{"id":"https://openalex.org/W4293253977","doi":"https://doi.org/10.1109/pst55820.2022.9851980","title":"User Behavior Simulation in ICS Cyber Ranges","display_name":"User Behavior Simulation in ICS Cyber Ranges","publication_year":2022,"publication_date":"2022-08-22","ids":{"openalex":"https://openalex.org/W4293253977","doi":"https://doi.org/10.1109/pst55820.2022.9851980"},"language":"en","primary_location":{"id":"doi:10.1109/pst55820.2022.9851980","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst55820.2022.9851980","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 19th Annual International Conference on Privacy, Security &amp; Trust (PST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046794142","display_name":"Chuhan Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210104233","display_name":"China Electronics Corporation (China)","ror":"https://ror.org/00vsv8c52","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210104233"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chuhan Liu","raw_affiliation_strings":["Cybersecurity Institute,The 6th Research Institute of China Electronics Corporation,Beijing,P.R. China","The 6th Research Institute of China Electronics Corporation, Cybersecurity Institute, Beijing, P.R. China"],"affiliations":[{"raw_affiliation_string":"Cybersecurity Institute,The 6th Research Institute of China Electronics Corporation,Beijing,P.R. China","institution_ids":["https://openalex.org/I4210104233"]},{"raw_affiliation_string":"The 6th Research Institute of China Electronics Corporation, Cybersecurity Institute, Beijing, P.R. China","institution_ids":["https://openalex.org/I4210104233"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074100911","display_name":"Wei Yan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210104233","display_name":"China Electronics Corporation (China)","ror":"https://ror.org/00vsv8c52","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210104233"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Yan","raw_affiliation_strings":["Cybersecurity Institute,The 6th Research Institute of China Electronics Corporation,Beijing,P.R. China","The 6th Research Institute of China Electronics Corporation, Cybersecurity Institute, Beijing, P.R. China"],"affiliations":[{"raw_affiliation_string":"Cybersecurity Institute,The 6th Research Institute of China Electronics Corporation,Beijing,P.R. China","institution_ids":["https://openalex.org/I4210104233"]},{"raw_affiliation_string":"The 6th Research Institute of China Electronics Corporation, Cybersecurity Institute, Beijing, P.R. China","institution_ids":["https://openalex.org/I4210104233"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067965398","display_name":"Fengkai Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210104233","display_name":"China Electronics Corporation (China)","ror":"https://ror.org/00vsv8c52","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210104233"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fengkai Xu","raw_affiliation_strings":["Cybersecurity Institute,The 6th Research Institute of China Electronics Corporation,Beijing,P.R. China","The 6th Research Institute of China Electronics Corporation, Cybersecurity Institute, Beijing, P.R. China"],"affiliations":[{"raw_affiliation_string":"Cybersecurity Institute,The 6th Research Institute of China Electronics Corporation,Beijing,P.R. China","institution_ids":["https://openalex.org/I4210104233"]},{"raw_affiliation_string":"The 6th Research Institute of China Electronics Corporation, Cybersecurity Institute, Beijing, P.R. China","institution_ids":["https://openalex.org/I4210104233"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018192745","display_name":"Wenlong Yang","orcid":"https://orcid.org/0000-0002-8724-554X"},"institutions":[{"id":"https://openalex.org/I4210104233","display_name":"China Electronics Corporation (China)","ror":"https://ror.org/00vsv8c52","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210104233"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenlong Yang","raw_affiliation_strings":["Cybersecurity Institute,The 6th Research Institute of China Electronics Corporation,Beijing,P.R. China","The 6th Research Institute of China Electronics Corporation, Cybersecurity Institute, Beijing, P.R. China"],"affiliations":[{"raw_affiliation_string":"Cybersecurity Institute,The 6th Research Institute of China Electronics Corporation,Beijing,P.R. China","institution_ids":["https://openalex.org/I4210104233"]},{"raw_affiliation_string":"The 6th Research Institute of China Electronics Corporation, Cybersecurity Institute, Beijing, P.R. China","institution_ids":["https://openalex.org/I4210104233"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100423730","display_name":"Beibei Li","orcid":"https://orcid.org/0000-0002-0485-1975"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Beibei Li","raw_affiliation_strings":["Sichuan University,School of Cyber Science and Engineering,Chengdu,P.R. China,610065"],"affiliations":[{"raw_affiliation_string":"Sichuan University,School of Cyber Science and