McDonald, G., Li, L., & Al Mallah, R. (2024). Finding the optimal security policies for autonomous cyber operations with competitive reinforcement learning. IEEE Access, 12, 120292-120305. Lien externe