{"id":"https://openalex.org/W4416251602","doi":"https://doi.org/10.1109/ijcnn64981.2025.11228518","title":"Towards Autonomous Cyber Defence: Applying Systems Theoretic Process Analysis to Human-Machine Teaming","display_name":"Towards Autonomous Cyber Defence: Applying Systems Theoretic Process Analysis to Human-Machine Teaming","publication_year":2025,"publication_date":"2025-06-30","ids":{"openalex":"https://openalex.org/W4416251602","doi":"https://doi.org/10.1109/ijcnn64981.2025.11228518"},"language":null,"primary_location":{"id":"doi:10.1109/ijcnn64981.2025.11228518","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn64981.2025.11228518","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Shu-Jui Chang","orcid":null},"institutions":[{"id":"https://openalex.org/I143804889","display_name":"Loughborough University","ror":"https://ror.org/04vg4w365","country_code":"GB","type":"education","lineage":["https://openalex.org/I143804889"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Shu-Jui Chang","raw_affiliation_strings":["Loughborough University,Computer Science,Loughborough,UK"],"affiliations":[{"raw_affiliation_string":"Loughborough University,Computer Science,Loughborough,UK","institution_ids":["https://openalex.org/I143804889"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080048241","display_name":"Chris Hicks","orcid":null},"institutions":[{"id":"https://openalex.org/I4210128584","display_name":"The Alan Turing Institute","ror":"https://ror.org/035dkdb55","country_code":"GB","type":"facility","lineage":["https://openalex.org/I4210128584"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Chris Hicks","raw_affiliation_strings":["The Alan Turing Institute,London,UK"],"affiliations":[{"raw_affiliation_string":"The Alan Turing Institute,London,UK","institution_ids":["https://openalex.org/I4210128584"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008006072","display_name":"Vasilios Mavroudis","orcid":"https://orcid.org/0000-0003-2667-5906"},"institutions":[{"id":"https://openalex.org/I4210128584","display_name":"The Alan Turing Institute","ror":"https://ror.org/035dkdb55","country_code":"GB","type":"facility","lineage":["https://openalex.org/I4210128584"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Vasilios Mavroudis","raw_affiliation_strings":["The Alan Turing Institute,London,UK"],"affiliations":[{"raw_affiliation_string":"The Alan Turing Institute,London,UK","institution_ids":["https://openalex.org/I4210128584"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075316109","display_name":"Iain Phillips","orcid":"https://orcid.org/0000-0001-8503-7651"},"institutions":[{"id":"https://openalex.org/I143804889","display_name":"Loughborough University","ror":"https://ror.org/04vg4w365","country_code":"GB","type":"education","lineage":["https://openalex.org/I143804889"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Iain Phillips","raw_affiliation_strings":["Loughborough University,Computer Science,Loughborough,UK"],"affiliations":[{"raw_affiliation_string":"Loughborough University,Computer Science,Loughborough,UK","institution_ids":["https://openalex.org/I143804889"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030510462","display_name":"Tim Watson","orcid":"https://orcid.org/0000-0002-3841-3332"},"institutions":[{"id":"https://openalex.org/I143804889","display_name":"Loughborough University","ror":"https://ror.org/04vg4w365","country_code":"GB","type":"education","lineage":["https://openalex.org/I143804889"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Tim Watson","raw_affiliation_strings":["Loughborough University,Computer Science,Loughborough,UK"],"affiliations":[{"raw_affiliation_string":"Loughborough University,Computer Science,Loughborough,UK","institution_ids":["https://openalex.org/I143804889"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I143804889"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.38405702,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10525","display_name":"Human-Automation Interaction and Safety","score":0.5435000061988831,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10525","display_name":"Human-Automation Interaction and Safety","score":0.5435000061988831,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.06109999865293503,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.025599999353289604,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.6585999727249146},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5950000286102295},{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.5860999822616577},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.5584999918937683},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.49059998989105225},{"id":"https://openalex.org/keywords/process-analysis","display_name":"Process