{"id":"https://openalex.org/W4364305658","doi":"https://doi.org/10.1109/aipr57179.2022.10092228","title":"SMU-DDI Cyber Autonomy Range","display_name":"SMU-DDI Cyber Autonomy Range","publication_year":2022,"publication_date":"2022-10-11","ids":{"openalex":"https://openalex.org/W4364305658","doi":"https://doi.org/10.1109/aipr57179.2022.10092228"},"language":"en","primary_location":{"id":"doi:10.1109/aipr57179.2022.10092228","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aipr57179.2022.10092228","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Applied Imagery Pattern Recognition Workshop (AIPR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036425121","display_name":"Darrell L. Young","orcid":null},"institutions":[{"id":"https://openalex.org/I1306686416","display_name":"RTX (United States)","ror":"https://ror.org/0354t7b78","country_code":"US","type":"company","lineage":["https://openalex.org/I1306686416"]},{"id":"https://openalex.org/I178169726","display_name":"Southern Methodist University","ror":"https://ror.org/042tdr378","country_code":"US","type":"education","lineage":["https://openalex.org/I178169726"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Darrell L. Young","raw_affiliation_strings":["Raytheon Intelligence and Space,Richardson,Texas","Raytheon Intelligence and Space, Richardson, Texas","Darwin Deason Institute for Cybersecurity, Southern Methodist University"],"affiliations":[{"raw_affiliation_string":"Raytheon Intelligence and Space,Richardson,Texas","institution_ids":["https://openalex.org/I1306686416"]},{"raw_affiliation_string":"Raytheon Intelligence and Space, Richardson, Texas","institution_ids":["https://openalex.org/I1306686416"]},{"raw_affiliation_string":"Darwin Deason Institute for Cybersecurity, Southern Methodist University","institution_ids":["https://openalex.org/I178169726"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110547007","display_name":"Mark Bigham","orcid":null},"institutions":[{"id":"https://openalex.org/I178169726","display_name":"Southern Methodist University","ror":"https://ror.org/042tdr378","country_code":"US","type":"education","lineage":["https://openalex.org/I178169726"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mark Bigham","raw_affiliation_strings":["Southern Methodist University,Darwin Deason Institute for Cybersecurity","Darwin Deason Institute for Cybersecurity, Southern Methodist University"],"affiliations":[{"raw_affiliation_string":"Southern Methodist University,Darwin Deason Institute for Cybersecurity","institution_ids":["https://openalex.org/I178169726"]},{"raw_affiliation_string":"Darwin Deason Institute for Cybersecurity, Southern Methodist University","institution_ids":["https://openalex.org/I178169726"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032092037","display_name":"Mark Bradbury","orcid":"https://orcid.org/0000-0002-7964-6095"},"institutions":[{"id":"https://openalex.org/I178169726","display_name":"Southern Methodist University","ror":"https://ror.org/042tdr378","country_code":"US","type":"education","lineage":["https://openalex.org/I178169726"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mark Bradbury","raw_affiliation_strings":["Southern Methodist University,Darwin Deason Institute for Cybersecurity","Darwin Deason Institute for Cybersecurity, Southern Methodist University"],"affiliations":[{"raw_affiliation_string":"Southern Methodist University,Darwin Deason Institute for Cybersecurity","institution_ids":["https://openalex.org/I178169726"]},{"raw_affiliation_string":"Darwin Deason Institute for Cybersecurity, Southern Methodist University","institution_ids":["https://openalex.org/I178169726"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023773515","display_name":"Eric C. Larson","orcid":"https://orcid.org/0000-0001-6040-868X"},"institutions":[{"id":"https://openalex.org/I178169726","display_name":"Southern Methodist University","ror":"https://ror.org/042tdr378","country_code":"US","type":"education","lineage":["https://openalex.org/I178169726"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Eric Larson","raw_affiliation_strings":["Southern Methodist University,Darwin Deason Institute for Cybersecurity","Darwin Deason Institute for Cybersecurity, Southern Methodist University"],"affiliations":[{"raw_affiliation_string":"Southern Methodist University,Darwin Deason Institute for Cybersecurity","institution_ids":["https://openalex.org/I178169726"]},{"raw_affiliation_string":"Darwin Deason Institute for Cybersecurity, Southern Methodist University","institution_ids":["https://openalex.org/I178169726"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082009815","display_name":"Mitchell A. Thornton","orcid":"https://orcid.org/0000-0003-3559-9511"},"institutions":[{"id":"https://openalex.org/I178169726","display_name":"Southern Methodist University","ror":"https://ror.org/042tdr378","country_code":"US","type":"education","lineage":["https://openalex.org/I178169726"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mitch Thornton","raw_affiliation_strings":["Southern Methodist University,Darwin Deason Institute for Cybersecurity","Darwin Deason Institute for Cybersecurity, Southern Methodist University"],"affiliations":[{"raw_affiliation_string":"Southern Methodist University,Darwin Deason Institute for Cybersecurity","institution_ids":["https://openalex.org/I178169726"]},{"raw_affiliation_string":"Darwin Deason Institute for Cybersecurity, Southern Methodist