{"id":"https://openalex.org/W4392248369","doi":"https://doi.org/10.1109/icce59016.2024.10444222","title":"Innovative Application of a Sleepwalking-Based Artificial Neural Model for Cybersecurity Risk Assessment","display_name":"Innovative Application of a Sleepwalking-Based Artificial Neural Model for Cybersecurity Risk Assessment","publication_year":2024,"publication_date":"2024-01-06","ids":{"openalex":"https://openalex.org/W4392248369","doi":"https://doi.org/10.1109/icce59016.2024.10444222"},"language":"en","primary_location":{"id":"doi:10.1109/icce59016.2024.10444222","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icce59016.2024.10444222","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Consumer Electronics (ICCE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005149609","display_name":"Soorena Merat","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Soorena Merat","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5081715061","display_name":"Wahab Almuhtadi","orcid":"https://orcid.org/0000-0002-4754-0800"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wahab Almuhtadi","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5005149609"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0165694,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9825000166893005,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12597","display_name":"Fire Detection and Safety Systems","score":0.9710000157356262,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/sleepwalking","display_name":"Sleepwalking","score":0.8127721548080444},{"id":"https://openalex.org/keywords/risk-assessment","display_name":"Risk assessment","score":0.6033353805541992},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.595133900642395},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5069032311439514},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5023503303527832},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.40626490116119385},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.10665223002433777}],"concepts":[{"id":"https://openalex.org/C2778674190","wikidata":"https://www.wikidata.org/wiki/Q388626","display_name":"Sleepwalking","level":4,"score":0.8127721548080444},{"id":"https://openalex.org/C12174686","wikidata":"https://www.wikidata.org/wiki/Q1058438","display_name":"Risk assessment","level":2,"score":0.6033353805541992},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.595133900642395},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5069032311439514},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5023503303527832},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.40626490116119385},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.10665223002433777},{"id":"https://openalex.org/C169900460","wikidata":"https://www.wikidata.org/wiki/Q2200417","display_name":"Cognition","level":2,"score":0.0},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0},{"id":"https://openalex.org/C1513209611","wikidata":"https://www.wikidata.org/wiki/Q177190","display_name":"Sleep disorder","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icce59016.2024.10444222","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icce59016.2024.10444222","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Consumer Electronics (ICCE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1975412204","https://openalex.org/W1975606892","https://openalex.org/W1990505630","https://openalex.org/W1996711760","https://openalex.org/W2018027127","https://openalex.org/W2049517487","https://openalex.org/W2083380015","https://openalex.org/W2086646484","https://openalex.org/W2087942934","https://openalex.org/W2091886411","https://openalex.org/W2101706260","https://openalex.org/W2112796928","https://openalex.org/W2116064496","https://openalex.org/W2119348712","https://openalex.org/W2125663122","https://openalex.org/W2127076751","https://openalex.org/W2156163116","https://openalex.org/W2158778629","https://openalex.org/W2159080219","https://openalex.org/W2318716281","https://openalex.org/W2567948266","https://openalex.org/W2963406173","https://openalex.org/W6677238981","https://openalex.org/W6678801095","https://openalex.org/W6680414531","https://openalex.org/W6683608245","https://openalex.org/W6990768437"],"related_works":["https://openalex.org/W3113444974","https://openalex.org/W2216908220","https://openalex.org/W2144080038","https://openalex.org/W3118532816","https://openalex.org/W2049067919","https://openalex.org/W1509765523","https://openalex.org/W2159012032","https://openalex.org/W4234165700","https://openalex.org/W4387493640","https://openalex.org/W2070722241"],"abstract_inverted_index":{"The":[0,136,246],"central":[1],"nervous":[2],"system":[3,60],"possesses":[4],"a":[5,77,114,176],"unique":[6],"rhythm":[7],"that":[8,165,237],"alternates":[9],"between":[10,265],"periods":[11],"of":[12,35,51,64,92,152,173,222,259],"focused":[13],"attention":[14,169],"and":[15,81,95,104,133,149,170,181,196,226,268,277],"curious":[16,179],"distractions.":[17],"During":[18],"these":[19,49,199],"distractions,":[20],"the":[21,33,57,62,90,150,171,252,262],"brain":[22,93],"temporarily":[23],"suspends":[24],"synaptic":[25],"activity":[26],"while":[27],"actively":[28],"preserving":[29],"working":[30],"memory.":[31],"In":[32,107],"realm":[34],"information":[36],"security,":[37],"deliberately":[38],"designed":[39],"reconnaissance":[40],"techniques,":[41],"exemplified":[42],"by":[43],"Social":[44],"Engineering":[45],"Exploits,":[46],"capitalize":[47],"on":[48,167,251],"moments":[50],"distraction,":[52],"effectively":[53,212],"gaining":[54],"access":[55],"to":[56,178,193,241,261],"brain\u2019s":[58],"reward":[59],"through":[61],"manipulation":[63],"functional":[65,204],"behaviors.":[66,184],"Subsequently,":[67,198],"individuals":[68,84,240],"under":[69],"such":[70,97,139],"influence":[71],"may":[72,238],"become":[73],"unwitting":[74],"agents":[75],"in":[76,89,117,126],"cyber-attack,":[78],"facilitating":[79],"breaches":[80],"exploitation.":[82],"Distraction-prone":[83],"have":[85,112],"been":[86],"extensively":[87],"studied":[88],"context":[91],"temperament":[94],"factors":[96],"as":[98,175],"fatigue,":[99],"PTSD,":[100],"Alzheimer\u2019s,":[101],"ADHD,":[102],"autism,":[103],"neurodegenerative":[105],"diseases.":[106],"recent":[108],"years,":[109],"cybersecurity":[110,120,243,280],"experts":[111],"exhibited":[113],"growing":[115],"interest":[116],"connecting":[118],"social":[119,161,242],"risks":[121],"with":[122,216],"motivations":[123],"deeply":[124],"rooted":[125],"mental":[127],"conditions.":[128],"These":[129],"include":[130],"dissociative":[131],"learning":[132,210],"counterfeit":[134],"pleasure-seeking.":[135],"insights":[137],"from":[138],"studies":[140],"are":[141,201],"invaluable,":[142],"providing":[143],"guidance":[144],"for":[145,234,274],"risk":[146],"mitigation":[147,276],"strategies":[148],"development":[151],"practical":[153],"security":[154],"tests.":[155],"This":[156],"research":[157,229],"introduces":[158],"an":[159,231,256],"innovative":[160],"competency":[162],"testing":[163],"method":[164],"hinges":[166],"selective":[168],"anticipation":[172],"distraction":[174,195],"gateway":[177],"distractions":[180],"compulsive":[182],"reward-seeking":[183],"An":[185],"artificial":[186],"neural":[187],"network":[188],"meticulously":[189],"records":[190],"parameters":[191],"related":[192],"eye":[194],"tracking.":[197],"data":[200],"translated":[202],"into":[203],"behavior":[205],"patterns":[206],"using":[207],"advanced":[208],"machine":[209],"algorithms,":[211],"predicting":[213],"potential":[214],"correlations":[215],"cyber-attack":[217],"vulnerability.":[218],"By":[219],"amalgamating":[220],"elements":[221],"psychology,":[223],"human":[224,266],"behavior,":[225],"cybersecurity,":[227],"this":[228],"presents":[230],"avant-garde":[232],"approach":[233],"gauging":[235],"behaviors":[236],"predispose":[239],"attack":[244],"risks.":[245],"methodology":[247],"introduced":[248],"herein,":[249],"based":[250],"Sleepwalking":[253],"Algorithm,":[254],"brings":[255],"unprecedented":[257],"depth":[258],"understanding":[260],"complex":[263],"interplay":[264],"psychology":[267],"cyber":[269],"threats,":[270],"opening":[271],"new":[272],"avenues":[273],"threat":[275],"enhancing":[278],"overall":[279],"readiness.":[281]},"counts_by_year":[],"updated_date":"2026-03-04T07:04:00.330322","created_date":"2025-10-10T00:00:00"}
