{"id":"https://openalex.org/W4411252260","doi":"https://doi.org/10.32604/cmc.2025.064849","title":"Multi-Agent Reinforcement Learning for Moving Target Defense Temporal Decision-Making Approach Based on Stackelberg-FlipIt Games","display_name":"Multi-Agent Reinforcement Learning for Moving Target Defense Temporal Decision-Making Approach Based on Stackelberg-FlipIt Games","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4411252260","doi":"https://doi.org/10.32604/cmc.2025.064849"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.064849","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.064849","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.064849","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018410806","display_name":"Rongbo Sun","orcid":"https://orcid.org/0000-0002-7985-859X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Rongbo Sun","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027205215","display_name":"Jinlong Fei","orcid":"https://orcid.org/0000-0001-8499-9402"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jinlong Fei","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5107677410","display_name":"Yuefei Zhu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yuefei Zhu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5003040998","display_name":"Zhongyu Guo","orcid":"https://orcid.org/0000-0002-3130-5929"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhongyu Guo","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5018410806"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.1561,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.92204985,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"84","issue":"2","first_page":"3765","last_page":"3786"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.7062000036239624,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.7062000036239624,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13832","display_name":"Advanced Decision-Making Techniques","score":0.6582000255584717,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11500","display_name":"Evacuation and Crowd Dynamics","score":0.6287000179290771,"subfield":{"id":"https://openalex.org/subfields/2212","display_name":"Ocean Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/stackelberg-competition","display_name":"Stackelberg competition","score":0.9226651191711426},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.76458740234375},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.566321611404419},{"id":"https://openalex.org/keywords/reinforcement","display_name":"Reinforcement","score":0.434159517288208},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3917524516582489},{"id":"https://openalex.org/keywords/mathematical-economics","display_name":"Mathematical economics","score":0.17562022805213928},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.13326102495193481},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12263727188110352},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.08735057711601257}],"concepts":[{"id":"https://openalex.org/C199510392","wikidata":"https://www.wikidata.org/wiki/Q1184602","display_name":"Stackelberg competition","level":2,"score":0.9226651191711426},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.76458740234375},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.566321611404419},{"id":"https://openalex.org/C67203356","wikidata":"https://www.wikidata.org/wiki/Q1321905","display_name":"Reinforcement","level":2,"score":0.434159517288208},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3917524516582489},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.17562022805213928},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.13326102495193481},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12263727188110352},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.08735057711601257}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.064849","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.064849","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.064849","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.064849","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.7599999904632568,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W2015787697","https://openalex.org/W2586923975","https://openalex.org/W2789479919","https://openalex.org/W2907753699","https://openalex.org/W2989340622","https://openalex.org/W2996903041","https://openalex.org/W3011877530","https://openalex.org/W3132137315","https://openalex.org/W3169925227","https://openalex.org/W3196273218","https://openalex.org/W3203693215","https://openalex.org/W4213292645","https://openalex.org/W4301431031","https://openalex.org/W4321490422"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W1987562536","https://openalex.org/W4383533535","https://openalex.org/W2375814310","https://openalex.org/W4255938919","https://openalex.org/W2903244929","https://openalex.org/W4380353856","https://openalex.org/W2347216446"],"abstract_inverted_index":{"Moving":[0],"Target":[1],"Defense":[2],"(MTD)":[3],"necessitates":[4],"scientifically":[5],"effective":[6],"decision-making":[7],"methodologies":[8],"for":[9],"defensive":[10,58],"technology":[11],"implementation.":[12],"While":[13],"most":[14],"MTD":[15,38,52,101,119],"decision":[16],"studies":[17],"focus":[18],"on":[19],"accurately":[20],"identifying":[21],"optimal":[22,27],"strategies,":[23,136],"the":[24,95,116],"issue":[25],"of":[26,51,100,118],"defense":[28,167],"timing":[29,50],"remains":[30],"underexplored.":[31],"Current":[32],"default":[33],"approaches\u2014periodic":[34],"or":[35],"overly":[36],"frequent":[37],"triggers\u2014lead":[39],"to":[40,108,132],"suboptimal":[41],"trade-offs":[42],"among":[43],"system":[44],"security,":[45,147],"performance,":[46,148],"and":[47,60,150,165,173],"cost.":[48],"The":[49],"strategy":[53,163],"activation":[54],"critically":[55],"impacts":[56],"both":[57],"efficacy":[59],"operational":[61],"overhead,":[62],"yet":[63],"existing":[64],"frameworks":[65],"inadequately":[66],"address":[67,156],"this":[68,73,75,123],"temporal":[69,135],"dimension.":[70],"To":[71],"bridge":[72],"gap,":[74],"paper":[76],"proposes":[77],"a":[78,105,139],"Stackelberg-FlipIt":[79],"game":[80],"model":[81],"that":[82,144],"formalizes":[83],"asymmetric":[84],"cyber":[85],"conflicts":[86],"as":[87],"alternating":[88],"control":[89],"over":[90],"attack":[91],"surfaces,":[92],"thereby":[93],"capturing":[94],"dynamic":[96],"security":[97],"state":[98],"evolution":[99],"systems.":[102],"We":[103],"introduce":[104],"belief":[106],"factor":[107],"quantify":[109],"information":[110],"asymmetry":[111],"during":[112],"adversarial":[113],"interactions,":[114],"enhancing":[115],"precision":[117],"trigger":[120],"timing.":[121,151],"Leveraging":[122],"game-theoretic":[124],"foundation,":[125],"we":[126],"employ":[127],"Multi-Agent":[128],"Reinforcement":[129],"Learning":[130],"(MARL)":[131],"derive":[133],"adaptive":[134],"optimized":[137],"via":[138],"novel":[140],"four-dimensional":[141],"reward":[142],"function":[143],"holistically":[145],"balances":[146],"cost,":[149],"Experimental":[152],"validation":[153],"using":[154],"IP":[155],"mutation":[157],"against":[158],"scanning":[159],"attacks":[160],"demonstrates":[161],"stable":[162],"convergence":[164],"accelerated":[166],"response,":[168],"significantly":[169],"improving":[170],"cybersecurity":[171],"affordability":[172],"effectiveness.":[174]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
