{"id":"https://openalex.org/W4402215600","doi":"https://doi.org/10.1109/tdsc.2024.3451129","title":"An Attack Exploiting Cyber-Arm Industry","display_name":"An Attack Exploiting Cyber-Arm Industry","publication_year":2024,"publication_date":"2024-09-04","ids":{"openalex":"https://openalex.org/W4402215600","doi":"https://doi.org/10.1109/tdsc.2024.3451129"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2024.3451129","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3451129","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088474239","display_name":"Jie Gan","orcid":"https://orcid.org/0000-0002-4351-0364"},"institutions":[{"id":"https://openalex.org/I4210157345","display_name":"Venus Medtech (China)","ror":"https://ror.org/05xzt2h26","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210157345"]},{"id":"https://openalex.org/I4210140416","display_name":"New England Biolabs (China)","ror":"https://ror.org/03nb3ch98","country_code":"CN","type":"company","lineage":["https://openalex.org/I115020962","https://openalex.org/I4210140416"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jie Gan","raw_affiliation_strings":["ADLab, Venustech, Beijing, China","ADLab of Venustech"],"affiliations":[{"raw_affiliation_string":"ADLab, Venustech, Beijing, China","institution_ids":["https://openalex.org/I4210140416"]},{"raw_affiliation_string":"ADLab of Venustech","institution_ids":["https://openalex.org/I4210157345"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061294375","display_name":"Chaochao Luo","orcid":"https://orcid.org/0000-0001-8674-6716"},"institutions":[{"id":"https://openalex.org/I4210157345","display_name":"Venus Medtech (China)","ror":"https://ror.org/05xzt2h26","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210157345"]},{"id":"https://openalex.org/I4210140416","display_name":"New England Biolabs (China)","ror":"https://ror.org/03nb3ch98","country_code":"CN","type":"company","lineage":["https://openalex.org/I115020962","https://openalex.org/I4210140416"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chaochao Luo","raw_affiliation_strings":["ADLab, Venustech, Beijing, China","ADLab of Venustech"],"affiliations":[{"raw_affiliation_string":"ADLab, Venustech, Beijing, China","institution_ids":["https://openalex.org/I4210140416"]},{"raw_affiliation_string":"ADLab of Venustech","institution_ids":["https://openalex.org/I4210157345"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100651614","display_name":"Wei Shi","orcid":"https://orcid.org/0000-0002-3071-8350"},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Wei Shi","raw_affiliation_strings":["School of Information Technology, Carleton University, Ottawa, ON, Canada","School of Information Technology, Carleton University, Canada"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Carleton University, Ottawa, ON, Canada","institution_ids":["https://openalex.org/I67031392"]},{"raw_affiliation_string":"School of Information Technology, Carleton University, Canada","institution_ids":["https://openalex.org/I67031392"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100390839","display_name":"Yuan Liu","orcid":"https://orcid.org/0000-0002-0246-0778"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuan Liu","raw_affiliation_strings":["Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China","Cyberspace Institute of Advanced Technology, Guangzhou University, China"],"affiliations":[{"raw_affiliation_string":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]},{"raw_affiliation_string":"Cyberspace Institute of Advanced Technology, Guangzhou University, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058120371","display_name":"Ximeng Liu","orcid":"https://orcid.org/0000-0002-4238-3295"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ximeng Liu","raw_affiliation_strings":["College of Mathematics and Computer Science, Fuzhou University, Fuzhou, Fujian, China","School of College of Computer and Data Science, Fuzhou University, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Computer Science, Fuzhou University, Fuzhou, Fujian, China","institution_ids":["https://openalex.org/I80947539"]},{"raw_affiliation_string":"School of College of Computer and Data Science, Fuzhou University, China","institution_ids":["https://openalex.org/I80947539"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056608045","display_name":"Zhihong Tian","orcid":"https://orcid.org/0000-0002-9409-5359"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhihong Tian","raw_affiliation_strings":["Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China","Cyberspace Institute of Advanced Technology, Guangzhou University, China"],"affiliations":[{"raw_affiliation_string":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]},{"raw_affiliation_string":"Cyberspace Institute of Advanced Technology, Guangzhou