{"id":"https://openalex.org/W4200570960","doi":"https://doi.org/10.1109/pst52912.2021.9647795","title":"Preparing for National Cyber Crises Using Non-linear Cyber Exercises","display_name":"Preparing for National Cyber Crises Using Non-linear Cyber Exercises","publication_year":2021,"publication_date":"2021-12-13","ids":{"openalex":"https://openalex.org/W4200570960","doi":"https://doi.org/10.1109/pst52912.2021.9647795"},"language":"en","primary_location":{"id":"doi:10.1109/pst52912.2021.9647795","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst52912.2021.9647795","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 18th International Conference on Privacy, Security and Trust (PST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088439816","display_name":"Florian Skopik","orcid":"https://orcid.org/0000-0002-1922-7892"},"institutions":[{"id":"https://openalex.org/I132118926","display_name":"Austrian Institute of Technology","ror":"https://ror.org/04knbh022","country_code":"AT","type":"facility","lineage":["https://openalex.org/I132118926"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Florian Skopik","raw_affiliation_strings":["Center for Digital Safety & Security, AIT Austrian Institute of Technology"],"affiliations":[{"raw_affiliation_string":"Center for Digital Safety & Security, AIT Austrian Institute of Technology","institution_ids":["https://openalex.org/I132118926"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020850844","display_name":"Maria Leitner","orcid":"https://orcid.org/0000-0003-1371-5446"},"institutions":[{"id":"https://openalex.org/I132118926","display_name":"Austrian Institute of Technology","ror":"https://ror.org/04knbh022","country_code":"AT","type":"facility","lineage":["https://openalex.org/I132118926"]},{"id":"https://openalex.org/I129774422","display_name":"University of Vienna","ror":"https://ror.org/03prydq77","country_code":"AT","type":"education","lineage":["https://openalex.org/I129774422"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Maria Leitner","raw_affiliation_strings":["Center for Digital Safety & Security, AIT Austrian Institute of Technology","Faculty of Computer Science, University of Vienna"],"affiliations":[{"raw_affiliation_string":"Center for Digital Safety & Security, AIT Austrian Institute of Technology","institution_ids":["https://openalex.org/I132118926"]},{"raw_affiliation_string":"Faculty of Computer Science, University of Vienna","institution_ids":["https://openalex.org/I129774422"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5088439816"],"corresponding_institution_ids":["https://openalex.org/I132118926"],"apc_list":null,"apc_paid":null,"fwci":0.8262,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.80142937,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.61920166015625},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5519850850105286},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33104750514030457},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10775411128997803}],"concepts":[{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.61920166015625},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5519850850105286},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33104750514030457},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10775411128997803}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/pst52912.2021.9647795","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst52912.2021.9647795","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 18th International Conference on Privacy, Security and Trust (PST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6700000166893005,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W151629373","https://openalex.org/W2174943293","https://openalex.org/W2339166448","https://openalex.org/W2340077410","https://openalex.org/W2748868501","https://openalex.org/W2752551227","https://openalex.org/W2785394676","https://openalex.org/W2789091839","https://openalex.org/W2905542721","https://openalex.org/W3003205915","https://openalex.org/W3120092047","https://openalex.org/W6685341606","https://openalex.org/W6743493502"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W3004173571","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2546638913","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2209816623"],"abstract_inverted_index":{"Cyber":[0],"exercises":[1,254,265],"are":[2,59,102,114,156],"a":[3,77,123,190,199,212],"well-received":[4],"and":[5,15,43,87,97,105,135,180,214,237,260],"established":[6],"means":[7],"to":[8,16,27,45,83,115,128,162,174,183,210,222,225,233,239,266],"strengthen":[9],"the":[10,30,37,47,73,133,137,160,172,185,226],"problem-solving":[11],"skills":[12],"of":[13,32,39,49,61,76,154,229,251],"personnel":[14],"prepare":[17],"staff":[18],"for":[19,29,64,69,189,202,255,263],"future":[20],"cyber":[21,51,56,204,253,257],"incidents.":[22],"While":[23,79],"this":[24,70,194,196,245],"concept":[25],"seems":[26],"work":[28],"majority":[31],"expected":[33],"issues,":[34],"where":[35],"practicing":[36],"application":[38],"specific":[40],"processes,":[41],"tools":[42],"methods":[44],"mitigate":[46],"effects":[48],"large-scale":[50,256],"attacks":[52],"is":[53],"key,":[54],"existing":[55],"exercise":[57],"approaches":[58],"just":[60],"limited":[62],"use":[63],"crises":[65,100,258],"management.":[66],"The":[67],"reason":[68],"lies":[71],"in":[72,118],"very":[74],"nature":[75],"crisis.":[78],"\u2018common\u2019":[80],"incidents":[81],"appear":[82],"be":[84,90,110,116,144],"more":[85,125],"predictable":[86],"can":[88,142],"usually":[89],"dealt":[91],"with":[92],"thoroughly":[93],"prepared":[94,147],"standard":[95],"procedures":[96],"well-rehearsed":[98],"responses,":[99],"however,":[101],"inherently":[103],"uncertain,":[104],"off-the-shelf":[106],"solutions":[107],"may":[108],"even":[109,136],"counterproductive.":[111],"Complex":[112],"decisions":[113,141],"made":[117],"short":[119],"time-frames,":[120],"influenced":[121],"by":[122,146],"lot":[124],"stakeholders":[126],"compared":[127],"internal":[129],"incidents,":[130],"including":[131],"regulators,":[132],"media,":[134],"general":[138],"public.":[139],"These":[140],"barely":[143],"guided":[145],"plans":[148],"or":[149],"checklists,":[150],"thus":[151],"new":[152,200,216],"forms":[153],"preparation":[155],"required,":[157],"which":[158,206],"challenge":[159],"participants":[161],"practice":[163],"decision":[164],"making":[165],"under":[166],"pressure,":[167],"but":[168],"further":[169],"give":[170],"them":[171,182],"opportunity":[173],"re-consider":[175],"choices,":[176],"walk":[177],"alternative":[178,242],"paths":[179],"enable":[181],"find":[184],"best":[186],"possible":[187],"solution":[188],"given":[191],"situation.":[192],"For":[193],"purpose,":[195],"paper":[197],"discusses":[198],"approach":[201],"non-linear":[203,264],"exercises,":[205],"allow":[207],"branching":[208],"points":[209],"develop":[211],"storyline,":[213],"employ":[215],"techniques,":[217],"such":[218],"as":[219],"\u2018Fast":[220],"Forward\u2019":[221],"quickly":[223],"progress":[224],"critical":[227],"stages":[228],"long-lasting":[230],"crises,":[231],"\u2018Playback\u2019":[232],"consolidate":[234],"gained":[235],"skills,":[236],"\u2018Pause-Adapt-Repeat\u2019":[238],"play":[240],"through":[241],"paths.":[243],"In":[244],"paper,":[246],"we":[247],"discuss":[248],"limiting":[249],"factors":[250],"today\u2019s":[252],"preparation,":[259],"introduce":[261],"concepts":[262],"compensate":[267],"these":[268],"issues.":[269]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
