ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2009.08120
  4. Cited By
Finding Effective Security Strategies through Reinforcement Learning and
  Self-Play
v1v2 (latest)

Finding Effective Security Strategies through Reinforcement Learning and Self-Play

17 September 2020
K. Hammar
Rolf Stadler
    AAML
ArXiv (abs)PDFHTML

Papers citing "Finding Effective Security Strategies through Reinforcement Learning and Self-Play"

27 / 27 papers shown
Title
Adapting Under Fire: Multi-Agent Reinforcement Learning for Adversarial Drift in Network Security
Adapting Under Fire: Multi-Agent Reinforcement Learning for Adversarial Drift in Network Security
Emilia Rivas
Sabrina Saika
Ahtesham Bakht
Aritran Piplai
Nathaniel D. Bastian
Ankit Shah
AAML
15
0
0
06 Jun 2025
A Unified Modeling Framework for Automated Penetration Testing
A Unified Modeling Framework for Automated Penetration Testing
Yunfei Wang
Shixuan Liu
Wenhao Wang
Changling Zhou
Chao Zhang
Jiandong Jin
Cheng Zhu
86
2
0
17 Feb 2025
Entity-based Reinforcement Learning for Autonomous Cyber Defence
Entity-based Reinforcement Learning for Autonomous Cyber Defence
Isaac Symes Thompson
Alberto Caron
Chris Hicks
V. Mavroudis
AAML
193
3
0
23 Oct 2024
Enhancing Two-Player Performance Through Single-Player Knowledge
  Transfer: An Empirical Study on Atari 2600 Games
Enhancing Two-Player Performance Through Single-Player Knowledge Transfer: An Empirical Study on Atari 2600 Games
Kimiya Saadat
Richard Zhao
74
0
0
22 Oct 2024
Elements of disinformation theory: cyber engagement via increasing
  adversary information consumption
Elements of disinformation theory: cyber engagement via increasing adversary information consumption
Travis Cuvelier
Sean Ha
Maretta Morovitz
28
0
0
18 Oct 2024
A Survey for Deep Reinforcement Learning Based Network Intrusion
  Detection
A Survey for Deep Reinforcement Learning Based Network Intrusion Detection
Wanrong Yang
Alberto Acuto
Yihang Zhou
Dominik Wojtczak
OffRL
110
3
0
25 Sep 2024
Optimal Defender Strategies for CAGE-2 using Causal Modeling and Tree
  Search
Optimal Defender Strategies for CAGE-2 using Causal Modeling and Tree Search
K. Hammar
Neil Dhir
Rolf Stadler
62
3
0
12 Jul 2024
Structural Generalization in Autonomous Cyber Incident Response with
  Message-Passing Neural Networks and Reinforcement Learning
Structural Generalization in Autonomous Cyber Incident Response with Message-Passing Neural Networks and Reinforcement Learning
Jakob Nyberg
Pontus Johnson
70
1
0
08 Jul 2024
Competing for pixels: a self-play algorithm for weakly-supervised
  segmentation
Competing for pixels: a self-play algorithm for weakly-supervised segmentation
Shaheer U. Saeed
Shiqi Huang
João Ramalhinho
Iani J. M. B. Gayo
Nina Montaña-Brown
...
Stephen P. Pereira
Brian R. Davidson
D. Barratt
Matthew J. Clarkson
Yipeng Hu
107
0
0
26 May 2024
The Path To Autonomous Cyber Defense
The Path To Autonomous Cyber Defense
Sean Oesch
Phillipe Austria
Amul Chaulagain
Brian Weber
Cory L. Watson
Matthew Dixson
Amir Sadovnik
AAML
67
0
0
12 Apr 2024
Intrusion Tolerance for Networked Systems through Two-Level Feedback
  Control
Intrusion Tolerance for Networked Systems through Two-Level Feedback Control
K. Hammar
Rolf Stadler
58
1
0
02 Apr 2024
Automated Security Response through Online Learning with Adaptive Conjectures
Automated Security Response through Online Learning with Adaptive Conjectures
