{"id":"https://openalex.org/W3004466633","doi":"https://doi.org/10.1007/s13198-020-00952-5","title":"Predictive model for multistage cyber-attack simulation","display_name":"Predictive model for multistage cyber-attack simulation","publication_year":2020,"publication_date":"2020-02-03","ids":{"openalex":"https://openalex.org/W3004466633","doi":"https://doi.org/10.1007/s13198-020-00952-5","mag":"3004466633"},"language":"en","primary_location":{"id":"doi:10.1007/s13198-020-00952-5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s13198-020-00952-5","pdf_url":"https://link.springer.com/content/pdf/10.1007/s13198-020-00952-5.pdf","source":{"id":"https://openalex.org/S40280859","display_name":"International Journal of Systems Assurance Engineering and Management","issn_l":"0975-6809","issn":["0975-6809","0976-4348"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of System Assurance Engineering and Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s13198-020-00952-5.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042793059","display_name":"Ravdeep Kour","orcid":"https://orcid.org/0000-0003-0734-0959"},"institutions":[{"id":"https://openalex.org/I190632392","display_name":"Lule\u00e5 University of Technology","ror":"https://ror.org/016st3p78","country_code":"SE","type":"education","lineage":["https://openalex.org/I190632392"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Ravdeep Kour","raw_affiliation_strings":["Division of Operation and Maintenance Engineering, Lule\u00e5 University of Technology, 97187, Lule\u00e5, Sweden","Division of Operation and Maintenance Engineering, Lule\u00e5 University of Technology, Lule\u00e5, Sweden"],"raw_orcid":"https://orcid.org/0000-0003-0734-0959","affiliations":[{"raw_affiliation_string":"Division of Operation and Maintenance Engineering, Lule\u00e5 University of Technology, 97187, Lule\u00e5, Sweden","institution_ids":["https://openalex.org/I190632392"]},{"raw_affiliation_string":"Division of Operation and Maintenance Engineering, Lule\u00e5 University of Technology, Lule\u00e5, Sweden","institution_ids":["https://openalex.org/I190632392"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086674584","display_name":"Adithya Thaduri","orcid":"https://orcid.org/0000-0002-1938-0985"},"institutions":[{"id":"https://openalex.org/I190632392","display_name":"Lule\u00e5 University of Technology","ror":"https://ror.org/016st3p78","country_code":"SE","type":"education","lineage":["https://openalex.org/I190632392"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Adithya Thaduri","raw_affiliation_strings":["Division of Operation and Maintenance Engineering, Lule\u00e5 University of Technology, 97187, Lule\u00e5, Sweden","Division of Operation and Maintenance Engineering, Lule\u00e5 University of Technology, Lule\u00e5, Sweden"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Division of Operation and Maintenance Engineering, Lule\u00e5 University of Technology, 97187, Lule\u00e5, Sweden","institution_ids":["https://openalex.org/I190632392"]},{"raw_affiliation_string":"Division of Operation and Maintenance Engineering, Lule\u00e5 University of Technology, Lule\u00e5, Sweden","institution_ids":["https://openalex.org/I190632392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076917209","display_name":"Ramin Karim","orcid":"https://orcid.org/0000-0002-0055-2740"},"institutions":[{"id":"https://openalex.org/I190632392","display_name":"Lule\u00e5 University of Technology","ror":"https://ror.org/016st3p78","country_code":"SE","type":"education","lineage":["https://openalex.org/I190632392"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Ramin Karim","raw_affiliation_strings":["Division of Operation and Maintenance Engineering, Lule\u00e5 University of Technology, 97187, Lule\u00e5, Sweden","Division of Operation and Maintenance Engineering, Lule\u00e5 University of Technology, Lule\u00e5, Sweden"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Division of Operation and Maintenance Engineering, Lule\u00e5 University of Technology, 97187, Lule\u00e5, Sweden","institution_ids":["https://openalex.org/I190632392"]},{"raw_affiliation_string":"Division of Operation and Maintenance Engineering, Lule\u00e5 University of Technology, Lule\u00e5, Sweden","institution_ids":["https://openalex.org/I190632392"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5042793059"],"corresponding_institution_ids":["https://openalex.org/I190632392"],"apc_list":{"value":2390,"currency":"EUR","value_usd":2990},"apc_paid":{"value":2390,"currency":"EUR","value_usd":2990},"fwci":1.1134,"has_fulltext":true,"cited_by_count":9,"citation_normalized_percentile":{"value":0.83523348,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"11","issue":"3","first_page":"600","last_page":"613"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9871000051498413,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7918053865432739},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.7450979948043823},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.7254194021224976},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6083691120147705},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.6024282574653625},{"id":"https://openalex.org/keywords/maintainability","display_name":"Maintainability","score":0.4690694510936737},{"id":"https://openalex.org/keywords/government","display_name":"Government (linguistics)","score":0.4139895439147949},{"id":"https://openalex.org/keywords/information-and-communications-technology","display_name":"Information and Communications