{"id":"https://openalex.org/W4396799909","doi":"https://doi.org/10.1007/s10207-024-00860-w","title":"Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle","display_name":"Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle","publication_year":2024,"publication_date":"2024-05-10","ids":{"openalex":"https://openalex.org/W4396799909","doi":"https://doi.org/10.1007/s10207-024-00860-w"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-024-00860-w","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-024-00860-w","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-024-00860-w.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10207-024-00860-w.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003653101","display_name":"Alexandros Zacharis","orcid":"https://orcid.org/0009-0003-2615-1413"},"institutions":[{"id":"https://openalex.org/I1295585255","display_name":"European Union Agency for Network and Information Security","ror":"https://ror.org/00wqx6897","country_code":"GR","type":"government","lineage":["https://openalex.org/I1295585255","https://openalex.org/I1320481043"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Alexandros Zacharis","raw_affiliation_strings":["European Union Agency for Cybersecurity (ENISA), Chalandri, Greece"],"affiliations":[{"raw_affiliation_string":"European Union Agency for Cybersecurity (ENISA), Chalandri, Greece","institution_ids":["https://openalex.org/I1295585255"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037619435","display_name":"Vasilios Katos","orcid":"https://orcid.org/0000-0001-6132-3004"},"institutions":[{"id":"https://openalex.org/I9300472","display_name":"Bournemouth University","ror":"https://ror.org/05wwcw481","country_code":"GB","type":"education","lineage":["https://openalex.org/I9300472"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Vasilios Katos","raw_affiliation_strings":["Bournemouth University, Poole, UK"],"affiliations":[{"raw_affiliation_string":"Bournemouth University, Poole, UK","institution_ids":["https://openalex.org/I9300472"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074738466","display_name":"Constantinos Patsakis","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156054","display_name":"Athena Research and Innovation Center In Information Communication & Knowledge Technologies","ror":"https://ror.org/0576by029","country_code":"GR","type":"facility","lineage":["https://openalex.org/I4210156054"]},{"id":"https://openalex.org/I154757721","display_name":"University of Piraeus","ror":"https://ror.org/02qs84g94","country_code":"GR","type":"education","lineage":["https://openalex.org/I154757721"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Constantinos Patsakis","raw_affiliation_strings":["Athena Research Center, Marousi, Greece","Department of Informatics, University of Piraeus, Karaoli & Dimitriou 80, 18534, Piraeus, Greece"],"affiliations":[{"raw_affiliation_string":"Athena Research Center, Marousi, Greece","institution_ids":["https://openalex.org/I4210156054"]},{"raw_affiliation_string":"Department of Informatics, University of Piraeus, Karaoli & Dimitriou 80, 18534, Piraeus, Greece","institution_ids":["https://openalex.org/I154757721"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5074738466"],"corresponding_institution_ids":["https://openalex.org/I154757721","https://openalex.org/I4210156054"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":{"value":2590,"currency":"EUR","value_usd":3190},"fwci":9.9281,"has_fulltext":true,"cited_by_count":19,"citation_normalized_percentile":{"value":0.98172196,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"23","issue":"4","first_page":"2691","last_page":"2710"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11891","display_name":"Big Data and Business Intelligence","score":0.9886000156402588,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11891","display_name":"Big Data and Business Intelligence","score":0.9886000156402588,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13398","display_name":"Data Analysis with R","score":0.9708999991416931,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.953000009059906,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/preparedness","display_name":"Preparedness","score":0.7157215476036072},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6697796583175659},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.613764762878418},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.4719616174697876},{"id":"https://openalex.org/keywords/replicate","display_name":"Replicate","score":0.4302203059196472},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.4172886610031128},{"id":"https://openalex.org/keywords/security-domain","display_name":"Security domain","score":0.4156739413738251},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3966689705848694},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.22374922037124634}],"concepts":[{"id":"https://openalex.org/C2777042776","wikidata":"https://www.wikidata.org/wiki/Q4583103","display_name":"Preparedness","level":2,"score":0.7157215476036072},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6697796583175659},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.613764762878418},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.4719616174697876},{"id":"https://openalex.org/C2781162219","wikidata":"https://www.wikidata.org/wiki/Q26250693","display_name":"Replicate","level":2,"score":0.4302203059196472},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.4172886610031128},{"id":"https://openalex.org/C2780264999","wikidata":"https://www.wikidata.org/wiki/Q7445032","display_name":"Security domain","level":2,"score":0.4156739413738251},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3966689705848694},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.22374922037124634},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s10207-024-00860-w","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-024-00860-w","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-024-00860-w.