K. Hammar
Tao Li
Rolf Stadler
Quanyan Zhu
72
5
0
19 Feb 2024
Canaries and Whistles: Resilient Drone Communication Networks with (or
  without) Deep Reinforcement Learning
Canaries and Whistles: Resilient Drone Communication Networks with (or without) Deep Reinforcement Learning
Chris Hicks
V. Mavroudis
Myles Foley
Thomas Davies
Kate Highnam
Tim Watson
59
7
0
08 Dec 2023
Scalable Learning of Intrusion Responses through Recursive Decomposition
Scalable Learning of Intrusion Responses through Recursive Decomposition
K. Hammar
Rolf Stadler
46
8
0
06 Sep 2023
Learning Cyber Defence Tactics from Scratch with Multi-Agent
  Reinforcement Learning
Learning Cyber Defence Tactics from Scratch with Multi-Agent Reinforcement Learning
Jacob Wiebe
Ranwa Al Mallah
Li Li
AAML
52
4
0
25 Aug 2023
Out of the Cage: How Stochastic Parrots Win in Cyber Security
  Environments
Out of the Cage: How Stochastic Parrots Win in Cyber Security Environments
M. Rigaki
Ondrej Lukás
C. Catania
Sebastian Garcia
LLMAG
63
12
0
23 Aug 2023
NASimEmu: Network Attack Simulator & Emulator for Training Agents
  Generalizing to Novel Scenarios
NASimEmu: Network Attack Simulator & Emulator for Training Agents Generalizing to Novel Scenarios
Jaromír Janisch
Tomávs Pevný
Viliam Lisý
78
19
0
26 May 2023
Automated Cyber Defence: A Review
Automated Cyber Defence: A Review
Sanyam Vyas
J. Hannay
A. Bolton
Pete Burnap
82
22
0
08 Mar 2023
Catch Me If You Can: Improving Adversaries in Cyber-Security With
  Q-Learning Algorithms
Catch Me If You Can: Improving Adversaries in Cyber-Security With Q-Learning Algorithms
Arti Bandhana
Ondrej Lukás
Sebastian Garcia
T. Kroupa
AAML
14
2
0
07 Feb 2023
Learning Near-Optimal Intrusion Responses Against Dynamic Attackers
Learning Near-Optimal Intrusion Responses Against Dynamic Attackers
K. Hammar
Rolf Stadler
AAML
57
13
0
11 Jan 2023
Beyond CAGE: Investigating Generalization of Learned Autonomous Network
  Defense Policies
Beyond CAGE: Investigating Generalization of Learned Autonomous Network Defense Policies
M. Wolk
A. Applebaum
Camron Dennler
P. Dwyer
M. Moskowitz
...
N. Nichols
Nicole Park
Paul Rachwalski
Frank Rau
A. Webster
OffRLAAML
90
18
0
28 Nov 2022
Learning Security Strategies through Game Play and Optimal Stopping
Learning Security Strategies through Game Play and Optimal Stopping
K. Hammar
Rolf Stadler
AAML
78
10
0
29 May 2022
A System for Interactive Examination of Learned Security Policies
A System for Interactive Examination of Learned Security Policies
K. Hammar
Rolf Stadler
68
5
0
03 Apr 2022
Intrusion Prevention through Optimal Stopping
Intrusion Prevention through Optimal Stopping
K. Hammar
Rolf Stadler
145
22
0
30 Oct 2021
Learning Intrusion Prevention Policies through Optimal Stopping
Learning Intrusion Prevention Policies through Optimal Stopping
K. Hammar
Rolf Stadler
93
22
0
14 Jun 2021
Prospective Artificial Intelligence Approaches for Active Cyber Defence
Prospective Artificial Intelligence Approaches for Active Cyber Defence
Neil Dhir
H. Hoeltgebaum
N. Adams
M. Briers
A. Burke
Paul Jones
AAML
74
28
0
20 Apr 2021
DeepStack: Expert-Level Artificial Intelligence in No-Limit Poker
DeepStack: Expert-Level Artificial Intelligence in No-Limit Poker
Matej Moravcík
Martin Schmid
Neil Burch
Viliam Lisý
Dustin Morrill
Nolan Bard
Trevor Davis
Kevin Waugh
Michael Bradley Johanson
Michael Bowling
BDL
261
913
0
06 Jan 2017
1