共 51 条
[2]
Bowman J.C. Maxwell Standen David, 2022, Cyber Operations Research Gym
[3]
Brockman G, 2016, Arxiv, DOI arXiv:1606.01540
[5]
Cody T, 2022, Arxiv, DOI [arXiv:2206.06934, 10.48550/arXiv.2206.06934, DOI 10.48550/ARXIV.2206.06934]
[6]
Confido A., 2022, AEROSP CONF PROC, P1, DOI [10.1109/AERO53065.2022.9843459, DOI 10.1109/AERO53065.2022.9843459]
[7]
CyberMAR, 2020, Cyber preparedness actions for a holistic approach and awareness raising in the MARitime logistics supply chain D2.1: State of the art cyber range technologies analysis
[8]
Da Silva FL, 2019, J ARTIF INTELL RES, V64, P645
[9]
Fujimoto S., 2021, arXiv
[10]
Crown Jewels Analysis using Reinforcement Learning with Attack Graphs
[J].
2021 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI 2021),
2021,