Technology","score":0.41153275966644287},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.3993549644947052},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.39768552780151367},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.1353723406791687}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7918053865432739},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.7450979948043823},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.7254194021224976},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6083691120147705},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.6024282574653625},{"id":"https://openalex.org/C160713754","wikidata":"https://www.wikidata.org/wiki/Q1389965","display_name":"Maintainability","level":2,"score":0.4690694510936737},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.4139895439147949},{"id":"https://openalex.org/C67363961","wikidata":"https://www.wikidata.org/wiki/Q5268834","display_name":"Information and Communications Technology","level":2,"score":0.41153275966644287},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.3993549644947052},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.39768552780151367},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.1353723406791687},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s13198-020-00952-5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s13198-020-00952-5","pdf_url":"https://link.springer.com/content/pdf/10.1007/s13198-020-00952-5.pdf","source":{"id":"https://openalex.org/S40280859","display_name":"International Journal of Systems Assurance Engineering and Management","issn_l":"0975-6809","issn":["0975-6809","0976-4348"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of System Assurance Engineering and Management","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:spr:ijsaem:v:11:y:2020:i:3:d:10.1007_s13198-020-00952-5","is_oa":false,"landing_page_url":"http://link.springer.com/10.1007/s13198-020-00952-5","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s13198-020-00952-5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s13198-020-00952-5","pdf_url":"https://link.springer.com/content/pdf/10.1007/s13198-020-00952-5.pdf","source":{"id":"https://openalex.org/S40280859","display_name":"International Journal of Systems Assurance Engineering and Management","issn_l":"0975-6809","issn":["0975-6809","0976-4348"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of System Assurance Engineering and Management","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320336425","display_name":"J\u00e4rnv\u00e4gstekniskt Centrum, Lule\u00e5 Tekniska Universitet","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3004466633.pdf","grobid_xml":"https://content.openalex.org/works/W3004466633.grobid-xml"},"referenced_works_count":18,"referenced_works":["https://openalex.org/W1968647112","https://openalex.org/W2039148409","https://openalex.org/W2084921105","https://openalex.org/W2102815650","https://openalex.org/W2110309529","https://openalex.org/W2112112824","https://openalex.org/W2322269278","https://openalex.org/W2460937448","https://openalex.org/W2511642541","https://openalex.org/W2586896836","https://openalex.org/W2588620459","https://openalex.org/W2592577925","https://openalex.org/W2619874920","https://openalex.org/W2795830599","https://openalex.org/W2909030636","https://openalex.org/W2922510204","https://openalex.org/W3001758448","https://openalex.org/W4247724926"],"related_works":["https://openalex.org/W3005543248","https://openalex.org/W3215166534","https://openalex.org/W3205687007","https://openalex.org/W2900584019","https://openalex.org/W3110049015","https://openalex.org/W4320802206","https://openalex.org/W3098102491","https://openalex.org/W611119698","https://openalex.org/W4300817267","https://openalex.org/W2528597107"],"abstract_inverted_index":{"Abstract":[0],"Adoption":[1],"of":[2,23,97,119,136,144,166,179,188],"information":[3],"and":[4,30,76,94,159],"communication":[5],"technologies":[6],"(ICT)":[7],"in":[8,46,64],"railway":[9,168,182],"has":[10],"improved":[11],"the":[12,21,101,109,112,129,137,186],"reliability,":[13],"maintainability,":[14],"operational":[15],"efficiency,":[16],"capacity":[17],"as":[18,20,49],"well":[19],"comfort":[22],"passengers.":[24],"This":[25,161],"adoption":[26],"introduces":[27],"new":[28],"vulnerabilities":[29],"entry":[31],"points":[32],"for":[33,70,181],"hackers":[34],"to":[35,73,91,117,127,148,184],"launch":[36],"attacks.":[37],"Advanced":[38],"cybersecurity":[39,71,121],"threats":[40,60],"with":[41],"automated":[42],"capabilities":[43],"are":[44,61],"increasing":[45,63],"such":[47],"sectors":[48],"finance,":[50],"health,":[51],"grid,":[52],"retail,":[53],"government,":[54],"telecommunications,":[55],"transportation,":[56],"etc.":[57],"These":[58],"cyber":[59,81,138,189],"also":[62],"railways":[65],"and,":[66],"therefore,":[67],"it":[68,95],"needs":[69],"measures":[72],"predict,":[74],"detect":[75,92],"respond":[77],"these":[78],"threats.":[79,190],"The":[80,142],"kill":[82,139,170],"chain":[83,102,140,171],"(CKC)":[84],"model":[85,90],"is":[86,147,163],"a":[87],"widely":[88],"used":[89],"cyber-attacks":[93,126],"consists":[96],"seven":[98],"stages/chains;":[99],"breaking":[100],"at":[103,133,176],"an":[104,164],"early":[105],"stage":[106,135,178],"will":[107],"help":[108],"defender":[110,169],"stop":[111],"adversary\u2019s":[113],"malicious":[114],"actions.":[115],"Due":[116],"lack":[118],"real":[120],"data,":[122],"this":[123,145],"research":[124,146,162],"simulates":[125],"calculate":[128],"attack":[130],"penetration":[131],"probabilities":[132],"each":[134,177],"model.":[141],"objective":[143],"predict":[149],"cyber-attack":[150],"penetrations":[151],"by":[152],"implementing":[153],"various":[154],"security":[155,174],"controls":[156,175],"using":[157],"modeling":[158],"simulation.":[160],"extension":[165],"developed":[167],"which":[172],"provides":[173],"CKC":[180],"organizations":[183],"minimize":[185],"risk":[187]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3}],"updated_date":"2026-04-27T08:22:11.395708","created_date":"2025-10-10T00:00:00"}
