{"id":"https://openalex.org/W2549150182","doi":"https://doi.org/10.1109/isi.2016.7745440","title":"Using cyber defense exercises to obtain additional data for attacker profiling","display_name":"Using cyber defense exercises to obtain additional data for attacker profiling","publication_year":2016,"publication_date":"2016-09-01","ids":{"openalex":"https://openalex.org/W2549150182","doi":"https://doi.org/10.1109/isi.2016.7745440","mag":"2549150182"},"language":"en","primary_location":{"id":"doi:10.1109/isi.2016.7745440","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2016.7745440","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE Conference on Intelligence and Security Informatics (ISI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051919182","display_name":"Joel Brynielsson","orcid":"https://orcid.org/0000-0002-2677-9759"},"institutions":[{"id":"https://openalex.org/I1291458624","display_name":"Swedish Defence Research Agency","ror":"https://ror.org/0470cgs30","country_code":"SE","type":"funder","lineage":["https://openalex.org/I1291458624"]},{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Joel Brynielsson","raw_affiliation_strings":["FOI Swedish Defence Research Agency, Stockholm, Sweden","KTH Royal Institute of Technology, Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"FOI Swedish Defence Research Agency, Stockholm, Sweden","institution_ids":["https://openalex.org/I1291458624"]},{"raw_affiliation_string":"KTH Royal Institute of Technology, Stockholm, Sweden","institution_ids":["https://openalex.org/I86987016"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037374855","display_name":"Ulrik Franke","orcid":"https://orcid.org/0000-0003-2017-7914"},"institutions":[{"id":"https://openalex.org/I1291458624","display_name":"Swedish Defence Research Agency","ror":"https://ror.org/0470cgs30","country_code":"SE","type":"funder","lineage":["https://openalex.org/I1291458624"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Ulrik Franke","raw_affiliation_strings":["FOI Swedish Defence Research Agency, Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"FOI Swedish Defence Research Agency, Stockholm, Sweden","institution_ids":["https://openalex.org/I1291458624"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101888904","display_name":"Muhammad Adnan Tariq","orcid":"https://orcid.org/0000-0003-3852-2480"},"institutions":[{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Muhammad Adnan Tariq","raw_affiliation_strings":["KTH Royal Institute of Technology, Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"KTH Royal Institute of Technology, Stockholm, Sweden","institution_ids":["https://openalex.org/I86987016"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017751670","display_name":"Stefan Varga","orcid":"https://orcid.org/0000-0002-1888-9237"},"institutions":[{"id":"https://openalex.org/I2800780207","display_name":"Swedish Institute","ror":"https://ror.org/022w3f533","country_code":"SE","type":"government","lineage":["https://openalex.org/I2800780207"]},{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Stefan Varga","raw_affiliation_strings":["KTH Royal Institute of Technology, Stockholm, Sweden","SICS Swedish Institute of Computer Science, Kista, Sweden"],"affiliations":[{"raw_affiliation_string":"KTH Royal Institute of Technology, Stockholm, Sweden","institution_ids":["https://openalex.org/I86987016"]},{"raw_affiliation_string":"SICS Swedish Institute of Computer Science, Kista, Sweden","institution_ids":["https://openalex.org/I2800780207"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5051919182"],"corresponding_institution_ids":["https://openalex.org/I1291458624","https://openalex.org/I86987016"],"apc_list":null,"apc_paid":null,"fwci":1.0796,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.79444144,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"18","issue":null,"first_page":"37","last_page":"42"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T14074","display_name":"Persona Design and Applications","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T14074","display_name":"Persona Design and Applications","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9822999835014343,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9776999950408936,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.8201730251312256},{"id":"https://openalex.org/keywords/persona","display_name":"Persona","score":0.7846485376358032},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7507549524307251},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7449291348457336},{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.6066654920578003},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.5400451421737671},{"id":"https://openalex.org/keywords/situation-awareness","display_name":"Situation awareness","score":0.5101873874664307},{"id":"https://openalex.org/keywords/situational-ethics","display_name":"Situational ethics","score":0.47994330525398254},{"id":"https://openalex.org/keywords/data-breach","display_name":"Data breach","score":0.44392457604408264},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.4193214178085327},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.39814454317092896},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.26342448592185974},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1249525249004364},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.08133676648139954}],"concepts":[{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.8201730251312256},{"id":"https://openalex.org/C313442","wikidata":"https://www.wikidata.org/wiki/Q778556","display_name":"Persona","level":2,"score":0.7846485376358032},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7507549524307251},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7449291348457336},{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.6066654920578003},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.5400451421737671},{"id":"https://openalex.org/C145804949","wikidata":"https://www.wikidata.org/wiki/Q478123","display_name":"Situation