{"id":"https://openalex.org/W2902931847","doi":"https://doi.org/10.1109/cybersa.2018.8551421","title":"Cyber security: Influence of patching vulnerabilities on the decision-making of hackers and analysts","display_name":"Cyber security: Influence of patching vulnerabilities on the decision-making of hackers and analysts","publication_year":2018,"publication_date":"2018-06-01","ids":{"openalex":"https://openalex.org/W2902931847","doi":"https://doi.org/10.1109/cybersa.2018.8551421","mag":"2902931847"},"language":"en","primary_location":{"id":"doi:10.1109/cybersa.2018.8551421","is_oa":false,"landing_page_url":"http://doi.org/10.1109/cybersa.2018.8551421","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024799882","display_name":"Zahid Maqbool","orcid":"https://orcid.org/0000-0001-7442-3864"},"institutions":[{"id":"https://openalex.org/I9579091","display_name":"Indian Institute of Technology Mandi","ror":"https://ror.org/05r9r2f34","country_code":"IN","type":"education","lineage":["https://openalex.org/I9579091"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Zahid Maqbool","raw_affiliation_strings":["Applied Cognitive Science Laboratory, Indian Institute of Technology, Mandi, 175005, India"],"affiliations":[{"raw_affiliation_string":"Applied Cognitive Science Laboratory, Indian Institute of Technology, Mandi, 175005, India","institution_ids":["https://openalex.org/I9579091"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090616169","display_name":"V. S. Chandrasekhar Pammi","orcid":null},"institutions":[{"id":"https://openalex.org/I168893459","display_name":"University of Allahabad","ror":"https://ror.org/03vrx7m55","country_code":"IN","type":"education","lineage":["https://openalex.org/I168893459"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"V.S. Chandrasekhar Pammi","raw_affiliation_strings":["Centre of Behavioral and Cognitive Sciences, University of Allahabad, 211002, India"],"affiliations":[{"raw_affiliation_string":"Centre of Behavioral and Cognitive Sciences, University of Allahabad, 211002, India","institution_ids":["https://openalex.org/I168893459"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010689942","display_name":"Varun Dutt","orcid":"https://orcid.org/0000-0002-2151-8314"},"institutions":[{"id":"https://openalex.org/I9579091","display_name":"Indian Institute of Technology Mandi","ror":"https://ror.org/05r9r2f34","country_code":"IN","type":"education","lineage":["https://openalex.org/I9579091"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Varun Dutt","raw_affiliation_strings":["Applied Cognitive Science Laboratory, Indian Institute of Technology, Mandi, 175005, India"],"affiliations":[{"raw_affiliation_string":"Applied Cognitive Science Laboratory, Indian Institute of Technology, Mandi, 175005, India","institution_ids":["https://openalex.org/I9579091"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5024799882"],"corresponding_institution_ids":["https://openalex.org/I9579091"],"apc_list":null,"apc_paid":null,"fwci":0.3927,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.72820509,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"26","issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.9750999808311462,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.9485207796096802},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7464300990104675},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6045968532562256},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5738768577575684},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.546302318572998},{"id":"https://openalex.org/keywords/security-controls","display_name":"Security controls","score":0.4131665825843811},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3996443748474121},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.2269258201122284},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.118327796459198}],"concepts":[{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.9485207796096802},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7464300990104675},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6045968532562256},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5738768577575684},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.546302318572998},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.4131665825843811},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3996443748474121},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.2269258201122284},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.118327796459198},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cybersa.2018.8551421","is_oa":false,"landing_page_url":"http://doi.org/10.1109/cybersa.2018.8551421","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7599999904632568}],"awards":[],"funders":[{"id":"https://openalex.org/F4320320719","display_name":"Department of Science and Technology, Ministry of Science and Technology, India","ror":"https://ror.org/0101xrq71"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W384508544","https://openalex.org/W1531590217","https://openalex.org/W1592657892","https://openalex.org/W1713503745","https://openalex.org/W1964439345","https://openalex.org/W2060256879","https://openalex.org/W2096130600","https://openalex.org/W2120969335","https://openalex.org/W2165611922","https://openalex.org/W2169923789","https://openalex.org/W2463700031","https://openalex.org/W2574318955","https://openalex.org/W2579603034"],"related_works":["https://openalex.org/W2921504876","https://openalex.org/W2183730421","https://openalex.org/W1982580243","https://openalex.org/W2725637128","https://openalex.org/W2897593657","https://openalex.org/W2294330327","https://openalex.org/W3006507989","https://openalex.org/W4251184983","https://openalex.org/W2371430952","https://openalex.org/W2808263781"],"abstract_inverted_index":{"Patching":[0],"of":[1,53,60,68,76,129,151,172,188,200,216,235],"vulnerabilities":[2],"on":[3,72],"computer":[4,21,244],"systems":[5,13,22],"by":[6,49,142,164],"analysts":[7],"enables":[8],"us":[9],"to":[10,27,64,110,132,154,210],"protect":[11],"these":[12],"from":[14,222],"cyber-attacks.":[15],"However,":[16],"even":[17],"after":[18,140,162],"patching,":[19,126,148],"the":[20,30,50,54,66,69,73,104,127,130,143,149,152,157,165,170,186,198,206,211,233],"may":[23,33],"still":[24],"be":[25,35,47,133,155],"vulnerable":[26,194,212],"cyber-attacks":[28],"as":[29,99],"patching":[31,55,70,113,141,163,239],"process":[32,71],"not":[34],"foolproof.":[36],"Currently,":[37],"little":[38],"is":[39],"known":[40],"about":[41],"how":[42],"hacker\u2019s":[43],"attack":[44,173,201,241],"actions":[45,176,190,202,242],"would":[46],"influenced":[48],"varying":[51],"effectiveness":[52],"process.":[56],"The":[57],"primary":[58],"objective":[59],"this":[61,81],"study":[62],"was":[63,138,160],"investigate":[65],"influence":[67],"attack-and-defend":[74],"decisions":[75],"hackers":[77,100],"and":[78,101,119,174,181,195,229,240],"analysts.":[79,102],"In":[80,103,124],"study,":[82],"we":[83],"used":[84],"a":[85,93,135],"2-player":[86],"zero-sum":[87],"stochastic":[88],"Markov":[89],"security":[90],"game":[91],"in":[92,134,146,156,205,226,243],"lab-based":[94],"experiment":[95],"involving":[96],"participants":[97,106],"performing":[98],"experiment,":[105],"were":[107,177,191,203],"randomly":[108],"assigned":[109],"two":[111],"between-subjects":[112],"conditions:":[114],"effective":[115,125,180],"(N":[116,121],"=":[117,122],"50)":[118],"less-effective":[120,147,182],"50).":[123],"probability":[128,150],"network":[131,153],"non-vulnerable":[136,158,196,207],"state":[137,159,208],"90%":[139],"analyst;":[144],"whereas,":[145],"50%":[161],"analyst.":[166],"Results":[167],"revealed":[168],"that":[169],"proportion":[171,187,199],"defend":[175,189],"similar":[178,192],"between":[179,193],"conditions.":[183],"Furthermore,":[184],"although":[185],"states,":[197],"smaller":[204],"compared":[209],"state.":[213],"A":[214],"majority":[215],"time,":[217],"both":[218],"players":[219],"deviated":[220],"significantly":[221],"their":[223],"Nash":[224],"equilibria":[225],"different":[227],"conditions":[228],"states.":[230],"We":[231],"highlight":[232],"implications":[234],"our":[236],"results":[237],"for":[238],"networks.":[245]},"counts_by_year":[{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
