{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:53:10Z","timestamp":1730292790177,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,20]],"date-time":"2022-12-20T00:00:00Z","timestamp":1671494400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,20]],"date-time":"2022-12-20T00:00:00Z","timestamp":1671494400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,20]]},"DOI":"10.1109\/rivf55975.2022.10013801","type":"proceedings-article","created":{"date-parts":[[2023,1,18]],"date-time":"2023-01-18T18:54:15Z","timestamp":1674068055000},"page":"41-46","source":"Crossref","is-referenced-by-count":2,"title":["Leveraging Deep Reinforcement Learning for Automating Penetration Testing in Reconnaissance and Exploitation Phase"],"prefix":"10.1109","author":[{"given":"Le Van","family":"Hoang","sequence":"first","affiliation":[{"name":"University of Information Technology,Information Security Laboratory,Ho Chi Minh city,Vietnam"}]},{"given":"Nguyen Xuan","family":"Nhu","sequence":"additional","affiliation":[{"name":"University of Information Technology,Information Security Laboratory,Ho Chi Minh city,Vietnam"}]},{"given":"To Trong","family":"Nghia","sequence":"additional","affiliation":[{"name":"University of Information Technology,Information Security Laboratory,Ho Chi Minh city,Vietnam"}]},{"given":"Nguyen Huu","family":"Quyen","sequence":"additional","affiliation":[{"name":"University of Information Technology,Information Security Laboratory,Ho Chi Minh city,Vietnam"}]},{"given":"Van-Hau","family":"Pham","sequence":"additional","affiliation":[{"name":"University of Information Technology,Information Security Laboratory,Ho Chi Minh city,Vietnam"}]},{"given":"Phan The","family":"Duy","sequence":"additional","affiliation":[{"name":"University of Information Technology,Information Security Laboratory,Ho Chi Minh city,Vietnam"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1080\/01639625.2015.1026766"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.23"},{"journal-title":"Insecure. Com LLC (US)","article-title":"Nmap network scanning: The official Nmap project guide to network discovery and security scanning","year":"2008","author":"Lyon","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.strusafe.2004.11.003"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2019.23026"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CINTI.2014.7028682"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3038769"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3121870"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102543"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2908033"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2022.105116"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW51379.2020.00010"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00041"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102108"},{"volume-title":"Deep exploit","year":"2018","author":"Takaesu","key":"ref15"},{"journal-title":"Asynchronous methods for deep reinforcement learning","year":"2016","author":"Mnih","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/c2010-0-68339-8"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1998.674402"},{"volume-title":"Deep Reinforcement Learning Hands-On","year":"2018","author":"Lapan","key":"ref19"},{"journal-title":"Heaton Research, Inc.","article-title":"Introduction to Neural Networks for Java","year":"2008","author":"Heaton","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3850\/978-981-09-5247-1_017"}],"event":{"name":"2022 RIVF International Conference on Computing and Communication Technologies (RIVF)","start":{"date-parts":[[2022,12,20]]},"location":"Ho Chi Minh City, Vietnam","end":{"date-parts":[[2022,12,22]]}},"container-title":["2022 RIVF International Conference on Computing and Communication Technologies (RIVF)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10013784\/10013785\/10013801.pdf?arnumber=10013801","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T08:26:01Z","timestamp":1707812761000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10013801\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,20]]},"references-count":21,"URL":"http:\/\/dx.doi.org\/10.1109\/rivf55975.2022.10013801","relation":{},"subject":[],"published":{"date-parts":[[2022,12,20]]}}}