1. Analysis of security data from a large computing organization;Sharma,2011
2. A model-based, decision-theoretic perspective on automated cyber response;Booker,2020
3. CybORG: An autonomous cyber operations research gym;Baillie,2020
4. SCERM—A novel framework for automated management of cyber threat response activities;Iqbal;Future Gener. Comput. Syst.,2020
5. A. Applebaum, D. Miller, B. Strom, H. Foster, C. Thomas, Analysis of Automated Adversary Emulation Techniques, in: Proceedings of the Summer Simulation Multi-Conference, 2017, pp. 1–12.