Engineering,Chengdu,P.R. China,610065","institution_ids":["https://openalex.org/I24185976"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5046794142"],"corresponding_institution_ids":["https://openalex.org/I4210104233"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10319105,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11195","display_name":"Simulation Techniques and Applications","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7937248349189758},{"id":"https://openalex.org/keywords/granularity","display_name":"Granularity","score":0.5892871022224426},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.5606901049613953},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5064653158187866},{"id":"https://openalex.org/keywords/network-simulation","display_name":"Network simulation","score":0.47756892442703247},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4352506697177887},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.42986640334129333},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.41391780972480774},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3771120607852936},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.32745659351348877},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.281379759311676},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.17712262272834778}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7937248349189758},{"id":"https://openalex.org/C177774035","wikidata":"https://www.wikidata.org/wiki/Q1246948","display_name":"Granularity","level":2,"score":0.5892871022224426},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.5606901049613953},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5064653158187866},{"id":"https://openalex.org/C139940560","wikidata":"https://www.wikidata.org/wiki/Q290036","display_name":"Network simulation","level":2,"score":0.47756892442703247},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4352506697177887},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.42986640334129333},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.41391780972480774},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3771120607852936},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.32745659351348877},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.281379759311676},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.17712262272834778}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/pst55820.2022.9851980","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst55820.2022.9851980","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 19th Annual International Conference on Privacy, Security &amp; Trust (PST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.4300000071525574}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2931688134","https://openalex.org/W2377919138","https://openalex.org/W2378857091","https://openalex.org/W2386077850","https://openalex.org/W4391128991","https://openalex.org/W2070815913","https://openalex.org/W2233115222","https://openalex.org/W1966519164","https://openalex.org/W1966158341","https://openalex.org/W4210534126"],"abstract_inverted_index":{"Cyber":[0],"ranges,":[1],"built":[2],"to":[3,18,101,107,130,140,160,185],"simulate":[4,149],"the":[5,12,22,46,109,122,127,132,157,174,186],"topologies,":[6],"configurations,":[7],"and":[8,20,34,57,66,97,120,136,167],"runtime":[9],"status":[10],"of":[11,27,45,115,152],"real":[13],"network,":[14],"can":[15,148],"be":[16],"employed":[17],"test":[19],"verify":[21],"security":[23],"and/or":[24],"privacy":[25],"issues":[26],"user":[28,48,61,81,95,105,153,176],"behaviors":[29,96,106,177],"in":[30,36,59,178],"newly":[31],"developed":[32],"systems":[33,70],"networks":[35],"a":[37,79,142],"virtual":[38,165],"but":[39],"extremely":[40],"similar":[41,184],"environment.":[42],"However,":[43],"most":[44],"existing":[47],"behavior":[49,82],"simulation":[50,83],"methods":[51],"usually":[52],"suffer":[53],"from":[54],"low":[55],"authenticity":[56],"trust":[58],"real-world":[60],"behaviors,":[62,154],"especially":[63],"for":[64,85],"large-scale":[65],"complex":[67],"industrial":[68],"control":[69],"(ICSs).":[71],"To":[72],"meet":[73],"this":[74,76],"gap,":[75],"paper":[77],"proposes":[78],"novel":[80],"method":[84],"ICS":[86,144,179],"cyber":[87,145,180],"ranges.":[88],"Specifically,":[89],"we":[90,118,155],"first":[91],"generate":[92,102],"coarse-grained":[93],"group":[94],"choose":[98],"specific":[99],"nodes":[100],"fine-grained":[103],"individual":[104],"fit":[108],"same":[110],"software":[111],"under":[112],"different":[113,150],"levels":[114],"subsystems.":[116],"Then,":[117],"accelerate":[119],"replay":[121],"generated":[123],"traffic":[124],"by":[125],"compressing":[126],"time":[128],"interval":[129],"balance":[131],"packet":[133],"loss":[134],"rate":[135],"distortion":[137],"rate.":[138],"Importantly,":[139],"build":[141],"multi-granularity":[143],"range":[146],"that":[147,173],"types":[151],"use":[156],"cloud":[158],"platform":[159],"create":[161],"protocol":[162],"stacks,":[163],"dockers,":[164],"machines,":[166],"physical":[168],"devices.":[169],"Experiment":[170],"results":[171],"show":[172],"simulated":[175],"ranges":[181],"are":[182],"highly":[183],"actual":[187],"network":[188],"environments.":[189]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
