{"id":"https://openalex.org/W4408429142","doi":"https://doi.org/10.1007/s10207-025-00993-6","title":"Exploring a comprehensive approach to customize cyber exercises utilizing a process-based lifecycle model","display_name":"Exploring a comprehensive approach to customize cyber exercises utilizing a process-based lifecycle model","publication_year":2025,"publication_date":"2025-03-15","ids":{"openalex":"https://openalex.org/W4408429142","doi":"https://doi.org/10.1007/s10207-025-00993-6"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-025-00993-6","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-025-00993-6","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-00993-6.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-00993-6.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033831474","display_name":"Tobias Pfaller","orcid":"https://orcid.org/0009-0002-5710-5084"},"institutions":[{"id":"https://openalex.org/I132118926","display_name":"Austrian Institute of Technology","ror":"https://ror.org/04knbh022","country_code":"AT","type":"facility","lineage":["https://openalex.org/I132118926"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Tobias Pfaller","raw_affiliation_strings":["AIT Austrian Institute of Technology, Vienna, Austria"],"affiliations":[{"raw_affiliation_string":"AIT Austrian Institute of Technology, Vienna, Austria","institution_ids":["https://openalex.org/I132118926"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088439816","display_name":"Florian Skopik","orcid":"https://orcid.org/0000-0002-1922-7892"},"institutions":[{"id":"https://openalex.org/I132118926","display_name":"Austrian Institute of Technology","ror":"https://ror.org/04knbh022","country_code":"AT","type":"facility","lineage":["https://openalex.org/I132118926"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Florian Skopik","raw_affiliation_strings":["AIT Austrian Institute of Technology, Vienna, Austria"],"affiliations":[{"raw_affiliation_string":"AIT Austrian Institute of Technology, Vienna, Austria","institution_ids":["https://openalex.org/I132118926"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102973502","display_name":"Paul Smith","orcid":"https://orcid.org/0000-0002-8990-6751"},"institutions":[{"id":"https://openalex.org/I67415387","display_name":"Lancaster University","ror":"https://ror.org/04f2nsd36","country_code":"GB","type":"education","lineage":["https://openalex.org/I67415387"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Paul Smith","raw_affiliation_strings":["Lancaster University, Lancaster, UK"],"affiliations":[{"raw_affiliation_string":"Lancaster University, Lancaster, UK","institution_ids":["https://openalex.org/I67415387"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020850844","display_name":"Maria Leitner","orcid":"https://orcid.org/0000-0003-1371-5446"},"institutions":[{"id":"https://openalex.org/I60668342","display_name":"University of Regensburg","ror":"https://ror.org/01eezs655","country_code":"DE","type":"education","lineage":["https://openalex.org/I60668342"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Maria Leitner","raw_affiliation_strings":["University of Regensburg, Regensburg, Germany"],"affiliations":[{"raw_affiliation_string":"University of Regensburg, Regensburg, Germany","institution_ids":["https://openalex.org/I60668342"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5033831474"],"corresponding_institution_ids":["https://openalex.org/I132118926"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":{"value":2590,"currency":"EUR","value_usd":3190},"fwci":2.5844,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.87215438,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"24","issue":"2","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10703","display_name":"Business Process Modeling and Analysis","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10703","display_name":"Business Process Modeling and Analysis","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11891","display_name":"Big Data and Business Intelligence","score":0.9736999869346619,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12607","display_name":"Personal Information Management and User Behavior","score":0.9707000255584717,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7588618993759155},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.6894959211349487},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.4691186249256134},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.4668259024620056},{"id":"https://openalex.org/keywords/system-lifecycle","display_name":"System lifecycle","score":0.4619806706905365},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.4220072329044342},{"id":"https://openalex.org/keywords/application-lifecycle-management","display_name":"Application lifecycle management","score":0.3560470938682556},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1345803141593933},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1336497962474823},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.10235077142715454}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7588618993759155},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.6894959211349487},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.4691186249256134},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.4668259024620056},{"id":"https://openalex.org/C35280785","wikidata":"https://www.wikidata.org/wiki/Q559486","display_name":"System lifecycle","level":4,"score":0.4619806706905365},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.4220072329044342},{"id":"https://openalex.org/C30452754","wikidata":"https://www.wikidata.org/wiki/Q621590","display_name":"Application lifecycle management","level":3,"score":0.3560470938682556},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1345803141593933},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1336497962474823},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.10235077142715454}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s10207-025-00993-6","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-025-00993-6","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-00993-6.