{"id":"https://openalex.org/W2909369625","doi":"https://doi.org/10.1109/tale.2018.8615431","title":"A Quantitative Approach to Design Special Purpose Systems to Measure Hacking Skills","display_name":"A Quantitative Approach to Design Special Purpose Systems to Measure Hacking Skills","publication_year":2018,"publication_date":"2018-12-01","ids":{"openalex":"https://openalex.org/W2909369625","doi":"https://doi.org/10.1109/tale.2018.8615431","mag":"2909369625"},"language":"en","primary_location":{"id":"doi:10.1109/tale.2018.8615431","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tale.2018.8615431","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/conference_contribution/A_quantitative_approach_to_design_special_purpose_systems_to_measure_hacking_skills/20769541","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064626440","display_name":"Ahmed Falah","orcid":"https://orcid.org/0000-0001-6359-8570"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Ahmed Falah","raw_affiliation_strings":["Deakin University, Burwood, VIC, AU"],"affiliations":[{"raw_affiliation_string":"Deakin University, Burwood, VIC, AU","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045991464","display_name":"Lei Pan","orcid":"https://orcid.org/0000-0002-4691-8330"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Lei Pan","raw_affiliation_strings":["Deakin University, Burwood, VIC, AU"],"affiliations":[{"raw_affiliation_string":"Deakin University, Burwood, VIC, AU","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100404363","display_name":"Feifei Chen","orcid":"https://orcid.org/0000-0001-5455-3792"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Feifei Chen","raw_affiliation_strings":["Deakin University, Burwood, VIC, AU"],"affiliations":[{"raw_affiliation_string":"Deakin University, Burwood, VIC, AU","institution_ids":["https://openalex.org/I149704539"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5064626440"],"corresponding_institution_ids":["https://openalex.org/I149704539"],"apc_list":null,"apc_paid":null,"fwci":0.8225,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.82923852,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"5","issue":null,"first_page":"54","last_page":"61"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.9222284555435181},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6984238624572754},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6502118110656738},{"id":"https://openalex.org/keywords/rank","display_name":"Rank (graph theory)","score":0.6419917941093445},{"id":"https://openalex.org/keywords/measure","display_name":"Measure (data warehouse)","score":0.59361732006073},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.5297673344612122},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4681530296802521},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4527677297592163},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4382777512073517},{"id":"https://openalex.org/keywords/ranking","display_name":"Ranking (information retrieval)","score":0.43214529752731323},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4227997362613678},{"id":"https://openalex.org/keywords/plan","display_name":"Plan (archaeology)","score":0.4149629771709442},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.2718600928783417},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1329900622367859}],"concepts":[{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.9222284555435181},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6984238624572754},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6502118110656738},{"id":"https://openalex.org/C164226766","wikidata":"https://www.wikidata.org/wiki/Q7293202","display_name":"Rank (graph theory)","level":2,"score":0.6419917941093445},{"id":"https://openalex.org/C2780009758","wikidata":"https://www.wikidata.org/wiki/Q6804172","display_name":"Measure (data warehouse)","level":2,"score":0.59361732006073},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.5297673344612122},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4681530296802521},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4527677297592163},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4382777512073517},{"id":"https://openalex.org/C189430467","wikidata":"https://www.wikidata.org/wiki/Q7293293","display_name":"Ranking (information retrieval)","level":2,"score":0.43214529752731323},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4227997362613678},{"id":"https://openalex.org/C2776505523","wikidata":"https://www.wikidata.org/wiki/Q4785468","display_name":"Plan (archaeology)","level":2,"score":0.4149629771709442},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2718600928783417},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1329900622367859},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tale.2018.8615431","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tale.2018.8615431","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE)","raw_type":"proceedings-article"},{"id":"pmh:oai:dro.deakin.edu.au:DU:30118829","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306402457","display_name":"Deakin Research Online (Deakin University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I149704539","host_organization_name":"Deakin University","host_organization_lineage":["https://openalex.org/I149704539"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Paper"},{"id":"pmh:oai:figshare.com:article/20769541","is_oa":true,"landing_page_url":"https://figshare.com/articles/conference_contribution/A_quantitative_approach_to_design_special_purpose_systems_to_measure_hacking_skills/20769541","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/20769541","is_oa":true,"landing_page_url":"https://figshare.com/articles/conference_contribution/A_quantitative_approach_to_design_special_purpose_systems_to_measure_hacking_skills/20769541","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/4","score":0.7900000214576721,"display_name":"Quality Education"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1494744305","https://openalex.org/W1534238592","https://openalex.org/W1670376504","https://openalex.org/W1987665027","https://openalex.org/W1998933811","https://openalex.org/W2004781009","https://openalex.org/W2009873405","https://openalex.org/W2033687483","https://openalex.org/W2075810856","https://openalex.org/W2079849876","https://openalex.org/W2141135224","https://openalex.org/W2144909613","https://openalex.org/W2461373307","https://openalex.org/W2461943168","https://openalex.org/W2500382405","https://openalex.org/W2562853767","https://openalex.org/W2575671591","https://openalex.org/W2577990380","https://openalex.org/W2583871253","https://openalex.org/W2588951850","https://openalex.org/W2590489721","https://openalex.org/W2734756898","https://openalex.org/W2783289295","https://openalex.org/W2804724858","https://openalex.org/W2804760390","https://openalex.org/W2964318098","https://openalex.org/W6632113268","https://openalex.org/W6718890697","https://openalex.org/W6741362180"],"related_works":["https://openalex.org/W2921504876","https://openalex.org/W2183730421","https://openalex.org/W1982580243","https://openalex.org/W2551868243","https://openalex.org/W2348153269","https://openalex.org/W4205613068","https://openalex.org/W3112956360","https://openalex.org/W2004781009","https://openalex.org/W4286284259","https://openalex.org/W3160516639"],"abstract_inverted_index":{"Accurate":[0],"measure":[1],"of":[2,6,45,128,131],"hacking":[3,132,189],"skills":[4,72,190],"level":[5,73,180],"a":[7,12,19,38,65,80,104,108,129,140,153],"person":[8],"allows":[9,144],"to":[10,32,54,63,147,156],"develop":[11],"response":[13],"plan,":[14],"whether":[15],"it":[16,84,94,143,163],"is":[17,137],"for":[18,191],"cyber":[20,48],"security":[21,49],"learners":[22],"or":[23,89,111],"facing":[24],"an":[25,168],"adversary.":[26],"Numerous":[27],"attempts":[28],"have":[29],"been":[30],"made":[31],"rank":[33,75,173],"hackers,":[34],"qualitatively.":[35],"We":[36],"introduce":[37],"quantitative":[39],"approach":[40,82],"that":[41,68,142],"calculates":[42],"the":[43,70,126,145,158,174,179,188],"probability":[44],"performing":[46],"certain":[47],"actions":[50],"and":[51,74,116,123,150],"match":[52],"them":[53],"well-known":[55],"hackers":[56],"ranks.":[57],"The":[58,118,134],"calculated":[59,88,124],"probabilities":[60],"are":[61],"used":[62],"design":[64,148],"special-purpose":[66],"system":[67,78,136],"measures":[69],"hackers'":[71],"them.":[76],"Our":[77],"uses":[79],"machine-learning":[81],"\u2013":[83],"starts":[85],"with":[86,152],"statistically":[87],"observed":[90],"initial":[91,119],"values,":[92],"then":[93],"can":[95,164,172],"be":[96,165],"trained":[97],"using":[98,107],"data":[99],"generated":[100],"either":[101],"by":[102,112],"calculating":[103],"weighted":[105],"sum":[106],"neural":[109],"networks":[110],"further":[113],"statistics-based":[114],"estimation":[115],"observation.":[117],"values":[120],"were":[121],"gathered":[122],"against":[125],"participants":[127],"number":[130],"competitions.":[133],"probabilistic":[135],"controlled":[138],"in":[139,167],"manner":[141,170],"admin/owner":[146],"tasks":[149],"challenges":[151],"specific":[154],"difficulty":[155],"examine":[157],"systems":[159],"users":[160],"skills.":[161],"Alternatively,":[162],"designed":[166],"open-end":[169],"which":[171],"user's":[175],"skill":[176],"based":[177,195],"on":[178,196],"reached.":[181],"To":[182],"demonstrate":[183],"our":[184],"system,":[185],"we":[186],"analysed":[187],"8":[192],"university":[193],"students":[194],"their":[197],"training":[198],"results.":[199]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
