1. Andrew, A., Spillard, S., Collyer, J., Dhir, N.: Developing optimal causal cyber-defence agents via cyber security simulation (2022). https://doi.org/10.48550/ARXIV.2207.12355
2. Bodeau, D., Graubart, R., Heinbockel, W.: Mapping the cyber terrain: Enabling cyber defensibility claims and hypotheses to be stated and evaluated with greater rigor and utility. Tech. rep., The MITRE Corporation., Bedford, MA, USA (2013). https://www.mitre.org/sites/default/files/publications/mapping-cyber-terrain-13-4175.pdf
3. Brockman, G., Cheung, V., Pettersson, L., Schneider, J., Schulman, J., Tang, J., Zaremba, W.: Openai gym (2016). https://doi.org/10.48550/ARXIV.1606.01540
4. Drasar, M.: Cyst api documentation (2023), https://muni.cz/go/cyst/
5. Li, L., Fayad, R., Taylor, A.: Cygil: A cyber gym for training autonomous agents over emulated network systems (2021). https://doi.org/10.48550/ARXIV.2109.03331