{"id":"https://openalex.org/W4402813320","doi":"https://doi.org/10.1109/csr61664.2024.10679461","title":"Quantifying the Odds in Real World Attack Scenarios","display_name":"Quantifying the Odds in Real World Attack Scenarios","publication_year":2024,"publication_date":"2024-09-02","ids":{"openalex":"https://openalex.org/W4402813320","doi":"https://doi.org/10.1109/csr61664.2024.10679461"},"language":"en","primary_location":{"id":"doi:10.1109/csr61664.2024.10679461","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/csr61664.2024.10679461","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048784616","display_name":"Paul Tavolato","orcid":null},"institutions":[{"id":"https://openalex.org/I129774422","display_name":"University of Vienna","ror":"https://ror.org/03prydq77","country_code":"AT","type":"education","lineage":["https://openalex.org/I129774422"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Paul Tavolato","raw_affiliation_strings":["University of Vienna,Faculty of Computer Science,Vienna,Austria"],"affiliations":[{"raw_affiliation_string":"University of Vienna,Faculty of Computer Science,Vienna,Austria","institution_ids":["https://openalex.org/I129774422"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086413609","display_name":"Robert Luh","orcid":"https://orcid.org/0000-0001-6536-6706"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Robert Luh","raw_affiliation_strings":["University of Applied Sciences,Department of Computer Science,St. P&#x00F6;lten,Austria"],"affiliations":[{"raw_affiliation_string":"University of Applied Sciences,Department of Computer Science,St. P&#x00F6;lten,Austria","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021963772","display_name":"Sebastian Eresheim","orcid":null},"institutions":[{"id":"https://openalex.org/I129774422","display_name":"University of Vienna","ror":"https://ror.org/03prydq77","country_code":"AT","type":"education","lineage":["https://openalex.org/I129774422"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Sebastian Eresheim","raw_affiliation_strings":["University of Vienna,Faculty of Computer Science,Vienna,Austria"],"affiliations":[{"raw_affiliation_string":"University of Vienna,Faculty of Computer Science,Vienna,Austria","institution_ids":["https://openalex.org/I129774422"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5094054783","display_name":"Simon Gmeiner","orcid":null},"institutions":[{"id":"https://openalex.org/I129774422","display_name":"University of Vienna","ror":"https://ror.org/03prydq77","country_code":"AT","type":"education","lineage":["https://openalex.org/I129774422"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Simon Gmeiner","raw_affiliation_strings":["University of Vienna,Faculty of Computer Science,Vienna,Austria"],"affiliations":[{"raw_affiliation_string":"University of Vienna,Faculty of Computer Science,Vienna,Austria","institution_ids":["https://openalex.org/I129774422"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055367812","display_name":"Sebastian Schrittwieser","orcid":"https://orcid.org/0000-0003-2115-2022"},"institutions":[{"id":"https://openalex.org/I129774422","display_name":"University of Vienna","ror":"https://ror.org/03prydq77","country_code":"AT","type":"education","lineage":["https://openalex.org/I129774422"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Sebastian Schrittwieser","raw_affiliation_strings":["University of Vienna,Faculty of Computer Science,Vienna,Austria"],"affiliations":[{"raw_affiliation_string":"University of Vienna,Faculty of Computer Science,Vienna,Austria","institution_ids":["https://openalex.org/I129774422"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5048784616"],"corresponding_institution_ids":["https://openalex.org/I129774422"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.17519591,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"24/12","issue":null,"first_page":"845","last_page":"852"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9695000052452087,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9695000052452087,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9545000195503235,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.939300000667572,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/odds","display_name":"Odds","score":0.7785620093345642},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5781958103179932},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.11450746655464172},{"id":"https://openalex.org/keywords/logistic-regression","display_name":"Logistic regression","score":0.07046261429786682}],"concepts":[{"id":"https://openalex.org/C143095724","wikidata":"https://www.wikidata.org/wiki/Q515895","display_name":"Odds","level":3,"score":0.7785620093345642},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5781958103179932},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.11450746655464172},{"id":"https://openalex.org/C151956035","wikidata":"https://www.wikidata.org/wiki/Q1132755","display_name":"Logistic