University, China","institution_ids":["https://openalex.org/I37987034"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5088474239"],"corresponding_institution_ids":["https://openalex.org/I4210140416","https://openalex.org/I4210157345"],"apc_list":null,"apc_paid":null,"fwci":6.9393,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.96638293,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"22","issue":"2","first_page":"1686","last_page":"1702"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.5756999850273132,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.5756999850273132,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.4918000102043152,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.46059998869895935,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6735037565231323},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5907344818115234}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6735037565231323},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5907344818115234}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2024.3451129","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3451129","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1573875172","https://openalex.org/W1613874182","https://openalex.org/W2009229808","https://openalex.org/W2038195874","https://openalex.org/W2082180526","https://openalex.org/W2121252355","https://openalex.org/W2125678386","https://openalex.org/W2155050040","https://openalex.org/W2319388900","https://openalex.org/W2320204756","https://openalex.org/W2340973114","https://openalex.org/W2342123229","https://openalex.org/W2441196741","https://openalex.org/W2495607404","https://openalex.org/W2777888449","https://openalex.org/W2860610442","https://openalex.org/W2889044571","https://openalex.org/W2906719522","https://openalex.org/W2910711617","https://openalex.org/W2971076825","https://openalex.org/W3094491574","https://openalex.org/W3139156009","https://openalex.org/W3157317299","https://openalex.org/W3211032843","https://openalex.org/W4205608240","https://openalex.org/W4224284455","https://openalex.org/W4225153951","https://openalex.org/W4281626163","https://openalex.org/W4282920965","https://openalex.org/W4296746025","https://openalex.org/W6600068801","https://openalex.org/W6636713437","https://openalex.org/W6692059664","https://openalex.org/W6714242012","https://openalex.org/W6803700747"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W2382290278","https://openalex.org/W4395014643"],"abstract_inverted_index":{"The":[0,125,189],"landscape":[1],"of":[2,10,55,87,107,116,130,155,162,205],"cyberattacks":[3],"has":[4,24],"transcended":[5],"from":[6,38],"mere":[7],"hobbyist":[8],"pursuits":[9],"cybercriminals":[11],"to":[12,42,81,132,141,151,158,181,194],"a":[13,27,52,146,163,177],"lucrative":[14],"business":[15],"model,":[16],"facilitating":[17],"their":[18],"sustenance.":[19],"Concurrently,":[20],"the":[21,100,117,153,182,186],"cybercrime":[22],"market":[23],"evolved":[25,37],"into":[26],"complex":[28],"ecosystem.":[29],"Empowered":[30],"by":[31,92],"this":[32,48,85,98,105],"environment,":[33],"cybercriminal":[34],"tactics":[35],"have":[36],"simple,":[39],"isolated":[40],"activities":[41],"intricate":[43],"and":[44,74,78,95,97,120,137,201],"coordinated":[45],"cyberattacks.":[46],"In":[47],"article,":[49],"we":[50,112],"reveal":[51],"new":[53],"type":[54,86,106],"cyberattack":[56],"paradigm":[57],"termed":[58],"Attack":[59],"Exploiting":[60],"Cyber-arms":[61],"Industry":[62],"(AECI),":[63],"which,":[64],"despite":[65],"its":[66,134,143,206],"potential":[67,144],"for":[68],"severe":[69],"impact,":[70,145],"requires":[71],"less":[72],"investment":[73],"entails":[75],"fewer":[76],"obstacles":[77],"risks":[79],"compared":[80],"traditional":[82],"methods.":[83],"However,":[84],"attack":[88,123,165],"is":[89,99,149,192],"still":[90],"neglected":[91],"security":[93],"researchers":[94],"communities":[96],"first":[101],"work":[102],"focusing":[103],"on":[104],"attack.":[108],"To":[109],"elucidate":[110],"AECI,":[111],"provide":[113],"an":[114,122],"overview":[115],"cyber-arms":[118],"industry":[119],"introduces":[121],"model.":[124],"model":[126,148,191],"dissects":[127],"each":[128],"phase":[129],"AECI":[131,171,200],"illuminate":[133],"operational":[135],"mechanics":[136],"strategic":[138],"imperatives.":[139],"Furthermore,":[140],"assess":[142],"mathematical":[147],"proposed":[150,190],"estimate":[152],"scale":[154],"infection":[156,207],"attributable":[157],"AECI.":[159],"Through":[160],"analysis":[161],"specific":[164],"case,":[166],"our":[167],"findings":[168],"demonstrate":[169],"that":[170],"can":[172],"generate":[173],"significant":[174],"impacts":[175],"within":[176],"brief":[178],"timeframe,":[179],"akin":[180],"magnitude":[183],"observed":[184],"with":[185],"Mirai":[187],"botnet.":[188],"demonstrated":[193],"prove":[195],"instrumental":[196],"in":[197],"effectively":[198],"analyzing":[199],"providing":[202],"accurate":[203],"estimations":[204],"scale.":[208]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2025-12-22T23:10:17.713674","created_date":"2025-10-10T00:00:00"}
