{"id":"https://openalex.org/W4406611331","doi":"https://doi.org/10.1109/iccma63715.2024.10843938","title":"Generative AI for Cyber Threat Simulation and Defense","display_name":"Generative AI for Cyber Threat Simulation and Defense","publication_year":2024,"publication_date":"2024-11-11","ids":{"openalex":"https://openalex.org/W4406611331","doi":"https://doi.org/10.1109/iccma63715.2024.10843938"},"language":"en","primary_location":{"id":"doi:10.1109/iccma63715.2024.10843938","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccma63715.2024.10843938","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 12th International Conference on Control, Mechatronics and Automation (ICCMA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5114294155","display_name":"Rahul Vadisetty","orcid":null},"institutions":[{"id":"https://openalex.org/I185443292","display_name":"Wayne State University","ror":"https://ror.org/01070mq45","country_code":"US","type":"education","lineage":["https://openalex.org/I185443292"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Rahul Vadisetty","raw_affiliation_strings":["Wayne State University,Electrical Engineering,Detroit,USA"],"affiliations":[{"raw_affiliation_string":"Wayne State University,Electrical Engineering,Detroit,USA","institution_ids":["https://openalex.org/I185443292"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5115904830","display_name":"Anand Polamarasetti","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Anand Polamarasetti","raw_affiliation_strings":["Anandra University,ComputerScience,Visakhapatnam,India"],"affiliations":[{"raw_affiliation_string":"Anandra University,ComputerScience,Visakhapatnam,India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5114294155"],"corresponding_institution_ids":["https://openalex.org/I185443292"],"apc_list":null,"apc_paid":null,"fwci":3.8701,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.94621546,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"272","last_page":"279"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9333000183105469,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9333000183105469,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9154999852180481,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6822620630264282},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.6239737868309021},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4542541801929474},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.35521817207336426}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6822620630264282},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.6239737868309021},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4542541801929474},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35521817207336426}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccma63715.2024.10843938","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccma63715.2024.10843938","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 12th International Conference on Control, Mechatronics and Automation (ICCMA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W4320147968","https://openalex.org/W4321240473","https://openalex.org/W4366126803","https://openalex.org/W4378188762","https://openalex.org/W4388464532","https://openalex.org/W4392132054","https://openalex.org/W4394564352","https://openalex.org/W4394712905","https://openalex.org/W4395700375","https://openalex.org/W4402572595","https://openalex.org/W4402811769","https://openalex.org/W4406550611","https://openalex.org/W6762865338","https://openalex.org/W6801144609","https://openalex.org/W6856680553","https://openalex.org/W6862738318","https://openalex.org/W6872301732","https://openalex.org/W6922312113"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2380075625","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890"],"abstract_inverted_index":{"Generative":[0],"AI":[1,50,71],"enhances":[2],"cybersecurity":[3,74],"by":[4],"simulating":[5],"various":[6],"cyber":[7,25],"threats":[8],"and":[9,21,28,40,56,76,85],"strengthening":[10],"possible":[11],"defense":[12,43],"mechanisms.":[13],"The":[14,30,63],"paper":[15],"proposes":[16],"using":[17],"generative":[18,49,70],"adversarial":[19],"networks":[20],"variational":[22],"auto-encoders":[23],"for":[24,69,80],"threat":[26,54],"simulation":[27],"defense.":[29],"main":[31],"contributions":[32],"include":[33],"new":[34],"methodologies":[35],"to":[36,60,72],"simulate":[37],"realistic":[38],"cyber-attacks":[39],"develop":[41],"robust":[42],"strategies.":[44],"Experimental":[45],"results":[46,64],"show":[47],"that":[48],"can":[51],"hugely":[52],"improve":[53],"detection":[55],"response":[57],"time":[58],"compared":[59],"traditional":[61],"methods.":[62],"underline":[65],"the":[66,78],"vast":[67],"potential":[68],"transform":[73],"practice":[75],"lay":[77],"foundations":[79],"a":[81],"much":[82],"more":[83],"resilient":[84],"adaptive":[86],"security":[87],"framework.":[88]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":9}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