awareness","level":2,"score":0.5101873874664307},{"id":"https://openalex.org/C9114305","wikidata":"https://www.wikidata.org/wiki/Q1428317","display_name":"Situational ethics","level":2,"score":0.47994330525398254},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.44392457604408264},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.4193214178085327},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.39814454317092896},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.26342448592185974},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1249525249004364},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.08133676648139954},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isi.2016.7745440","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2016.7745440","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE Conference on Intelligence and Security Informatics (ISI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6600000262260437}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":49,"referenced_works":["https://openalex.org/W58182034","https://openalex.org/W120450624","https://openalex.org/W158061484","https://openalex.org/W173606538","https://openalex.org/W244163977","https://openalex.org/W317312895","https://openalex.org/W607882737","https://openalex.org/W748759319","https://openalex.org/W1499966149","https://openalex.org/W1538821400","https://openalex.org/W1591480890","https://openalex.org/W1606180351","https://openalex.org/W1973203990","https://openalex.org/W1979807069","https://openalex.org/W1987051045","https://openalex.org/W1999094552","https://openalex.org/W2001626638","https://openalex.org/W2002821157","https://openalex.org/W2035833221","https://openalex.org/W2044715809","https://openalex.org/W2052714158","https://openalex.org/W2100979008","https://openalex.org/W2103034588","https://openalex.org/W2107879058","https://openalex.org/W2113587390","https://openalex.org/W2121558310","https://openalex.org/W2128237363","https://openalex.org/W2136711833","https://openalex.org/W2152209726","https://openalex.org/W2158060559","https://openalex.org/W2164955012","https://openalex.org/W2170644967","https://openalex.org/W2221875927","https://openalex.org/W2283372300","https://openalex.org/W2340077410","https://openalex.org/W2491808042","https://openalex.org/W2885344247","https://openalex.org/W3049269311","https://openalex.org/W4247759592","https://openalex.org/W4251002301","https://openalex.org/W6602367030","https://openalex.org/W6604855930","https://openalex.org/W6606458114","https://openalex.org/W6611130752","https://openalex.org/W6622080927","https://openalex.org/W6629566846","https://openalex.org/W6678419360","https://openalex.org/W6695770679","https://openalex.org/W6704425507"],"related_works":["https://openalex.org/W2789663798","https://openalex.org/W2375896275","https://openalex.org/W4230913293","https://openalex.org/W2166943775","https://openalex.org/W2775236000","https://openalex.org/W2073762068","https://openalex.org/W4381733965","https://openalex.org/W151629373","https://openalex.org/W3208400996","https://openalex.org/W1856232276"],"abstract_inverted_index":{"In":[0,89,111],"order":[1],"to":[2,5,14,38,68,77,102],"be":[3,75,159,192],"able":[4],"successfully":[6],"defend":[7],"an":[8,16,109],"IT":[9],"system":[10],"it":[11,35],"is":[12,36],"useful":[13],"have":[15,99],"accurate":[17],"appreciation":[18],"of":[19,61,120,132,140,149,179],"the":[20,47,104,118,130,138,142,147,163,167,175],"cyber":[21,86,134,168,181],"threat":[22,106],"that":[23,73],"goes":[24],"beyond":[25],"stereotypes.":[26],"To":[27],"effectively":[28],"counter":[29],"potentially":[30],"decisive":[31],"and":[32,81,153,177,187,190],"skilled":[33],"attackers":[34,53],"necessary":[37,143],"understand,":[39],"or":[40],"at":[41],"least":[42],"model,":[43],"their":[44,62],"behavior.":[45],"Although":[46],"real":[48],"motives":[49],"for":[50,108,126,137,146,161,184],"untraceable":[51],"anonymous":[52],"will":[54],"remain":[55],"a":[56,58,124],"mystery,":[57],"thorough":[59],"understanding":[60],"observable":[63],"actions":[64],"can":[65,74,158,189],"still":[66],"help":[67],"create":[69],"well-founded":[70],"attacker":[71,94,97,121,127,151,156],"profiles":[72],"used":[76,101,160],"design":[78,131],"effective":[79],"countermeasures":[80],"in":[82,194],"other":[83],"ways":[84],"enhance":[85],"defense":[87,135,182],"efforts.":[88],"recent":[90],"work":[91],"empirically":[92],"founded":[93],"profiles,":[95],"so-called":[96],"personas,":[98,152],"been":[100],"assess":[103],"overall":[105],"situation":[107],"organization.":[110],"this":[112],"paper":[113,171],"we":[114],"elaborate":[115],"on":[116],"1)":[117],"use":[119],"personas":[122,157],"as":[123],"technique":[125],"profiling,":[128],"2)":[129],"tailor-made":[133],"exercises":[136,183],"purpose":[139],"obtaining":[141],"empirical":[144],"data":[145,185],"construction":[148],"such":[150,195],"3)":[154],"how":[155],"enhancing":[162],"situational":[164],"awareness":[165],"within":[166],"domain.":[169],"The":[170],"concludes":[172],"by":[173],"discussing":[174],"possibilities":[176],"limitations":[178],"using":[180],"gathering,":[186],"what":[188],"cannot":[191],"studied":[193],"exercises.":[196]},"counts_by_year":[{"year":2024,"cited_by_count":4},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
