{"id":"https://openalex.org/W4402811765","doi":"https://doi.org/10.1109/csr61664.2024.10679456","title":"Structural Generalization in Autonomous Cyber Incident Response with Message-Passing Neural Networks and Reinforcement Learning","display_name":"Structural Generalization in Autonomous Cyber Incident Response with Message-Passing Neural Networks and Reinforcement Learning","publication_year":2024,"publication_date":"2024-09-02","ids":{"openalex":"https://openalex.org/W4402811765","doi":"https://doi.org/10.1109/csr61664.2024.10679456"},"language":"en","primary_location":{"id":"doi:10.1109/csr61664.2024.10679456","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/csr61664.2024.10679456","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063844844","display_name":"Jakob Nyberg","orcid":null},"institutions":[{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Jakob Nyberg","raw_affiliation_strings":["KTH Royal Institute of Technology,Division of Network and Systems Engineering,Stockholm,Sweden"],"affiliations":[{"raw_affiliation_string":"KTH Royal Institute of Technology,Division of Network and Systems Engineering,Stockholm,Sweden","institution_ids":["https://openalex.org/I86987016"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001314969","display_name":"Pontus Johnson","orcid":"https://orcid.org/0000-0002-3293-1681"},"institutions":[{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Pontus Johnson","raw_affiliation_strings":["KTH Royal Institute of Technology,Division of Network and Systems Engineering,Stockholm,Sweden"],"affiliations":[{"raw_affiliation_string":"KTH Royal Institute of Technology,Division of Network and Systems Engineering,Stockholm,Sweden","institution_ids":["https://openalex.org/I86987016"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5063844844"],"corresponding_institution_ids":["https://openalex.org/I86987016"],"apc_list":null,"apc_paid":null,"fwci":0.3491,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.66805428,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"282","last_page":"289"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.7538999915122986,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.7538999915122986,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10320","display_name":"Neural Networks and Applications","score":0.7052000164985657,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12597","display_name":"Fire Detection and Safety Systems","score":0.683899998664856,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7568561434745789},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.693859338760376},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.662630558013916},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5180673599243164},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.44795525074005127},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.06996941566467285}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7568561434745789},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.693859338760376},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.662630558013916},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5180673599243164},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.44795525074005127},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.06996941566467285},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csr61664.2024.10679456","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/csr61664.2024.10679456","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1964439345","https://openalex.org/W2952298682","https://openalex.org/W3020831056","https://openalex.org/W3087257704","https://openalex.org/W3094504436","https://openalex.org/W3107852229","https://openalex.org/W4214717370","https://openalex.org/W4284965199","https://openalex.org/W4307964230","https://openalex.org/W4315487473","https://openalex.org/W4327652719","https://openalex.org/W4388451722","https://openalex.org/W4388886462","https://openalex.org/W6754929296","https://openalex.org/W6762003241","https://openalex.org/W6800884497","https://openalex.org/W6847574825","https://openalex.org/W6859504901","https://openalex.org/W6998288973"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4306904969","https://openalex.org/W3162204513","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2138720691","https://openalex.org/W2376932109","https://openalex.org/W4362501864"],"abstract_inverted_index":{"We":[0,41,106,134],"believe":[1],"that":[2,127,158],"agents":[3,32,147,159],"for":[4,33,119],"automated":[5],"incident":[6,125],"response":[7],"based":[8],"on":[9,110,130,153,195],"machine":[10],"learning":[11],"need":[12,190],"to":[13,43,62,165,170,191],"handle":[14],"changes":[15,36,169],"in":[16,27,177],"network":[17,35,73,92,140,197],"structure.":[18],"Computer":[19],"networks":[20],"are":[21,60,100,148,163],"dynamic,":[22],"and":[23,39,80,93,146,173,204],"can":[24,174],"naturally":[25],"change":[26],"structure":[28],"over":[29],"time.":[30],"Retraining":[31],"small":[34],"costs":[37],"time":[38],"energy.":[40],"attempt":[42],"address":[44],"this":[45],"issue":[46],"with":[47,141],"an":[48,94,131],"existing":[49],"method":[50],"of":[51,70,114,137,144],"relational":[52,78,161],"agent":[53,95],"learning,":[54],"where":[55],"the":[56,71,98,108,111,115,138,171,182],"relations":[57],"between":[58,202],"objects":[59],"assumed":[61],"remain":[63],"consistent":[64],"across":[65],"problem":[66],"instances.":[67,179],"The":[68,88],"state":[69,185],"computer":[72],"is":[74],"represented":[75],"as":[76],"a":[77,83,123,200],"graph":[79],"encoded":[81],"through":[82],"message":[84,89],"passing":[85,90],"neural":[86,91],"network.":[87,133],"policy":[96],"using":[97,103,160,181],"encoding":[99],"optimized":[101],"end-to-end":[102],"reinforcement":[104],"learning.":[105],"evaluate":[107],"approach":[109],"second":[112],"instance":[113],"Cyber":[116],"Autonomy":[117],"Gym":[118],"Experimentation":[120],"(CAGE":[121],"2),":[122],"cyber":[124],"simulator":[126],"simulates":[128],"attacks":[129],"enterprise":[132],"create":[135],"variants":[136],"original":[139],"different":[142],"numbers":[143],"hosts":[145],"tested":[149],"without":[150],"additional":[151],"training":[152],"them.":[154],"Our":[155],"results":[156],"show":[157],"information":[162],"able":[164],"find":[166],"solutions":[167],"despite":[168],"network,":[172],"perform":[175,187],"optimally":[176],"some":[178],"Agents":[180],"default":[183],"vector":[184],"representation":[186],"better,":[188],"but":[189],"be":[192],"specially":[193],"trained":[194],"each":[196],"variant,":[198],"demonstrating":[199],"trade-off":[201],"specialization":[203],"generalization.":[205]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