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},{"id":"pmh:oai:eprints.bournemouth.ac.uk:39831","is_oa":true,"landing_page_url":null,"pdf_url":"https://eprints.bournemouth.ac.uk/39831/7/s10207-024-00860-w.pdf","source":{"id":"https://openalex.org/S4306400187","display_name":"Bournemouth University Research Online (Bournemouth University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I9300472","host_organization_name":"Bournemouth University","host_organization_lineage":["https://openalex.org/I9300472"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"}],"best_oa_location":{"id":"doi:10.1007/s10207-024-00860-w","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-024-00860-w","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-024-00860-w.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4396799909.pdf"},"referenced_works_count":44,"referenced_works":["https://openalex.org/W1512475340","https://openalex.org/W1969486090","https://openalex.org/W1998715027","https://openalex.org/W2030635159","https://openalex.org/W2038043464","https://openalex.org/W2064675550","https://openalex.org/W2160170318","https://openalex.org/W2162174678","https://openalex.org/W2188383940","https://openalex.org/W2335999708","https://openalex.org/W2605782046","https://openalex.org/W2605817989","https://openalex.org/W2767011015","https://openalex.org/W2804048727","https://openalex.org/W2807143630","https://openalex.org/W2891432086","https://openalex.org/W2892859754","https://openalex.org/W2904754882","https://openalex.org/W2905097561","https://openalex.org/W2907084516","https://openalex.org/W2963701156","https://openalex.org/W2968342184","https://openalex.org/W2969836576","https://openalex.org/W2999178765","https://openalex.org/W3038955483","https://openalex.org/W3081021708","https://openalex.org/W3088067349","https://openalex.org/W3092331527","https://openalex.org/W3094866229","https://openalex.org/W3118716900","https://openalex.org/W3119994573","https://openalex.org/W3122598275","https://openalex.org/W3171551824","https://openalex.org/W3184930951","https://openalex.org/W4230410911","https://openalex.org/W4254526136","https://openalex.org/W4295346826","https://openalex.org/W4312993045","https://openalex.org/W4366579084","https://openalex.org/W4375787811","https://openalex.org/W4376958494","https://openalex.org/W4384662964","https://openalex.org/W4384834364","https://openalex.org/W4387017455"],"related_works":["https://openalex.org/W4254851101","https://openalex.org/W3171007296","https://openalex.org/W22115721","https://openalex.org/W2321234655","https://openalex.org/W2065444835","https://openalex.org/W4394550905","https://openalex.org/W2952773340","https://openalex.org/W2470062578","https://openalex.org/W4292554283","https://openalex.org/W2382367871"],"abstract_inverted_index":{"Abstract":[0],"The":[1],"escalating":[2],"complexity":[3],"and":[4,52,68,73,76,88,104,135,166,170],"impact":[5,79],"of":[6,25,63,93,119,140,155,172],"cyber":[7,19,94,120,149],"threats":[8,75,130],"require":[9],"organisations":[10,97],"to":[11,14,35,48,70,108,110,127,137],"rehearse":[12],"responses":[13],"cyber-attacks":[15],"by":[16,30,123],"routinely":[17],"conducting":[18],"security":[20,95,121],"exercises.":[21],"However,":[22],"the":[23,31,49,61,91,117,125,129,138,141,153,173],"effectiveness":[24,118],"these":[26],"exercises":[27,122],"is":[28],"limited":[29],"exercise":[32],"planners\u2019":[33],"ability":[34,107],"replicate":[36],"real-world":[37,100],"scenarios":[38,101,126],"in":[39,80],"a":[40,161],"timely":[41],"manner":[42],"that":[43,131],"is,":[44],"most":[45],"importantly,":[46],"tailored":[47],"training":[50],"audience":[51],"sector":[53,139],"impacted.":[54],"To":[55,151],"address":[56],"this":[57],"issue,":[58],"we":[59,159],"propose":[60],"integration":[62],"AI-driven":[64],"sectorial":[65],"threat":[66],"intelligence":[67],"forecasting":[69,89,157],"identify":[71],"emerging":[72,111],"relevant":[74,134],"anticipate":[77],"their":[78,106,168],"different":[81],"industries.":[82],"By":[83],"incorporating":[84],"such":[85],"automated":[86],"analysis":[87],"into":[90],"design":[92],"exercises,":[96],"can":[98],"simulate":[99],"more":[102,133],"accurately":[103],"assess":[105,152],"respond":[109],"threats.":[112],"Fundamentally,":[113],"our":[114,156],"approach":[115],"enhances":[116],"tailoring":[124],"reflect":[128],"are":[132],"imminent":[136],"targeted":[142],"organisation,":[143],"thereby":[144],"enhancing":[145],"its":[146],"preparedness":[147],"for":[148],"attacks.":[150],"efficacy":[154],"methodology,":[158],"conducted":[160],"survey":[162],"with":[163],"domain":[164],"experts":[165],"report":[167],"feedback":[169],"evaluation":[171],"proposed":[174],"methodology.":[175]},"counts_by_year":[{"year":2026,"cited_by_count":5},{"year":2025,"cited_by_count":12},{"year":2024,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
