{"id":"https://openalex.org/W4415997304","doi":"https://doi.org/10.1007/s10207-025-01146-5","title":"AC_MAPPER: a robust approach to ATT&amp;CK technique classification using input augmentation and class rebalancing","display_name":"AC_MAPPER: a robust approach to ATT&amp;CK technique classification using input augmentation and class rebalancing","publication_year":2025,"publication_date":"2025-11-07","ids":{"openalex":"https://openalex.org/W4415997304","doi":"https://doi.org/10.1007/s10207-025-01146-5"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-025-01146-5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-025-01146-5","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01146-5.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01146-5.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060134493","display_name":"Majed Albarrak","orcid":null},"institutions":[{"id":"https://openalex.org/I82284825","display_name":"Cranfield University","ror":"https://ror.org/05cncd958","country_code":"GB","type":"education","lineage":["https://openalex.org/I82284825"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Majed Albarrak","raw_affiliation_strings":["Sustainable Manufacturing Systems Centre, Cranfield University, Cranfield, UK"],"affiliations":[{"raw_affiliation_string":"Sustainable Manufacturing Systems Centre, Cranfield University, Cranfield, UK","institution_ids":["https://openalex.org/I82284825"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060910083","display_name":"Adel Alqudhaibi","orcid":null},"institutions":[{"id":"https://openalex.org/I82284825","display_name":"Cranfield University","ror":"https://ror.org/05cncd958","country_code":"GB","type":"education","lineage":["https://openalex.org/I82284825"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Adel Alqudhaibi","raw_affiliation_strings":["Ministry of Defence, Riyadh, Saudi Arabia","Sustainable Manufacturing Systems Centre, Cranfield University, Cranfield, UK"],"affiliations":[{"raw_affiliation_string":"Ministry of Defence, Riyadh, Saudi Arabia","institution_ids":[]},{"raw_affiliation_string":"Sustainable Manufacturing Systems Centre, Cranfield University, Cranfield, UK","institution_ids":["https://openalex.org/I82284825"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112963659","display_name":"Sandeep Jagtap","orcid":null},"institutions":[{"id":"https://openalex.org/I187531555","display_name":"Lund University","ror":"https://ror.org/012a77v79","country_code":"SE","type":"education","lineage":["https://openalex.org/I187531555"]},{"id":"https://openalex.org/I82284825","display_name":"Cranfield University","ror":"https://ror.org/05cncd958","country_code":"GB","type":"education","lineage":["https://openalex.org/I82284825"]}],"countries":["GB","SE"],"is_corresponding":false,"raw_author_name":"Sandeep Jagtap","raw_affiliation_strings":["Division of Engineering Logistics, Lund University, Lund, Sweden","Sustainable Manufacturing Systems Centre, Cranfield University, Cranfield, UK"],"affiliations":[{"raw_affiliation_string":"Division of Engineering Logistics, Lund University, Lund, Sweden","institution_ids":["https://openalex.org/I187531555"]},{"raw_affiliation_string":"Sustainable Manufacturing Systems Centre, Cranfield University, Cranfield, UK","institution_ids":["https://openalex.org/I82284825"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5060134493"],"corresponding_institution_ids":["https://openalex.org/I82284825"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":{"value":2590,"currency":"EUR","value_usd":3190},"fwci":2.3568,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.91702723,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"24","issue":"6","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.1574999988079071,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.1574999988079071,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.12690000236034393,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.07919999957084656,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6976000070571899},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5924999713897705},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.5803999900817871},{"id":"https://openalex.org/keywords/transformer","display_name":"Transformer","score":0.5472999811172485},{"id":"https://openalex.org/keywords/macro","display_name":"Macro","score":0.45350000262260437},{"id":"https://openalex.org/keywords/baseline","display_name":"Baseline (sea)","score":0.4334999918937683},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.3815999925136566}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.84579998254776},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6976000070571899},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6241000294685364},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5924999713897705},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.5803999900817871},{"id":"https://openalex.org/C66322947","wikidata":"https://www.wikidata.org/wiki/Q11658","display_name":"Transformer","level":3,"score":0.5472999811172485},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5356000065803528},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.49149999022483826},{"id":"https://openalex.org/C166955791","wikidata":"https://www.wikidata.org/wiki/Q629579","display_name":"Macro","level":2,"score":0.45350000262260437},{"id":"https://openalex.org/C12725497","wikidata":"https://www.wikidata.org/wiki/Q810247","display_name":"Baseline (sea)","level":2,"score":0.4334999918937683},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.3815999925136566},{"id":"https://openalex.org/C86251818","wikidata":"https://www.wikidata.org/wiki/Q816754","display_name":"Benchmarking","level":2,"score":0.36160001158714294},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.32600000500679016},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.31040000915527344},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.266400009393692},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.26460000872612},{"id":"https://openalex.org/C175154964","wikidata":"https://www.wikidata.org/wiki/Q380077","display_name":"Task analysis","level":3,"score":0.2624000012874603},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.2621000111103058},{"id":"https://openalex.org/C27158222","wikidata":"https://www.wikidata.org/wiki/Q5532422","display_name":"Generalizability theory","level":2,"score":0.2547000050544739}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/s10207-025-01146-5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-025-01146-5","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01146-5.