analysis","score":0.4311999976634979},{"id":"https://openalex.org/keywords/process-control","display_name":"Process control","score":0.3831000030040741}],"concepts":[{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.6585999727249146},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5950000286102295},{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.5860999822616577},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.5620999932289124},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.5584999918937683},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4959000051021576},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.49059998989105225},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4404999911785126},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.4381999969482422},{"id":"https://openalex.org/C2983072294","wikidata":"https://www.wikidata.org/wiki/Q7247257","display_name":"Process analysis","level":2,"score":0.4311999976634979},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.41110000014305115},{"id":"https://openalex.org/C155386361","wikidata":"https://www.wikidata.org/wiki/Q1649571","display_name":"Process control","level":3,"score":0.3831000030040741},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.3693999946117401},{"id":"https://openalex.org/C132835097","wikidata":"https://www.wikidata.org/wiki/Q7663745","display_name":"System safety","level":2,"score":0.3425000011920929},{"id":"https://openalex.org/C2776544517","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Unexpected events","level":2,"score":0.32440000772476196},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.32359999418258667},{"id":"https://openalex.org/C77405623","wikidata":"https://www.wikidata.org/wiki/Q598451","display_name":"System dynamics","level":2,"score":0.31869998574256897},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.3091999888420105},{"id":"https://openalex.org/C80038721","wikidata":"https://www.wikidata.org/wiki/Q4380673","display_name":"Process safety","level":3,"score":0.2985000014305115},{"id":"https://openalex.org/C24119478","wikidata":"https://www.wikidata.org/wiki/Q679871","display_name":"Systems analysis","level":2,"score":0.28760001063346863},{"id":"https://openalex.org/C174998907","wikidata":"https://www.wikidata.org/wiki/Q357662","display_name":"Work in process","level":2,"score":0.2870999872684479},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.2791999876499176}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ijcnn64981.2025.11228518","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn64981.2025.11228518","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W2016310411","https://openalex.org/W2192363477","https://openalex.org/W2957301300","https://openalex.org/W2981908478","https://openalex.org/W2990091066","https://openalex.org/W3213051381","https://openalex.org/W4285246315","https://openalex.org/W4388886866","https://openalex.org/W4392820641"],"related_works":[],"abstract_inverted_index":{"With":[0],"cyberspace":[1],"becoming":[2],"ever":[3],"more":[4,15],"fiercely":[5],"contested,":[6],"blue":[7,38],"team":[8,39],"operations":[9],"face":[10],"a":[11],"growing":[12],"demand":[13,25],"for":[14],"efficient":[16],"and":[17,32,75,80,91,106,110],"sophisticated":[18],"capabilities.":[19],"One":[20],"way":[21],"to":[22,53,70,103],"meet":[23],"this":[24],"is":[26,51],"by":[27],"integrating":[28],"Human-Machine":[29],"Teaming":[30],"(HMT)":[31],"autonomous":[33],"cyber":[34],"defence":[35],"(ACD),":[36],"enhancing":[37],"collaboration":[40],"with":[41],"AI-driven":[42,113],"machines.":[43],"A":[44],"rigorous":[45],"analysis":[46],"of":[47,86,112],"their":[48],"interaction":[49],"dynamics":[50],"essential":[52],"ensure":[54],"these":[55],"technologies":[56],"are":[57],"safely":[58],"deployed":[59],"in":[60,83],"high-stakes":[61],"environments.This":[62],"study":[63],"employs":[64],"Systems":[65],"Theoretic":[66],"Process":[67],"Analysis":[68],"(STPA)":[69],"examine":[71],"the":[72,84,108],"control":[73,96],"actions":[74],"feedback":[76],"loops":[77],"between":[78],"machines":[79],"controlled":[81],"processors":[82],"context":[85],"ACD,":[87],"identifying":[88],"potential":[89],"hazards":[90],"losses":[92],"arising":[93],"from":[94],"unsafe":[95],"actions.":[97],"Additionally,":[98],"it":[99],"establishes":[100],"system":[101],"constraints":[102],"mitigate":[104],"risks":[105],"enhance":[107],"safety":[109],"reliability":[111],"HMT":[114],"operations.":[115]},"counts_by_year":[],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-11-14T00:00:00"}
