{"id":"https://openalex.org/W3107821638","doi":"https://doi.org/10.1109/iwbis50925.2020.9255505","title":"Capture The Flag Simulation Based on STRIDE Threat Model","display_name":"Capture The Flag Simulation Based on STRIDE Threat Model","publication_year":2020,"publication_date":"2020-10-17","ids":{"openalex":"https://openalex.org/W3107821638","doi":"https://doi.org/10.1109/iwbis50925.2020.9255505","mag":"3107821638"},"language":"en","primary_location":{"id":"doi:10.1109/iwbis50925.2020.9255505","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwbis50925.2020.9255505","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 International Workshop on Big Data and Information Security (IWBIS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084122188","display_name":"Ghina Fitriya","orcid":null},"institutions":[{"id":"https://openalex.org/I4391767907","display_name":"Politeknik Siber Cerdika Internasional","ror":"https://ror.org/01kz6he51","country_code":null,"type":"education","lineage":["https://openalex.org/I4391767907"]},{"id":"https://openalex.org/I2799392579","display_name":"Jakarta State Polytechnic","ror":"https://ror.org/04v8qfb10","country_code":"ID","type":"education","lineage":["https://openalex.org/I2799392579"]}],"countries":["ID"],"is_corresponding":true,"raw_author_name":"Ghina Fitriya","raw_affiliation_strings":["Politeknik Siber dan Sandi Negara, Bogor, Indonesia"],"affiliations":[{"raw_affiliation_string":"Politeknik Siber dan Sandi Negara, Bogor, Indonesia","institution_ids":["https://openalex.org/I2799392579","https://openalex.org/I4391767907"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043181488","display_name":"Arif Rahman Hakim","orcid":"https://orcid.org/0000-0002-6323-0802"},"institutions":[{"id":"https://openalex.org/I4391767907","display_name":"Politeknik Siber Cerdika Internasional","ror":"https://ror.org/01kz6he51","country_code":null,"type":"education","lineage":["https://openalex.org/I4391767907"]},{"id":"https://openalex.org/I2799392579","display_name":"Jakarta State Polytechnic","ror":"https://ror.org/04v8qfb10","country_code":"ID","type":"education","lineage":["https://openalex.org/I2799392579"]}],"countries":["ID"],"is_corresponding":false,"raw_author_name":"Arif Rahman Hakim","raw_affiliation_strings":["Politeknik Siber dan Sandi Negara, Bogor, Indonesia"],"affiliations":[{"raw_affiliation_string":"Politeknik Siber dan Sandi Negara, Bogor, Indonesia","institution_ids":["https://openalex.org/I2799392579","https://openalex.org/I4391767907"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030439845","display_name":"Mohammed A. H. Abozied","orcid":"https://orcid.org/0000-0002-4417-0891"},"institutions":[{"id":"https://openalex.org/I4210100308","display_name":"Military Technical College","ror":"https://ror.org/01337pb37","country_code":"EG","type":"education","lineage":["https://openalex.org/I4210100308"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Mohammed Abozied Hassan Abozied","raw_affiliation_strings":["Military Technical College, Cairo, Egypt"],"affiliations":[{"raw_affiliation_string":"Military Technical College, Cairo, Egypt","institution_ids":["https://openalex.org/I4210100308"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5084122188"],"corresponding_institution_ids":["https://openalex.org/I2799392579","https://openalex.org/I4391767907"],"apc_list":null,"apc_paid":null,"fwci":0.8347,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.81959463,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"145","last_page":"152"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/stride","display_name":"STRIDE","score":0.8801012635231018},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7240093946456909},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.5981989502906799},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5619701743125916},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5484630465507507},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5235492587089539},{"id":"https://openalex.org/keywords/middleware","display_name":"Middleware (distributed applications)","score":0.4112318754196167},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.36771121621131897},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3578769266605377},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3432243764400482},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.27215033769607544}],"concepts":[{"id":"https://openalex.org/C18007350","wikidata":"https://www.wikidata.org/wiki/Q7394815","display_name":"STRIDE","level":2,"score":0.8801012635231018},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7240093946456909},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.5981989502906799},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5619701743125916},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5484630465507507},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5235492587089539},{"id":"https://openalex.org/C169468491","wikidata":"https://www.wikidata.org/wiki/Q146923","display_name":"Middleware (distributed applications)","level":2,"score":0.4112318754196167},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.36771121621131897},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3578769266605377},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3432243764400482},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.27215033769607544}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwbis50925.2020.9255505","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwbis50925.2020.9255505","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 International Workshop on Big Data and Information Security (IWBIS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6399999856948853,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W2044522195","https://openalex.org/W2079318510","https://openalex.org/W2327841840","https://openalex.org/W2478098398","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2998478967","https://openalex.org/W2188559950","https://openalex.org/W2989910292","https://openalex.org/W3128793638","https://openalex.org/W2607818178","https://openalex.org/W2123299109","https://openalex.org/W2021230337","https://openalex.org/W3153057489","https://openalex.org/W2347597433","https://openalex.org/W2791075267"],"abstract_inverted_index":{"Capture":[0,110],"The":[1,92,111,115,130],"Flag":[2,112],"(CTF)":[3],"simulation":[4,29,57,72,93,116,137],"can":[5,124,138],"improve":[6],"the":[7,11,36,55,59,64,70,109,126,141],"player's":[8],"knowledge":[9],"of":[10,46,50,96,117],"cyber":[12],"attacks":[13],"and":[14,18,48,52,102,123],"how":[15],"to":[16,25,107],"secure":[17],"mitigate":[19],"those":[20],"attacks.":[21],"This":[22],"research":[23],"aims":[24],"establish":[26],"a":[27,76,81,85],"CTF":[28,56,71,135],"based":[30,34,62,74],"on":[31,35,63,75,84],"injection":[32],"vulnerability":[33],"STRIDE":[37,65,142],"threat":[38,66,127],"model":[39,128],"(Spoofing,":[40],"Tampering,":[41],"Repudiation,":[42],"Information":[43],"Disclosure,":[44],"Denial":[45],"Service,":[47],"Elevation":[49],"Privilege).":[51],"then":[53],"building":[54],"with":[58,88,104],"Injection":[60,90,143],"scenario":[61,119],"model.":[67,144],"We":[68],"develop":[69],"environment":[73,94],"web":[77,113],"application":[78],"by":[79],"using":[80],"server":[82,98],"flask":[83],"virtual":[86],"machine":[87],"various":[89],"scenarios.":[91],"consists":[95],"two":[97],"applications,":[99],"namely":[100],"middleware":[101],"backend,":[103],"different":[105],"ports":[106],"access":[108],"application.":[114],"each":[118],"has":[120],"been":[121],"tested":[122],"describe":[125],"STRIDE.":[129],"results":[131],"show":[132],"that":[133],"our":[134],"web-based":[136],"effectively":[139],"run":[140]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-14T08:04:32.555800","created_date":"2025-10-10T00:00:00"}
