Advances in multi-core computing systems, networking, mobile and smart devices, complex software and Internet have enabled the development of revolutionary capabilities that have served many fields across industry, military and academia. However, along with these advances, vulnerabilities in the computing systems stemming from failure to enforce the semantics of computation, have led to an ever increasing number of attacks and their sophistication leading to heavy financial losses and Army mission risks. The current security techniques are mainly labor intensive (e.g., patch update), signature based, and not flexible enough to handle the complexity, dynamism and epidemic-style propagation of attacks. Furthermore, the organization boundaries are gradually disappearing so that the idea of creating a defendable perimeter becomes useless, and on top of that the attackers that we need to protect against, can be corrupted components or software modules within the system and yet who are trusted and have full access to computing system resources and services. Labor intensive are rapidly becoming infeasible in todays technological and data-driven climate. Data are collected at a rate that renders decision-based systems made by humans. Therefore, an autonomous decision making system that can adapt, react, and learn from real-time computer systems cannot be overstated enough.