{"id":"https://openalex.org/W4410203952","doi":"https://doi.org/10.1109/mis.2025.3568209","title":"Leveraging Large Language Models for Autonomous Cyber Defense: Insights from CAGE-2 Simulations","display_name":"Leveraging Large Language Models for Autonomous Cyber Defense: Insights from CAGE-2 Simulations","publication_year":2025,"publication_date":"2025-05-08","ids":{"openalex":"https://openalex.org/W4410203952","doi":"https://doi.org/10.1109/mis.2025.3568209"},"language":"en","primary_location":{"id":"doi:10.1109/mis.2025.3568209","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mis.2025.3568209","pdf_url":null,"source":{"id":"https://openalex.org/S114241109","display_name":"IEEE Intelligent Systems","issn_l":"1541-1672","issn":["1541-1672","1941-1294"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Intelligent Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075713560","display_name":"Hatam Mohammadi","orcid":null},"institutions":[{"id":"https://openalex.org/I107656453","display_name":"South Australia Pathology","ror":"https://ror.org/01kvtm035","country_code":"AU","type":"nonprofit","lineage":["https://openalex.org/I107656453"]},{"id":"https://openalex.org/I5681781","display_name":"The University of Adelaide","ror":"https://ror.org/00892tw58","country_code":"AU","type":"education","lineage":["https://openalex.org/I5681781"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Hamoun Mohammadi","raw_affiliation_strings":["Defence and Security Institute, The University of Adelaide, Adelaide, SA, Australia","Defence &amp; Security Institute, The University of Adelaide, Australia"],"affiliations":[{"raw_affiliation_string":"Defence and Security Institute, The University of Adelaide, Adelaide, SA, Australia","institution_ids":["https://openalex.org/I5681781","https://openalex.org/I107656453"]},{"raw_affiliation_string":"Defence &amp; Security Institute, The University of Adelaide, Australia","institution_ids":["https://openalex.org/I5681781"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074469456","display_name":"Jonathan J. Davis","orcid":null},"institutions":[{"id":"https://openalex.org/I1303474014","display_name":"Defence Science and Technology Group","ror":"https://ror.org/05ddrvt52","country_code":"AU","type":"funder","lineage":["https://openalex.org/I1303474014","https://openalex.org/I2801453606","https://openalex.org/I3139952251"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jonathan J. Davis","raw_affiliation_strings":["Defence Science and Technology Group, Edinburgh, SA, Australia","Defence Science &amp; Technology Group, Adelaide, Australia"],"affiliations":[{"raw_affiliation_string":"Defence Science and Technology Group, Edinburgh, SA, Australia","institution_ids":["https://openalex.org/I1303474014"]},{"raw_affiliation_string":"Defence Science &amp; Technology Group, Adelaide, Australia","institution_ids":["https://openalex.org/I1303474014"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110857106","display_name":"Mitchell Kiely","orcid":null},"institutions":[{"id":"https://openalex.org/I1303474014","display_name":"Defence Science and Technology Group","ror":"https://ror.org/05ddrvt52","country_code":"AU","type":"funder","lineage":["https://openalex.org/I1303474014","https://openalex.org/I2801453606","https://openalex.org/I3139952251"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Mitchell Kiely","raw_affiliation_strings":["Defence Science and Technology Group, Edinburgh, SA, Australia","Defence Science &amp; Technology Group, Adelaide, Australia"],"affiliations":[{"raw_affiliation_string":"Defence Science and Technology Group, Edinburgh, SA, Australia","institution_ids":["https://openalex.org/I1303474014"]},{"raw_affiliation_string":"Defence Science &amp; Technology Group, Adelaide, Australia","institution_ids":["https://openalex.org/I1303474014"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5075713560"],"corresponding_institution_ids":["https://openalex.org/I107656453","https://openalex.org/I5681781"],"apc_list":null,"apc_paid":null,"fwci":4.1786,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.93627422,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"40","issue":"4","first_page":"29","last_page":"36"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.8841000199317932,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.8841000199317932,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.8292999863624573,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13650","display_name":"Computational Physics and Python Applications","score":0.8134999871253967,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8095041513442993},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.37885355949401855},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34229278564453125}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8095041513442993},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.37885355949401855},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34229278564453125}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mis.2025.3568209","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mis.2025.3568209","pdf_url":null,"source":{"id":"https://openalex.org/S114241109","display_name":"IEEE Intelligent Systems","issn_l":"1541-1672","issn":["1541-1672","1941-1294"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Intelligent Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W4361866031","https://openalex.org/W4392305745","https://openalex.org/W6778883912","https://openalex.org/W6780559895","https://openalex.org/W6800884497","https://openalex.org/W6846254642","https://openalex.org/W6850503672","https://openalex.org/W6850625674","https://openalex.org/W6853465110","https://openalex.org/W6864563952","https://openalex.org/W6872930630"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"The":[0,56],"ability":[1],"of":[2,67,99,109],"large":[3],"language":[4],"models":[5],"(LLMs)":[6],"to":[7,62,94,121],"interpret":[8,63],"and":[9,18,40,70,101,126],"generate":[10],"human-like":[11],"text,":[12],"along":[13],"with":[14,85,96,106],"their":[15],"inbuilt":[16],"knowledge":[17],"reasoning":[19],"skills,":[20],"has":[21,143],"opened":[22],"the":[23,44,68,72,86,97,107,117],"door":[24],"for":[25],"many":[26],"new":[27],"applications.":[28],"We":[29,131],"develop":[30],"a":[31,53,59,64,77,145],"novel":[32],"LLM":[33,61,111,118,124,141],"agent":[34,57,92,119],"as":[35],"an":[36],"autonomous":[37],"cyber":[38],"defender":[39],"benchmark":[41],"it":[42],"using":[43],"CAGE-2":[45,95],"public":[46],"challenge":[47,69],"which":[48],"evaluates":[49],"submitted":[50,93],"agents":[51],"in":[52],"simulated":[54],"network.":[55],"uses":[58],"pre-trained":[60],"text":[65],"description":[66],"choose":[71],"best":[73],"defensive":[74],"action":[75],"given":[76],"network":[78],"observation.":[79],"Its":[80],"performance":[81],"is":[82],"on":[83],"par":[84],"most":[87],"successful":[88],"reinforcement":[89],"learning":[90],"(RL)":[91],"advantages":[98],"explainability":[100],"avoiding":[102],"training":[103],"episodes,":[104],"but":[105],"cost":[108],"requiring":[110],"prompt":[112,127],"engineering.":[113],"Lastly,":[114],"we":[115],"test":[116],"experimentally":[120],"explore":[122],"how":[123],"temperature":[125,142],"complexity":[128,135],"affect":[129],"performance.":[130],"show":[132],"that":[133],"higher":[134],"prompts":[136],"significantly":[137],"improve":[138],"performance,":[139],"while":[140],"only":[144],"minor":[146],"effect.":[147]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