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},{"id":"pmh:oai:lup.lub.lu.se:43d9da2e-9c90-4485-b2e9-aef7774828df","is_oa":true,"landing_page_url":"https://lup.lub.lu.se/record/43d9da2e-9c90-4485-b2e9-aef7774828df","pdf_url":null,"source":{"id":"https://openalex.org/S4306400536","display_name":"Lund University Publications (Lund University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I187531555","host_organization_name":"Lund University","host_organization_lineage":["https://openalex.org/I187531555"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"ISSN: 1615-5262","raw_type":"text"},{"id":"pmh:oai:lup.lub.lu.se:83bdc55d-d17d-41e9-803e-8d1c31815810","is_oa":false,"landing_page_url":"https://lup.lub.lu.se/record/83bdc55d-d17d-41e9-803e-8d1c31815810","pdf_url":null,"source":{"id":"https://openalex.org/S4306400536","display_name":"Lund University Publications (Lund University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I187531555","host_organization_name":"Lund University","host_organization_lineage":["https://openalex.org/I187531555"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"ISSN: 1615-5262","raw_type":"text"}],"best_oa_location":{"id":"doi:10.1007/s10207-025-01146-5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-025-01146-5","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01146-5.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321806","display_name":"Lunds Universitet","ror":"https://ror.org/012a77v79"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4415997304.pdf"},"referenced_works_count":43,"referenced_works":["https://openalex.org/W2100506586","https://openalex.org/W2538865281","https://openalex.org/W2747680751","https://openalex.org/W2771963642","https://openalex.org/W2908121058","https://openalex.org/W2964522977","https://openalex.org/W2970771982","https://openalex.org/W3193361787","https://openalex.org/W3199212845","https://openalex.org/W3199638386","https://openalex.org/W3211888892","https://openalex.org/W3214329506","https://openalex.org/W4210404000","https://openalex.org/W4226346873","https://openalex.org/W4236521339","https://openalex.org/W4284975312","https://openalex.org/W4292940448","https://openalex.org/W4294343684","https://openalex.org/W4311313865","https://openalex.org/W4312995921","https://openalex.org/W4319079731","https://openalex.org/W4324031781","https://openalex.org/W4375787811","https://openalex.org/W4383900630","https://openalex.org/W4384103461","https://openalex.org/W4389519408","https://openalex.org/W4391671371","https://openalex.org/W4392947753","https://openalex.org/W4394674278","https://openalex.org/W4394692031","https://openalex.org/W4399392544","https://openalex.org/W4400121705","https://openalex.org/W4400975258","https://openalex.org/W4401426188","https://openalex.org/W4401879035","https://openalex.org/W4402622967","https://openalex.org/W4402858752","https://openalex.org/W4403211476","https://openalex.org/W4409155981","https://openalex.org/W4409156559","https://openalex.org/W4409723056","https://openalex.org/W4409957689","https://openalex.org/W4413886835"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"The":[1,60,80],"detection":[2,167],"and":[3,21,78,91,103,120,126,164],"classification":[4,55],"of":[5,53,138,146],"adversarial":[6],"techniques":[7],"from":[8],"cyber":[9],"threat":[10,19,166],"intelligence":[11],"(CTI)":[12],"text":[13],"is":[14,63],"a":[15,45],"critical":[16],"task":[17],"in":[18,88,169],"analysis":[20],"mitigation.":[22],"While":[23],"recent":[24],"transformer-based":[25],"models":[26,70,130],"have":[27],"shown":[28],"promise,":[29],"their":[30],"general-purpose":[31,74],"nature":[32],"often":[33],"limits":[34],"effectiveness":[35,137],"on":[36,107,117],"complex,":[37],"domain-specific":[38,148],"datasets.":[39,59],"In":[40],"this":[41],"paper,":[42],"we":[43],"present":[44],"novel":[46],"model":[47],"designed":[48],"to":[49,100,153],"address":[50],"the":[51,108,136,144],"challenges":[52],"technique":[54],"across":[56,94],"heterogeneous":[57],"CTI":[58,156],"proposed":[61,81,139],"method":[62],"evaluated":[64],"against":[65],"several":[66],"baselines,":[67],"including":[68],"CTI-specific":[69],"as":[71,73,124],"well":[72],"transformers":[75],"like":[76],"SciBERT":[77],"DistilBERT.":[79],"approach":[82],"\u201cAC_MAPPER\u201d":[83],"consistently":[84],"outperforms":[85],"all":[86],"baselines":[87],"both":[89],"Accuracy":[90],"F1":[92,106],"scores":[93],"five":[95],"benchmark":[96],"datasets,":[97],"achieving":[98],"up":[99],"93.59%":[101],"accuracy":[102],"93.78%":[104],"macro":[105],"TRAM":[109],"Bootstrap":[110],"dataset.":[111],"It":[112],"also":[113],"demonstrates":[114],"superior":[115],"robustness":[116],"highly":[118],"imbalanced":[119],"sparse":[121],"datasets":[122],"such":[123],"HALdata":[125],"CAPEC,":[127],"where":[128],"baseline":[129],"struggle.":[131],"Comprehensive":[132],"performance":[133],"comparisons,":[134],"highlights":[135],"approach.":[140],"These":[141],"results":[142],"underscore":[143],"potential":[145],"integrating":[147],"design":[149],"with":[150],"transformer":[151],"architectures":[152],"advance":[154],"automated":[155],"analysis.":[157],"Our":[158],"findings":[159],"contribute":[160],"toward":[161],"more":[162],"accurate":[163],"reliable":[165],"systems":[168],"real-world":[170],"security":[171],"applications.":[172]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-11-07T00:00:00"}
