/doi.org\/10.1109\/JIOT.2025.3542119\" data-track=\"click_references\" data-track-action=\"external reference\" data-track-value=\"external reference\" data-track-label=\"10.1109\/JIOT.2025.3542119\" rel=\"nofollow noopener\" target=\"_blank\">https:\/\/doi.org\/10.1109\/JIOT.2025.3542119<\/a> (2025).<\/p>\n<p class=\"c-article-references__links u-hide-print\"><a data-track=\"click_references\" rel=\"nofollow noopener\" data-track-label=\"10.1109\/JIOT.2025.3542119\" data-track-item_id=\"10.1109\/JIOT.2025.3542119\" data-track-value=\"article reference\" data-track-action=\"article reference\" href=\"https:\/\/doi.org\/10.1109%2FJIOT.2025.3542119\" aria-label=\"Article reference 47\" data-doi=\"10.1109\/JIOT.2025.3542119\" target=\"_blank\">Article<\/a>\u00a0<br \/>\n    <a data-track=\"click_references\" data-track-action=\"google scholar reference\" data-track-value=\"google scholar reference\" data-track-label=\"link\" data-track-item_id=\"link\" rel=\"nofollow noopener\" aria-label=\"Google Scholar reference 47\" href=\"http:\/\/scholar.google.com\/scholar_lookup?&amp;title=Defending%20against%20APT%20attacks%20in%20cloud%20computing%20environments%20using%20grouped%20multiagent%20deep%20reinforcement%20learning&amp;journal=IEEE%20Internet%20Things%20J.&amp;doi=10.1109%2FJIOT.2025.3542119&amp;volume=12&amp;pages=19459-19470&amp;publication_year=2025&amp;author=Chen%2CJ\" target=\"_blank\"><br \/>\n                    Google Scholar<\/a>\u00a0\n                <\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR48\">Verma, S. AI-driven autonomous incident response: Revolutionizing cybersecurity operations with real-time threat mitigation. Int. J. Commun. Networks Inf. Secur. 17, 69\u201378 (2025).<\/p>\n<p class=\"c-article-references__links u-hide-print\"><a data-track=\"click_references\" data-track-action=\"google scholar reference\" data-track-value=\"google scholar reference\" data-track-label=\"link\" data-track-item_id=\"link\" rel=\"nofollow noopener\" aria-label=\"Google Scholar reference 48\" href=\"http:\/\/scholar.google.com\/scholar_lookup?&amp;title=AI-driven%20autonomous%20incident%20response%3A%20Revolutionizing%20cybersecurity%20operations%20with%20real-time%20threat%20mitigation&amp;journal=Int.%20J.%20Commun.%20Networks%20Inf.%20Secur.&amp;volume=17&amp;pages=69-78&amp;publication_year=2025&amp;author=Verma%2CS\" target=\"_blank\"><br \/>\n                    Google Scholar<\/a>\u00a0\n                <\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR49\">Rebet, J. AI automated incident response and threat mitigation using AI. In Revolutionizing Cybersecurity With Deep Learning and Large Language Models 201\u2013236 (2025).<\/p>\n<p class=\"c-article-references__links u-hide-print\"><a data-track=\"click_references\" data-track-action=\"google scholar reference\" data-track-value=\"google scholar reference\" data-track-label=\"link\" data-track-item_id=\"link\" rel=\"nofollow noopener\" aria-label=\"Google Scholar reference 49\" href=\"http:\/\/scholar.google.com\/scholar_lookup?&amp;title=AI%20automated%20incident%20response%20and%20threat%20mitigation%20using%20AI&amp;pages=201-236&amp;publication_year=2025&amp;author=Rebet%2CJ\" target=\"_blank\"><br \/>\n                    Google Scholar<\/a>\u00a0\n                <\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR50\">Omar, M. et al. (eds) Integrating Artificial Intelligence in Cybersecurity and Forensic Practices (IGI Global, 2025). <a href=\"https:\/\/doi.org\/10.4018\/979-8-3373-0588-2\" data-track=\"click_references\" data-track-action=\"external reference\" data-track-value=\"external reference\" data-track-label=\"10.4018\/979-8-3373-0588-2\" rel=\"nofollow noopener\" target=\"_blank\">https:\/\/doi.org\/10.4018\/979-8-3373-0588-2<\/a>.<\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR51\">Al-Thani, G. M. The AIM-PRISM framework: A novel strategic model for machine learning and artificial intelligence deployment in national infrastructure cybersecurity. Adv. Artif. Intell. Mach. Learn. 5, 4053\u20134073 (2025).<\/p>\n<p class=\"c-article-references__links u-hide-print\"><a data-track=\"click_references\" data-track-action=\"google scholar reference\" data-track-value=\"google scholar reference\" data-track-label=\"link\" data-track-item_id=\"link\" rel=\"nofollow noopener\" aria-label=\"Google Scholar reference 51\" href=\"http:\/\/scholar.google.com\/scholar_lookup?&amp;title=The%20AIM-PRISM%20framework%3A%20A%20novel%20strategic%20model%20for%20machine%20learning%20and%20artificial%20intelligence%20deployment%20in%20national%20infrastructure%20cybersecurity&amp;journal=Adv.%20Artif.%20Intell.%20Mach.%20Learn.&amp;volume=5&amp;pages=4053-4073&amp;publication_year=2025&amp;author=Al-Thani%2CGM\" target=\"_blank\"><br \/>\n                    Google Scholar<\/a>\u00a0\n                <\/p>\n<p class=\"c-article-references__text\" id=\"ref-CR52\">Sharafaldin, I., Habibi Lashkari, A. &amp; Ghorbani, A. A. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization. In Proceedings of the 4th International Conference on Information Systems Security and Privacy, Funchal, 22\u201324 January 2018, 108\u2013116 (2018). <a href=\"https:\/\/doi.org\/10.5220\/0006639801080116\" data-track=\"click_references\" data-track-action=\"external reference\" data-track-value=\"external reference\" data-track-label=\"10.5220\/0006639801080116\" rel=\"nofollow noopener\" target=\"_blank\">https:\/\/doi.org\/10.5220\/0006639801080116<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"Kirmani, F., Unni, A. S., Kulkarni, V. P., Lackey, K. &amp; Rose, J. R. Detecting polar ring galaxies&hellip;\n","protected":false},"author":2,"featured_media":1458,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[24,25,1393,1740,1739,372,1743,1741,1737,1742,1738,1744,160],"class_list":{"0":"post-1457","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ai","8":"tag-ai","9":"tag-artificial-intelligence","10":"tag-cyber-security","11":"tag-cyber-attack-simulation","12":"tag-cyber-range","13":"tag-engineering","14":"tag-humanities-and-social-sciences","15":"tag-incident-response","16":"tag-mathematics-and-computing","17":"tag-model-validation","18":"tag-multi-agent-systems","19":"tag-multidisciplinary","20":"tag-science"},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts\/1457","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/comments?post=1457"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts\/1457\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/media\/1458"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/media?parent=1457"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/categories?post=1457"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/tags?post=1457"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}