{"id":"https://openalex.org/W1556359845","doi":"https://doi.org/10.1109/cogsima.2015.7108194","title":"Difficulty-level metric for cyber security training","display_name":"Difficulty-level metric for cyber security training","publication_year":2015,"publication_date":"2015-03-01","ids":{"openalex":"https://openalex.org/W1556359845","doi":"https://doi.org/10.1109/cogsima.2015.7108194","mag":"1556359845"},"language":"en","primary_location":{"id":"doi:10.1109/cogsima.2015.7108194","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cogsima.2015.7108194","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037536758","display_name":"Zequn Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I86501945","display_name":"University of Delaware","ror":"https://ror.org/01sbq1a82","country_code":"US","type":"education","lineage":["https://openalex.org/I86501945"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Zequn Huang","raw_affiliation_strings":["Department of Computer and Information Sciences, University of Delaware"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Sciences, University of Delaware","institution_ids":["https://openalex.org/I86501945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111988402","display_name":"Chien-Chung Shen","orcid":null},"institutions":[{"id":"https://openalex.org/I86501945","display_name":"University of Delaware","ror":"https://ror.org/01sbq1a82","country_code":"US","type":"education","lineage":["https://openalex.org/I86501945"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chien-Chung Shen","raw_affiliation_strings":["Department of Computer and Information Sciences, University of Delaware"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Sciences, University of Delaware","institution_ids":["https://openalex.org/I86501945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035636634","display_name":"Sheetal Doshiy","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sheetal Doshiy","raw_affiliation_strings":["Scalable Network Technologies, Inc"],"affiliations":[{"raw_affiliation_string":"Scalable Network Technologies, Inc","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044670311","display_name":"Nimmi Thomasy","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nimmi Thomasy","raw_affiliation_strings":["Scalable Network Technologies, Inc"],"affiliations":[{"raw_affiliation_string":"Scalable Network Technologies, Inc","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025640197","display_name":"Ha Duong","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ha Duong","raw_affiliation_strings":["Scalable Network Technologies, Inc"],"affiliations":[{"raw_affiliation_string":"Scalable Network Technologies, Inc","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5037536758"],"corresponding_institution_ids":["https://openalex.org/I86501945"],"apc_list":null,"apc_paid":null,"fwci":2.3838,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.90405783,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"172","last_page":"178"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/metric","display_name":"Metric (unit)","score":0.6934060454368591},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6800016164779663},{"id":"https://openalex.org/keywords/training","display_name":"Training (meteorology)","score":0.6454117298126221},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47800958156585693},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09832093119621277}],"concepts":[{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.6934060454368591},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6800016164779663},{"id":"https://openalex.org/C2777211547","wikidata":"https://www.wikidata.org/wiki/Q17141490","display_name":"Training (meteorology)","level":2,"score":0.6454117298126221},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47800958156585693},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09832093119621277},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C153294291","wikidata":"https://www.wikidata.org/wiki/Q25261","display_name":"Meteorology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cogsima.2015.7108194","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cogsima.2015.7108194","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.41999998688697815,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320338281","display_name":"Army Research Office","ror":"https://ror.org/05epdh915"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W110007310","https://openalex.org/W1486870110","https://openalex.org/W1493327060","https://openalex.org/W1508191694","https://openalex.org/W1547152107","https://openalex.org/W1590183771","https://openalex.org/W1590752147","https://openalex.org/W1901395146","https://openalex.org/W1971114459","https://openalex.org/W1985324839","https://openalex.org/W1993575476","https://openalex.org/W2030014066","https://openalex.org/W2054127354","https://openalex.org/W2057421182","https://openalex.org/W2064553186","https://openalex.org/W2073097601","https://openalex.org/W2077937403","https://openalex.org/W2083658929","https://openalex.org/W2089396968","https://openalex.org/W2110908300","https://openalex.org/W2121141821","https://openalex.org/W2121805588","https://openalex.org/W2129586531","https://openalex.org/W2130373165","https://openalex.org/W2132243817","https://openalex.org/W2142226691","https://openalex.org/W2207375515","https://openalex.org/W4249173680","https://openalex.org/W6629556936","https://openalex.org/W6630334281","https://openalex.org/W6679383015","https://openalex.org/W6687769804"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W230091440","https://openalex.org/W2390279801","https://openalex.org/W2233261550","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2810751659","https://openalex.org/W258997015","https://openalex.org/W2376932109"],"abstract_inverted_index":{"Cyber":[0],"security":[1],"training":[2,26,50],"systems":[3],"work":[4],"as":[5],"a":[6],"suitable":[7],"learning":[8],"environment":[9],"for":[10,120],"educating":[11],"cyber":[12,22,42],"analysts":[13],"on":[14,54,75],"how":[15],"to":[16,68,88,101,142],"detect":[17],"and":[18,137],"defense":[19],"before":[20],"real":[21],"attacks":[23],"happen.":[24],"As":[25],"is":[27,114],"an":[28,63,81,93,139],"iterative":[29],"process,":[30],"the":[31,37,41,47,55,97,103,134,150],"assessment":[32],"component":[33],"not":[34,118],"only":[35],"assesses":[36],"knowledge":[38],"gained":[39],"by":[40],"analysts,":[43],"but":[44],"also":[45],"adjusts":[46],"difficulty":[48,72],"of":[49,110,131],"lessons":[51],"accordingly":[52],"based":[53],"analysts\u2019":[56],"performance.":[57],"In":[58],"this":[59],"paper,":[60],"we":[61,84],"present":[62],"attack":[64,82,104,125,135],"graphbased":[65],"probabilistic":[66,94],"metric":[67],"measure":[69],"lesson":[70],"scenarios\u2019":[71],"levels.":[73],"Based":[74],"causal":[76],"relationships":[77],"between":[78],"vulnerabilities":[79,91],"in":[80,124,133,149],"graph,":[83],"apply":[85],"Bayesian":[86,112],"Reasoning":[87,113],"aggregate":[89],"individual":[90],"into":[92],"value":[95],"representing":[96],"attackers":[98],"success":[99],"likelihood":[100],"achieve":[102],"goal.":[105],"However,":[106],"one":[107],"major":[108],"complication":[109],"using":[111],"that":[115],"it":[116],"does":[117],"allow":[119],"cycles,":[121],"which":[122],"exists":[123],"graphs.":[126],"We":[127],"identify":[128],"different":[129],"types":[130],"cycles":[132,144],"graphs":[136],"propose":[138],"efficient":[140],"algorithm":[141],"remove":[143],"while":[145],"preserving":[146],"cyclic":[147],"influence":[148],"probability":[151],"calculation.":[152]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
