{"id":"https://openalex.org/W4409196920","doi":"https://doi.org/10.1109/ciss64860.2025.10944748","title":"A Hypothesis Testing-based Cyber Deception Framework under Sequential Reconnaissance","display_name":"A Hypothesis Testing-based Cyber Deception Framework under Sequential Reconnaissance","publication_year":2025,"publication_date":"2025-03-19","ids":{"openalex":"https://openalex.org/W4409196920","doi":"https://doi.org/10.1109/ciss64860.2025.10944748"},"language":"en","primary_location":{"id":"doi:10.1109/ciss64860.2025.10944748","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ciss64860.2025.10944748","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 59th Annual Conference on Information Sciences and Systems (CISS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070776545","display_name":"Abhinav Kumar","orcid":"https://orcid.org/0000-0001-9367-7069"},"institutions":[{"id":"https://openalex.org/I63135867","display_name":"University of Cincinnati","ror":"https://ror.org/01e3m7079","country_code":"US","type":"education","lineage":["https://openalex.org/I63135867"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Abhinav Kumar","raw_affiliation_strings":["University of Cincinnati,Department of Computer Science,OH"],"affiliations":[{"raw_affiliation_string":"University of Cincinnati,Department of Computer Science,OH","institution_ids":["https://openalex.org/I63135867"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114730159","display_name":"Swastik Brahma","orcid":null},"institutions":[{"id":"https://openalex.org/I63135867","display_name":"University of Cincinnati","ror":"https://ror.org/01e3m7079","country_code":"US","type":"education","lineage":["https://openalex.org/I63135867"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Swastik Brahma","raw_affiliation_strings":["University of Cincinnati,Department of Computer Science,OH"],"affiliations":[{"raw_affiliation_string":"University of Cincinnati,Department of Computer Science,OH","institution_ids":["https://openalex.org/I63135867"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108620592","display_name":"Charles Kamhoua","orcid":null},"institutions":[{"id":"https://openalex.org/I166416128","display_name":"DEVCOM Army Research Laboratory","ror":"https://ror.org/011hc8f90","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I166416128","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]},{"id":"https://openalex.org/I2802705668","display_name":"United States Army Combat Capabilities Development Command","ror":"https://ror.org/02rdkx920","country_code":"US","type":"other","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Charles A. Kamhoua","raw_affiliation_strings":["DEVCOM Army Research Laboratory,Network Security Branch,MD"],"affiliations":[{"raw_affiliation_string":"DEVCOM Army Research Laboratory,Network Security Branch,MD","institution_ids":["https://openalex.org/I166416128","https://openalex.org/I2802705668"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5070776545"],"corresponding_institution_ids":["https://openalex.org/I63135867"],"apc_list":null,"apc_paid":null,"fwci":1.5663,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.8198349,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/deception","display_name":"Deception","score":0.8609561920166016},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6762794256210327},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3834320604801178},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3604719042778015},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.17553916573524475},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.09801346063613892}],"concepts":[{"id":"https://openalex.org/C2779267917","wikidata":"https://www.wikidata.org/wiki/Q170028","display_name":"Deception","level":2,"score":0.8609561920166016},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6762794256210327},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3834320604801178},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3604719042778015},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.17553916573524475},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.09801346063613892}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ciss64860.2025.10944748","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ciss64860.2025.10944748","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 59th Annual Conference on Information Sciences and Systems (CISS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W133503245","https://openalex.org/W1525038591","https://openalex.org/W1528653255","https://openalex.org/W1576185228","https://openalex.org/W2099111195","https://openalex.org/W2170924378","https://openalex.org/W2620649268","https://openalex.org/W2794694510","https://openalex.org/W2794861508","https://openalex.org/W3126390369","https://openalex.org/W4366525964","https://openalex.org/W4388080829","https://openalex.org/W4390189780","https://openalex.org/W4390356040","https://openalex.org/W4404037652","https://openalex.org/W6631724065","https://openalex.org/W6749728326"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2165717120","https://openalex.org/W2039390456","https://openalex.org/W2948663225","https://openalex.org/W2029954793","https://openalex.org/W1992683634","https://openalex.org/W4295295666","https://openalex.org/W1978059949"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3,59],"present":[4],"a":[5,47,64],"novel":[6],"sequential":[7,29,39],"hypothesis":[8],"testing":[9],"framework":[10],"to":[11,35,68,98,108,118],"model":[12],"an":[13],"attacker\u2019s":[14,27],"process":[15,41],"of":[16],"gathering":[17],"and":[18,102],"processing":[19],"information":[20,45,74],"sequentially":[21],"during":[22],"the":[23,56,70,77,82,100,123],"reconnaissance":[24,40],"phase.":[25],"The":[26],"optimal":[28,61],"decision":[30],"rule,":[31],"that":[32,63,76,92],"enables":[33],"it":[34,104],"promptly":[36],"terminate":[37],"its":[38,43,85],"when":[42],"gathered":[44],"yields":[46],"desired":[48],"decision-making":[49,87],"quality,":[50],"has":[51,110],"been":[52,111,116],"characterized.":[53],"Further,":[54],"employing":[55],"developed":[57,124],"framework,":[58],"characterize":[60],"strategies":[62,95],"defender":[65],"can":[66],"employ":[67],"feed":[69],"attacker":[71,83,101],"with":[72],"falsified":[73],"such":[75,93],"expected":[78],"time":[79],"taken":[80],"by":[81],"for":[84],"malicious":[86],"is":[88],"maximally":[89],"prolonged.":[90],"Criterion":[91],"falsification":[94],"must":[96],"satisfy":[97],"blind":[99],"make":[103],"take":[105],"indefinitely":[106],"long":[107],"decide":[109],"presented.":[112],"Numerical":[113],"results":[114],"have":[115],"presented":[117],"provide":[119],"important":[120],"insights":[121],"into":[122],"strategies.":[125]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