University","institution_ids":["https://openalex.org/I178169726"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5036425121"],"corresponding_institution_ids":["https://openalex.org/I1306686416","https://openalex.org/I178169726"],"apc_list":null,"apc_paid":null,"fwci":0.398,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.68515282,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyberinfrastructure","display_name":"Cyberinfrastructure","score":0.6683308482170105},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6643772125244141},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6386559009552002},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5904247760772705},{"id":"https://openalex.org/keywords/autonomy","display_name":"Autonomy","score":0.5720213651657104},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.5208562016487122},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.5105191469192505},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.49309584498405457},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.45841333270072937},{"id":"https://openalex.org/keywords/attack-surface","display_name":"Attack surface","score":0.44092482328414917},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.4124709963798523},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.2824576497077942},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2600436210632324}],"concepts":[{"id":"https://openalex.org/C2776397876","wikidata":"https://www.wikidata.org/wiki/Q1450531","display_name":"Cyberinfrastructure","level":2,"score":0.6683308482170105},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6643772125244141},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6386559009552002},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5904247760772705},{"id":"https://openalex.org/C65414064","wikidata":"https://www.wikidata.org/wiki/Q484105","display_name":"Autonomy","level":2,"score":0.5720213651657104},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.5208562016487122},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.5105191469192505},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.49309584498405457},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.45841333270072937},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.44092482328414917},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.4124709963798523},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.2824576497077942},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2600436210632324},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/aipr57179.2022.10092228","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aipr57179.2022.10092228","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Applied Imagery Pattern Recognition Workshop (AIPR)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7099999785423279}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1945616565","https://openalex.org/W2983044655","https://openalex.org/W3091031080","https://openalex.org/W3160793195","https://openalex.org/W4212822688","https://openalex.org/W4224275454","https://openalex.org/W4225646952","https://openalex.org/W4285347455","https://openalex.org/W4285347465","https://openalex.org/W4293817205","https://openalex.org/W4312606892","https://openalex.org/W4312933868","https://openalex.org/W4313138527","https://openalex.org/W6640425456","https://openalex.org/W6810462909"],"related_works":["https://openalex.org/W2358245908","https://openalex.org/W2974890647","https://openalex.org/W4321484089","https://openalex.org/W2958357193","https://openalex.org/W4385452087","https://openalex.org/W2001966745","https://openalex.org/W2768554658","https://openalex.org/W4304097726","https://openalex.org/W4304097727","https://openalex.org/W2177488045"],"abstract_inverted_index":{"The":[0,39,93,110,188],"Southern":[1],"Methodist":[2],"University-Darwin":[3],"Deason":[4],"Institute":[5],"for":[6,90],"Cybersecurity":[7],"(SMU-DDI)":[8],"Cyber":[9],"Autonomy":[10],"Range":[11],"(CAR)":[12],"addresses":[13],"the":[14,24,118,148,157,166,178],"incorporation":[15],"of":[16,23,41,69,75,79,96,120,136,151,162,169,185],"increased":[17],"resiliency,":[18],"reliability,":[19],"and":[20,34,44,108,133,154,195],"cyber":[21,76,97,125],"security":[22,98],"autonomous":[25,55],"systems":[26],"(AS)":[27],"cyberinfrastructure;":[28],"an":[29,58,152],"issue":[30],"with":[31,51,102,124],"widespread":[32],"concern":[33],"broad":[35],"impact":[36],"on":[37,200],"society.":[38],"advances":[40],"data":[42,209,217],"science":[43],"Machine":[45],"Learning/Artificial":[46],"Intelligence":[47],"(ML/AI)":[48],"methods":[49],"coupled":[50],"their":[52,129,134],"integration":[53],"into":[54],"subsystems":[56,183,205],"is":[57,112,142,184,190],"enabling":[59],"trend":[60],"that":[61,116,206],"supports":[62,117],"AS":[63,121,153,158,171],"maturity.":[64],"Likewise,":[65],"these":[66],"same":[67],"aspects":[68,74,95],"ML/AI":[70,94,182,204],"present":[71],"entirely":[72],"new":[73],"security,":[77],"many":[78,170],"which":[80],"have":[81],"only":[82],"been":[83],"analyzed":[84],"in":[85,105],"a":[86,113,160],"preliminary":[87],"sense":[88],"or":[89,215],"special":[91],"cases.":[92],"are":[99,172],"critically":[100],"important,":[101],"significant":[103],"ramifications":[104],"human":[106],"safety":[107],"well-being.":[109],"CAR":[111,189],"collaborative":[114],"facility":[115],"assessment":[119],"when":[122],"faced":[123],"threats":[126],"by":[127],"assessing":[128],"attack":[130],"surface,":[131],"vulnerability,":[132],"degree":[135],"resistance":[137],"to":[138,144,159,193],"such":[139],"threats.":[140],"It":[141],"instrumented":[143],"simulate":[145,196],"and/or":[146],"emulate":[147],"external":[149],"environment":[150],"can":[155],"subject":[156],"variety":[161],"controlled":[163],"cyber-attacks.":[164],"Because":[165],"decision-making":[167],"capabilities":[168],"based":[173],"upon":[174,208],"data-driven":[175],"ML/AI-enabled":[176],"technologies,":[177],"threat":[179],"surface":[180],"surrounding":[181],"particular":[186],"concern.":[187],"especially":[191],"configured":[192],"investigate":[194],"(or":[197],"emulate)":[198],"cyber-attacks":[199],"ML/AI-equipped":[201],"subsystems;":[202],"particularly":[203],"depend":[207],"sources":[210],"derived":[211],"from":[212],"sensor":[213],"suites":[214],"other":[216],"sources.":[218]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
