{"id":"https://openalex.org/W3197994103","doi":"https://doi.org/10.1109/csr51186.2021.9527923","title":"Frankenstack: Real-time Cyberattack Detection and Feedback System for Technical Cyber Exercises","display_name":"Frankenstack: Real-time Cyberattack Detection and Feedback System for Technical Cyber Exercises","publication_year":2021,"publication_date":"2021-07-26","ids":{"openalex":"https://openalex.org/W3197994103","doi":"https://doi.org/10.1109/csr51186.2021.9527923","mag":"3197994103"},"language":"en","primary_location":{"id":"doi:10.1109/csr51186.2021.9527923","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr51186.2021.9527923","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039830415","display_name":"Mauno Pihelgas","orcid":null},"institutions":[{"id":"https://openalex.org/I2802296436","display_name":"NATO Cooperative Cyber Defence Centre of Excellence","ror":"https://ror.org/050reks70","country_code":"EE","type":"facility","lineage":["https://openalex.org/I2802296436","https://openalex.org/I4210162703"]}],"countries":["EE"],"is_corresponding":true,"raw_author_name":"Mauno Pihelgas","raw_affiliation_strings":["Technology Branch, NATO Cooperative Cyber Defence Centre of Excellence, Tallinn, Estonia"],"affiliations":[{"raw_affiliation_string":"Technology Branch, NATO Cooperative Cyber Defence Centre of Excellence, Tallinn, Estonia","institution_ids":["https://openalex.org/I2802296436"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052469801","display_name":"Markus Kont","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Markus Kont","raw_affiliation_strings":["Research and Development, Stamus Networks, Tallinn, Estonia"],"affiliations":[{"raw_affiliation_string":"Research and Development, Stamus Networks, Tallinn, Estonia","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5039830415"],"corresponding_institution_ids":["https://openalex.org/I2802296436"],"apc_list":null,"apc_paid":null,"fwci":0.7641,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.73498383,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7431141138076782},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6574569940567017},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.4926000237464905},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.4828263223171234},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.47367221117019653},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09724199771881104}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7431141138076782},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6574569940567017},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.4926000237464905},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.4828263223171234},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.47367221117019653},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09724199771881104},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csr51186.2021.9527923","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr51186.2021.9527923","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1528697349","https://openalex.org/W1922573661","https://openalex.org/W2529117343","https://openalex.org/W2552186063","https://openalex.org/W2564660321","https://openalex.org/W2626975733","https://openalex.org/W2766091935","https://openalex.org/W2775800900","https://openalex.org/W2909987453","https://openalex.org/W2955981305","https://openalex.org/W2961835015"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W3004173571","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2209816623","https://openalex.org/W1987127708","https://openalex.org/W2382290278","https://openalex.org/W2963445270"],"abstract_inverted_index":{"This":[0,62],"paper":[1,114],"describes":[2],"a":[3,13,76,99],"situation":[4],"awareness":[5],"framework,":[6],"Frankenstack,":[7],"that":[8],"is":[9],"the":[10,18,34,89,96,113,121],"result":[11],"of":[12,20,38,102],"multi-faceted":[14],"endeavor":[15],"to":[16,49,119,132],"enhance":[17],"expertise":[19],"cybersecurity":[21,30],"specialists":[22],"by":[23],"providing":[24],"them":[25],"with":[26],"real-time":[27],"feedback":[28,82],"during":[29,41],"exercises":[31],"and":[32,36,53,70,80,126],"verifying":[33],"performance":[35],"applicability":[37],"monitoring":[39,73,110],"tools":[40,74],"those":[42],"exercises.":[43],"Frankenstack":[44,84],"has":[45,66],"been":[46],"recently":[47],"redeveloped":[48],"improve":[50],"data":[51],"collection":[52],"processing":[54],"functions":[55],"as":[56,58],"well":[57],"cyberattack":[59,78],"detection":[60,79],"capability.":[61],"extensive":[63],"R&D":[64],"effort":[65],"combined":[67],"various":[68],"system":[69],"network":[71],"security":[72],"into":[75],"single":[77],"exercise":[81],"framework.Although":[83],"was":[85],"specifically":[86],"developed":[87],"for":[88,104],"NATO":[90],"CCD":[91],"COE\u2019s":[92],"Crossed":[93],"Swords":[94],"exercise,":[95],"architecture":[97],"provides":[98],"clear":[100],"point":[101],"reference":[103],"others":[105],"who":[106],"are":[107],"building":[108],"such":[109,134],"frameworks.":[111],"Thus,":[112],"contains":[115],"many":[116],"technical":[117],"descriptions":[118],"reduce":[120],"gap":[122],"between":[123],"theoretical":[124],"research":[125],"practitioners":[127],"seeking":[128],"advice":[129],"on":[130],"how":[131],"implement":[133],"complex":[135],"systems.":[136]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