regression","level":2,"score":0.07046261429786682}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csr61664.2024.10679461","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/csr61664.2024.10679461","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","display_name":"Climate action","score":0.4300000071525574}],"awards":[{"id":"https://openalex.org/G142902297","display_name":null,"funder_award_id":"33656-N","funder_id":"https://openalex.org/F4320321181","funder_display_name":"Austrian Science Fund"}],"funders":[{"id":"https://openalex.org/F4320321181","display_name":"Austrian Science Fund","ror":"https://ror.org/013tf3c58"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1159968740","https://openalex.org/W1505421125","https://openalex.org/W1516256348","https://openalex.org/W1521415124","https://openalex.org/W1563330328","https://openalex.org/W1862398452","https://openalex.org/W1964385350","https://openalex.org/W2096349415","https://openalex.org/W2146024157","https://openalex.org/W2149743156","https://openalex.org/W2151391096","https://openalex.org/W2169923789","https://openalex.org/W2507595475","https://openalex.org/W2515420228","https://openalex.org/W2516244388","https://openalex.org/W2600356401","https://openalex.org/W2750282889","https://openalex.org/W2787596386","https://openalex.org/W2799193011","https://openalex.org/W2913603768","https://openalex.org/W2971584138","https://openalex.org/W2971964194","https://openalex.org/W2977258213","https://openalex.org/W3023191323","https://openalex.org/W3110049015","https://openalex.org/W3110418800","https://openalex.org/W3135014913","https://openalex.org/W4231067782","https://openalex.org/W4288760261","https://openalex.org/W4311413143","https://openalex.org/W6616400613","https://openalex.org/W6679056614","https://openalex.org/W6739867626","https://openalex.org/W6812742317","https://openalex.org/W6842393544"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W1604849300","https://openalex.org/W4231328776","https://openalex.org/W2766061861","https://openalex.org/W1604293003","https://openalex.org/W1979850356","https://openalex.org/W3005040438","https://openalex.org/W3132387835","https://openalex.org/W2910024633"],"abstract_inverted_index":{"In":[0],"cyber":[1,67],"security":[2,122,131],"an":[3,18],"important":[4,96],"part":[5],"of":[6,26,58,66,85,136,151,156,163,192],"risk":[7],"analysis":[8,16],"for":[9,21,37,55,121],"IT":[10,114],"systems":[11],"is":[12,17,172,203],"threat":[13,100],"analysis.":[14],"Threat":[15],"indispensable":[19],"prerequisite":[20],"the":[22,53,56,71,76,104,112,134,148,152,170,190,193,198],"planning":[23],"and":[24,75,79,83,107,160,178],"budgeting":[25],"efficient":[27],"defense":[28,80,165],"measures.":[29,81],"This":[30,116],"paper":[31],"describes":[32],"a":[33,154,161],"strictly":[34],"formal":[35,59],"method":[36],"modeling":[38],"realistic":[39],"cyber-attack":[40],"scenarios.":[41],"These":[42],"scenarios":[43],"are":[44,89,126,167],"modeled":[45],"as":[46,103],"Discrete":[47],"Time":[48],"Markov":[49],"Decision":[50],"Processes,":[51],"opening":[52],"opportunity":[54],"application":[57,191],"methods":[60],"to":[61,91,95,128,140],"calculate":[62],"quantitative":[63,93],"success":[64,109],"probabilities":[65,110],"threats":[68],"depending":[69],"on":[70],"attacker's":[72,105],"skill":[73],"level":[74],"victim's":[77,113],"infrastructure":[78],"Techniques":[82],"tools":[84],"probabilistic":[86],"model":[87,199],"checking":[88,200],"applied":[90],"find":[92],"answers":[94],"questions":[97],"relevant":[98],"in":[99,111,133],"analysis,":[101],"such":[102],"minimum":[106],"maximum":[108],"environment.":[115],"provides":[117],"valuable":[118],"decision":[119],"support":[120],"managers":[123],"when":[124],"they":[125],"forced":[127],"assess":[129],"different":[130],"measures":[132],"course":[135],"deciding":[137],"which":[138],"measure":[139],"implement":[141],"under":[142],"given":[143],"budget":[144],"constraints.":[145],"To":[146],"guarantee":[147],"practical":[149],"relevance":[150],"method,":[153],"list":[155,162],"159":[157],"attack":[158],"actions":[159,166],"118":[164],"compiled,":[168],"where":[169],"information":[171],"gained":[173],"from":[174],"several":[175],"proven":[176],"tactical":[177],"technical":[179],"knowledge":[180],"bases.":[181],"An":[182],"example":[183],"-":[184,188],"stealing":[185],"confidential":[186],"data":[187],"shows":[189],"method.":[194],"For":[195],"calculating":[196],"probabilities,":[197],"tool":[201],"PRISM":[202],"used.":[204]},"counts_by_year":[],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
