{"id":"https://openalex.org/W3171781455","doi":"https://doi.org/10.1109/syscon48628.2021.9447060","title":"Offensive Cyber Security Trainer for Platform Management Systems","display_name":"Offensive Cyber Security Trainer for Platform Management Systems","publication_year":2021,"publication_date":"2021-04-15","ids":{"openalex":"https://openalex.org/W3171781455","doi":"https://doi.org/10.1109/syscon48628.2021.9447060","mag":"3171781455"},"language":"en","primary_location":{"id":"doi:10.1109/syscon48628.2021.9447060","is_oa":false,"landing_page_url":"https://doi.org/10.1109/syscon48628.2021.9447060","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Systems Conference (SysCon)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075066415","display_name":"Jonathan Timmins","orcid":null},"institutions":[{"id":"https://openalex.org/I51768193","display_name":"Royal Military College of Canada","ror":"https://ror.org/04yr71909","country_code":"CA","type":"education","lineage":["https://openalex.org/I51768193"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Jonathan Timmins","raw_affiliation_strings":["Computer Security Lab, Royal Military College of Canada, Kingston, Canada"],"affiliations":[{"raw_affiliation_string":"Computer Security Lab, Royal Military College of Canada, Kingston, Canada","institution_ids":["https://openalex.org/I51768193"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030947655","display_name":"Scott Knight","orcid":null},"institutions":[{"id":"https://openalex.org/I51768193","display_name":"Royal Military College of Canada","ror":"https://ror.org/04yr71909","country_code":"CA","type":"education","lineage":["https://openalex.org/I51768193"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Scott Knight","raw_affiliation_strings":["Computer Security Lab, Royal Military College of Canada, Kingston, Canada"],"affiliations":[{"raw_affiliation_string":"Computer Security Lab, Royal Military College of Canada, Kingston, Canada","institution_ids":["https://openalex.org/I51768193"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068379293","display_name":"Brian Lachine","orcid":"https://orcid.org/0009-0000-1177-371X"},"institutions":[{"id":"https://openalex.org/I51768193","display_name":"Royal Military College of Canada","ror":"https://ror.org/04yr71909","country_code":"CA","type":"education","lineage":["https://openalex.org/I51768193"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Brian Lachine","raw_affiliation_strings":["Computer Security Lab, Royal Military College of Canada, Kingston, Canada"],"affiliations":[{"raw_affiliation_string":"Computer Security Lab, Royal Military College of Canada, Kingston, Canada","institution_ids":["https://openalex.org/I51768193"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5075066415"],"corresponding_institution_ids":["https://openalex.org/I51768193"],"apc_list":null,"apc_paid":null,"fwci":0.2839,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.60682451,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9901000261306763,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9901000261306763,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.9840999841690063,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12000","display_name":"Systems Engineering Methodologies and Applications","score":0.9725000262260437,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/offensive","display_name":"Offensive","score":0.9338241815567017},{"id":"https://openalex.org/keywords/trainer","display_name":"Trainer","score":0.7876652479171753},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7303029894828796},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5987100005149841},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.4598046839237213},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4450749158859253},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.44418543577194214},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.22730818390846252},{"id":"https://openalex.org/keywords/operations-research","display_name":"Operations