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1007/s10207-025-00993-6","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-025-00993-6","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-00993-6.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4408429142.pdf"},"referenced_works_count":37,"referenced_works":["https://openalex.org/W1843425376","https://openalex.org/W1998715027","https://openalex.org/W2071093616","https://openalex.org/W2087103691","https://openalex.org/W2099151437","https://openalex.org/W2129106827","https://openalex.org/W2135791720","https://openalex.org/W2286176268","https://openalex.org/W2289383191","https://openalex.org/W2340709770","https://openalex.org/W2404532944","https://openalex.org/W2766579349","https://openalex.org/W2772451914","https://openalex.org/W2905542721","https://openalex.org/W2911625174","https://openalex.org/W2969851332","https://openalex.org/W2971748108","https://openalex.org/W2984798626","https://openalex.org/W2992836310","https://openalex.org/W3042543503","https://openalex.org/W3044848760","https://openalex.org/W3094131647","https://openalex.org/W3098102491","https://openalex.org/W3112978325","https://openalex.org/W3120092047","https://openalex.org/W3133922644","https://openalex.org/W3164150830","https://openalex.org/W3197806844","https://openalex.org/W3209341551","https://openalex.org/W3210930890","https://openalex.org/W4200570960","https://openalex.org/W4206267871","https://openalex.org/W4211173470","https://openalex.org/W4221037676","https://openalex.org/W4232360564","https://openalex.org/W4323240851","https://openalex.org/W4399332672"],"related_works":["https://openalex.org/W1546685302","https://openalex.org/W2386546059","https://openalex.org/W2352001183","https://openalex.org/W2118149557","https://openalex.org/W2065093007","https://openalex.org/W158512115","https://openalex.org/W2158200782","https://openalex.org/W4206798131","https://openalex.org/W2463298341","https://openalex.org/W2001049975"],"abstract_inverted_index":{"Abstract":[0],"Cyber":[1,74],"exercises":[2,63,138,163,191],"enable":[3],"the":[4,50,58,95,98,117,126,134,141,145,156,174,200,218,239,253,289,292,303,319,327],"effective":[5],"training":[6,350],"of":[7,21,61,81,97,102,119,136,176,220,241,255,261,291,332,340],"cyber":[8,32,62,137,162,168,190,208,281,304,333,357],"security":[9],"skills":[10],"in":[11,109,211,259],"a":[12,18,68,79,106,166,212,262,278,312],"simulated,":[13],"yet":[14],"realistic,":[15],"environment":[16],"for":[17,71,148,247,346],"wide":[19],"variety":[20],"professional":[22],"roles.":[23],"However,":[24],"planning,":[25],"conducting,":[26],"and":[27,38,83,122,139,150,164,182,195,214,243,265,286,325,330,355],"evaluating":[28],"customized":[29,161],"(i.e.,":[30],"non-standard)":[31],"exercise":[33,75,169,209,282,305],"scenarios":[34,76],"involves":[35],"numerous":[36],"time-":[37],"resource-intensive":[39],"activities,":[40],"which":[41,237],"are":[42,90,231,337],"still":[43],"mostly":[44,294],"carried":[45],"out":[46,92],"manually":[47],"today.":[48],"Unfortunately,":[49],"high":[51],"costs":[52],"related":[53,158],"to":[54,64,132,159,188,206,225,310],"these":[55],"activities":[56],"limit":[57],"practical":[59],"applicability":[60],"serve":[65],"widely":[66],"as":[67,269,271],"regular":[69],"tool":[70],"skill":[72],"development.":[73],"typically":[77],"involve":[78],"sequence":[80],"predefined":[82],"carefully":[84],"planned":[85],"injects":[86,104,242],"(e.g.,":[87],"events)":[88],"that":[89,116,172,223,316],"rolled":[91],"sequentially,":[93],"driving":[94],"progression":[96],"exercise.":[99],"The":[100],"composition":[101],"such":[103],"resembles":[105],"linear":[107],"process":[108,128,177,180,183,204,229,235],"its":[110,275],"simplest":[111],"form.":[112],"Therefore,":[113,199],"we":[114,336],"argue":[115],"utilization":[118,276],"existing,":[120],"standardized,":[121],"well-researched":[123],"methods":[124,185],"from":[125,274],"business":[127],"domain":[129],"provides":[130],"opportunities":[131,345],"improve":[133],"quality":[135],"at":[140,277],"same":[142],"time":[143],"reduce":[144],"workload":[146],"necessary":[147],"planning":[149],"conducting":[151,160],"them.":[152],"This":[153],"paper":[154],"reviews":[155],"challenges":[157],"introduces":[165],"process-based":[167],"lifecycle":[170,257],"model":[171,258],"leverages":[173],"power":[175],"modeling":[178,205],"languages,":[179],"engines,":[181,236],"evaluation":[184,248],"/":[186],"metrics":[187],"transform":[189],"into":[192],"transparent,":[193],"dynamic,":[194],"highly":[196],"automated":[197,352],"endeavors.":[198],"approach":[201],"presented":[202],"utilizes":[203],"plan":[207],"scenario":[210],"structured":[213],"flexible":[215],"manner,":[216],"enabling":[217],"creation":[219],"dynamic":[221],"paths":[222],"adapt":[224],"participants\u2019":[226],"actions.":[227],"These":[228],"models":[230],"directly":[232],"executed":[233],"by":[234],"automate":[238],"rollout":[240],"collect":[244],"detailed":[245],"logs":[246],"purposes.":[249],"We":[250],"further":[251],"describe":[252],"application":[254],"this":[256],"course":[260],"proof-of-concept":[263],"implementation":[264],"discuss":[266],"technical":[267],"insights":[268],"well":[270],"lessons":[272],"learned":[273],"large-scale":[279],"national":[280],"together":[283],"with":[284],"CERTs":[285],"authorities.":[287],"While":[288],"state":[290],"art":[293],"focuses":[295],"on":[296],"optimizing":[297],"individual":[298],"tasks":[299],"or":[300],"phases":[301],"within":[302],"lifecycle,":[306],"our":[307,342],"contribution":[308],"aims":[309],"offer":[311],"comprehensive":[313],"integrated":[314],"framework":[315],"spans":[317],"across":[318],"phases,":[320],"providing":[321],"interfaces":[322],"between":[323],"them,":[324],"enhancing":[326],"overall":[328],"effectiveness":[329],"maintainability":[331],"exercises.":[334,359],"Further,":[335],"discussing":[338],"implications":[339],"using":[341],"approach,":[343],"identifying":[344],"creating":[347],"interactive":[348],"cybersecurity":[349],"environments,":[351],"feedback":[353],"mechanisms":[354],"interconnected":[356],"range":[358]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
