{"id":"https://openalex.org/W3011422375","doi":"https://doi.org/10.1109/milcom47813.2019.9020852","title":"On the Use of Cyber Threat Intelligence (CTI) in Support of Developing the Commander's Understanding of the Adversary","display_name":"On the Use of Cyber Threat Intelligence (CTI) in Support of Developing the Commander's Understanding of the Adversary","publication_year":2019,"publication_date":"2019-11-01","ids":{"openalex":"https://openalex.org/W3011422375","doi":"https://doi.org/10.1109/milcom47813.2019.9020852","mag":"3011422375"},"language":"en","primary_location":{"id":"doi:10.1109/milcom47813.2019.9020852","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom47813.2019.9020852","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077957045","display_name":"Manisha Parmar","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Manisha Parmar","raw_affiliation_strings":["NATO CIS Agency (NCI Agency), North Atlantic Treaty Organization (NATO), The Hague, Netherlands"],"affiliations":[{"raw_affiliation_string":"NATO CIS Agency (NCI Agency), North Atlantic Treaty Organization (NATO), The Hague, Netherlands","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5053892150","display_name":"Alberto Domingo","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Alberto Domingo","raw_affiliation_strings":["NATO Allied Command Transformation (ACT), North Atlantic Treaty Organization (NATO), Norfolk, VA, USA"],"affiliations":[{"raw_affiliation_string":"NATO Allied Command Transformation (ACT), North Atlantic Treaty Organization (NATO), Norfolk, VA, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5077957045"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.374,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.915523,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12572","display_name":"Intelligence, Security, War Strategy","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.8598650693893433},{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.778326153755188},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7162153124809265},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.594252347946167},{"id":"https://openalex.org/keywords/agency","display_name":"Agency (philosophy)","score":0.5032104849815369},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.4842088222503662},{"id":"https://openalex.org/keywords/intelligence-analysis","display_name":"Intelligence analysis","score":0.45781412720680237},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.45201927423477173},{"id":"https://openalex.org/keywords/command-and-control","display_name":"Command and control","score":0.4272730350494385},{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.42156440019607544},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1775052845478058},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.17158028483390808},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.14515036344528198},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.13161370158195496},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.09630018472671509}],"concepts":[{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.8598650693893433},{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.778326153755188},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7162153124809265},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.594252347946167},{"id":"https://openalex.org/C108170787","wikidata":"https://www.wikidata.org/wiki/Q3951828","display_name":"Agency (philosophy)","level":2,"score":0.5032104849815369},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.4842088222503662},{"id":"https://openalex.org/C517642484","wikidata":"https://www.wikidata.org/wiki/Q2388514","display_name":"Intelligence analysis","level":2,"score":0.45781412720680237},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.45201927423477173},{"id":"https://openalex.org/C506615639","wikidata":"https://www.wikidata.org/wiki/Q21662260","display_name":"Command and control","level":2,"score":0.4272730350494385},{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.42156440019607544},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1775052845478058},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.17158028483390808},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.14515036344528198},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.13161370158195496},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.09630018472671509},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/milcom47813.2019.9020852","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom47813.2019.9020852","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5699999928474426,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W77083600","https://openalex.org/W6603173816"],"related_works":["https://openalex.org/W2801622120","https://openalex.org/W2164141394","https://openalex.org/W1967649051","https://openalex.org/W3036524962","https://openalex.org/W4240977217","https://openalex.org/W2508088450","https://openalex.org/W4214750239","https://openalex.org/W2778382471","https://openalex.org/W346269787","https://openalex.org/W3124880148"],"abstract_inverted_index":{"Cyber":[0],"Threat":[1],"Intelligence":[2],"(CTI)":[3],"is":[4,94,203,226],"a":[5,52,91,104],"rapidly":[6],"developing":[7],"field":[8],"which":[9,122,154],"has":[10],"evolved":[11],"in":[12,18,31,38,78,126,211,215],"direct":[13],"response":[14],"to":[15,33,87,113,150,192,205,217,220,231],"exponential":[16],"growth":[17],"cyber":[19],"related":[20,198],"crimes":[21],"and":[22,27,36,74,79,110,148,160,172,176,208,235,251],"attacks.":[23],"CTI":[24,57,89],"supports":[25,59],"Communication":[26,175],"Information":[28,177],"System":[29],"(CIS)Security":[30],"order":[32,216],"bolster":[34],"defenses":[35],"aids":[37,123],"the":[39,64,70,88,95,99,127,173,185,194,206,212,229,237,247,255],"development":[40],"of":[41,107,129,131,140,187,196,242],"threat":[42],"models":[43],"that":[44],"inform":[45],"an":[46,124,142],"organization's":[47],"decision":[48],"making":[49],"process.":[50],"In":[51],"military":[53],"organization":[54,143],"like":[55],"NATO,":[56],"additionally":[58],"Cyberspace":[60],"Operations":[61],"by":[62,98],"providing":[63],"Commander":[65,230],"with":[66,144,157,184],"essential":[67],"intelligence":[68,225],"about":[69],"adversary,":[71],"their":[72],"capabilities":[73],"objectives":[75],"while":[76],"operating":[77],"through":[80],"cyberspace.":[81],"There":[82],"have":[83,181],"been":[84,182],"many":[85],"contributions":[86],"field;":[90],"noteworthy":[92],"contribution":[93],"ATT&CK\u00ae":[96,102,135,213],"framework":[97,136],"Mitre":[100],"Corporation.":[101],"contains":[103],"comprehensive":[105],"list":[106],"adversary":[108,158,197,222],"tactics":[109,147,207],"techniques":[111,149,189,209],"linked":[112],"custom":[114],"or":[115],"publicly":[116],"known":[117],"Advanced":[118],"Persistent":[119],"Threats":[120],"(APT)":[121],"analyst":[125],"characterization":[128,159],"Indicators":[130],"Compromise":[132],"(IOCs).":[133],"The":[134,166,200],"also":[137],"demonstrates":[138],"possibility":[139],"supporting":[141],"linking":[145],"observed":[146],"specific":[151],"APT":[152],"behavior,":[153],"may":[155],"assist":[156],"identification,":[161],"necessary":[162],"steps":[163,253],"towards":[164],"attribution.":[165],"NATO":[167,174],"Allied":[168],"Command":[169],"Transformation":[170],"(ACT)":[171],"Agency":[178],"(NCI":[179],"Agency)":[180],"experimenting":[183],"use":[186],"deception":[188],"(including":[190],"decoys)":[191],"increase":[193],"collection":[195],"data.":[199],"collected":[201],"data":[202],"mapped":[204],"described":[210],"framework,":[214],"derive":[218],"evidence":[219],"support":[221,232],"characterization;":[223],"this":[224],"pivotal":[227],"for":[228,254],"mission":[233],"planning":[234],"determine":[236],"best":[238],"possible":[239],"multi-domain":[240],"courses":[241],"action.":[243],"This":[244],"paper":[245],"describes":[246],"approach,":[248],"methodology,":[249],"outcomes":[250],"next":[252],"conducted":[256],"experiments.":[257]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