research","score":0.07791036367416382}],"concepts":[{"id":"https://openalex.org/C176856949","wikidata":"https://www.wikidata.org/wiki/Q2001676","display_name":"Offensive","level":2,"score":0.9338241815567017},{"id":"https://openalex.org/C2780463512","wikidata":"https://www.wikidata.org/wiki/Q15122700","display_name":"Trainer","level":2,"score":0.7876652479171753},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7303029894828796},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5987100005149841},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.4598046839237213},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4450749158859253},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.44418543577194214},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.22730818390846252},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.07791036367416382},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/syscon48628.2021.9447060","is_oa":false,"landing_page_url":"https://doi.org/10.1109/syscon48628.2021.9447060","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Systems Conference (SysCon)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1271653324","https://openalex.org/W1563571483","https://openalex.org/W1803184879","https://openalex.org/W1831161261","https://openalex.org/W2025691702","https://openalex.org/W2041587044","https://openalex.org/W2075696462","https://openalex.org/W2083294444","https://openalex.org/W2107425542","https://openalex.org/W2593005972","https://openalex.org/W2799982618","https://openalex.org/W2887952359","https://openalex.org/W2905542721","https://openalex.org/W6628032172","https://openalex.org/W6734600614"],"related_works":["https://openalex.org/W1568520348","https://openalex.org/W3214407891","https://openalex.org/W3194113117","https://openalex.org/W3213194066","https://openalex.org/W2967125893","https://openalex.org/W268355439","https://openalex.org/W4287020359","https://openalex.org/W4385323698","https://openalex.org/W2385362579","https://openalex.org/W4366249425"],"abstract_inverted_index":{"To":[0],"protect":[1],"its":[2,263,288],"platforms":[3,36],"against":[4,177,191,277],"cyber":[5,17,58,63,110,134,145,157,203],"attacks,":[6],"the":[7,25,68,81,139,186,244,253,267,271,278,283],"Royal":[8],"Canadian":[9],"Navy":[10],"(RCN)":[11],"must":[12],"train":[13],"specialists":[14,20,47],"in":[15,31,56,108,115,128,182,294],"platform":[16,84,179],"security.":[18],"These":[19],"will":[21,48,118,164,184],"need":[22],"to":[23,33,38,92,143,159,188,197,220,248,265],"understand":[24],"offensive":[26,57,109,133,202],"capabilities":[27],"of":[28,80,88,104,141,171,215,225,235,257,273,282,290],"their":[29],"adversaries":[30],"order":[32,196],"defend":[34,190],"these":[35,46,161],"and":[37,102,154,218,227,270],"develop":[39,93],"more":[40],"secure":[41],"systems.":[42,85,180],"As":[43],"a":[44,94,168,207,213,232,242],"result,":[45],"require":[49],"an":[50,132,201,222],"environment":[51,96,127,298],"which":[52,137,211],"can":[53,174],"facilitate":[54,266],"training":[55,100,105,113,126,140,238,268,297],"security":[59,64,135,204],"techniques.":[60,111],"Currently,":[61],"no":[62],"trainer":[65,136,205,259,284],"exists":[66],"for":[67,78,206],"RCN's":[69,82],"Platform":[70],"Management":[71],"Systems":[72],"(PMS),":[73],"nor":[74],"does":[75],"one":[76],"exist":[77],"any":[79],"other":[83],"The":[86,125,255,280],"aim":[87],"this":[89,116,129,199,258],"research":[90,292],"is":[91,131,209,260,285],"PMS":[95,208],"based":[97],"on":[98,287],"effective":[99,223,295],"techniques":[101,114],"capable":[103],"RCN":[106,178,187],"personnel":[107,142,250],"Effective":[112],"context":[117],"reflect":[119],"best":[120],"practices":[121],"from":[122,149],"pedagogical":[123],"literature.":[124],"case":[130],"facilitates":[138],"execute":[144],"kill":[146,162,193,275],"chains":[147,163,276],"mapped":[148],"real":[150],"attacker":[151],"tactics,":[152],"techniques,":[153],"procedures.":[155],"Training":[156],"defenders":[158],"perform":[160],"provide":[165,221],"them":[166],"with":[167],"greater":[169],"understanding":[170],"how":[172],"attacks":[173],"be":[175],"executed":[176],"This":[181,237],"turn":[183],"enable":[185],"better":[189],"such":[192],"chains.":[194],"In":[195],"accomplish":[198],"aim,":[200],"developed":[210],"utilizes":[212],"combination":[214],"simulation,":[216],"emulation,":[217],"virtualization":[219],"level":[224,234],"control":[226],"flexibility":[228],"while":[229],"also":[230,239],"maintaining":[231],"high":[233],"realism.":[236],"specifically":[240],"leverages":[241],"Capture":[243],"Flag":[245],"(CTF)":[246],"framework":[247],"enhance":[249],"engagement":[251],"within":[252],"environment.":[254],"functionality":[256],"demonstrated":[261],"by":[262],"ability":[264],"program":[269],"execution":[272],"multiple":[274],"PMS.":[279],"effectiveness":[281],"validated":[286],"application":[289],"current":[291],"methodology":[293],"gamified":[296],"design.":[299]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
