{"id":"https://openalex.org/W3162993906","doi":"https://doi.org/10.1145/3409334.3452070","title":"A bottom-up approach to creating a cyberattack model with fine grain components","display_name":"A bottom-up approach to creating a cyberattack model with fine grain components","publication_year":2021,"publication_date":"2021-04-15","ids":{"openalex":"https://openalex.org/W3162993906","doi":"https://doi.org/10.1145/3409334.3452070","mag":"3162993906"},"language":"en","primary_location":{"id":"doi:10.1145/3409334.3452070","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3409334.3452070","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 ACM Southeast Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004866788","display_name":"Katia P. Maxwell","orcid":"https://orcid.org/0000-0003-0840-6200"},"institutions":[{"id":"https://openalex.org/I72702400","display_name":"Athens State University","ror":"https://ror.org/01zx16v02","country_code":"US","type":"education","lineage":["https://openalex.org/I72702400"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Katia P. Maxwell","raw_affiliation_strings":["Athens State University"],"affiliations":[{"raw_affiliation_string":"Athens State University","institution_ids":["https://openalex.org/I72702400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003894658","display_name":"Mikel D. Petty","orcid":"https://orcid.org/0000-0001-9838-2016"},"institutions":[{"id":"https://openalex.org/I82495205","display_name":"University of Alabama in Huntsville","ror":"https://ror.org/02zsxwr40","country_code":"US","type":"education","lineage":["https://openalex.org/I82495205"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mikel D. Petty","raw_affiliation_strings":["The University of Alabama in Huntsville"],"affiliations":[{"raw_affiliation_string":"The University of Alabama in Huntsville","institution_ids":["https://openalex.org/I82495205"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067628164","display_name":"C. Daniel Colvett","orcid":"https://orcid.org/0000-0003-3461-1486"},"institutions":[{"id":"https://openalex.org/I82495205","display_name":"University of Alabama in Huntsville","ror":"https://ror.org/02zsxwr40","country_code":"US","type":"education","lineage":["https://openalex.org/I82495205"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"C. Daniel Colvett","raw_affiliation_strings":["The University of Alabama in Huntsville"],"affiliations":[{"raw_affiliation_string":"The University of Alabama in Huntsville","institution_ids":["https://openalex.org/I82495205"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062654312","display_name":"Walter Alan Cantrell","orcid":"https://orcid.org/0000-0003-2510-5119"},"institutions":[{"id":"https://openalex.org/I192487284","display_name":"Lipscomb University","ror":"https://ror.org/02gdc3814","country_code":"US","type":"education","lineage":["https://openalex.org/I192487284"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Walter A. Cantrell","raw_affiliation_strings":["Lipscomb University"],"affiliations":[{"raw_affiliation_string":"Lipscomb University","institution_ids":["https://openalex.org/I192487284"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5004866788"],"corresponding_institution_ids":["https://openalex.org/I72702400"],"apc_list":null,"apc_paid":null,"fwci":0.4439,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.66224953,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"25","last_page":"32"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11125","display_name":"Petri Nets in System Modeling","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11125","display_name":"Petri Nets in System Modeling","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/petri-net","display_name":"Petri net","score":0.8809449672698975},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7392104864120483},{"id":"https://openalex.org/keywords/top-down-and-bottom-up-design","display_name":"Top-down and bottom-up design","score":0.5751632452011108},{"id":"https://openalex.org/keywords/process-architecture","display_name":"Process architecture","score":0.511487603187561},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.46665382385253906},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4422123432159424},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40029895305633545},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.28316521644592285},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.14769801497459412}],"concepts":[{"id":"https://openalex.org/C38677869","wikidata":"https://www.wikidata.org/wiki/Q724168","display_name":"Petri net","level":2,"score":0.8809449672698975},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7392104864120483},{"id":"https://openalex.org/C135798126","wikidata":"https://www.wikidata.org/wiki/Q2167279","display_name":"Top-down and bottom-up design","level":2,"score":0.5751632452011108},{"id":"https://openalex.org/C136155141","wikidata":"https://www.wikidata.org/wiki/Q7247260","display_name":"Process architecture","level":3,"score":0.511487603187561},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.46665382385253906},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4422123432159424},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40029895305633545},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.28316521644592285},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.14769801497459412}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3409334.3452070","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3409334.3452070","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 ACM Southeast Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/11","score":0.7099999785423279,"display_name":"Sustainable cities and communities"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W177597988","https://openalex.org/W1996109622","https://openalex.org/W2058604884","https://openalex.org/W2071214164","https://openalex.org/W2152988203","https://openalex.org/W2163352153","https://openalex.org/W2295472606","https://openalex.org/W2912440147"],"related_works":["https://openalex.org/W1938017683","https://openalex.org/W2158814988","https://openalex.org/W1543378523","https://openalex.org/W2355954834","https://openalex.org/W2285444239","https://openalex.org/W2257573499","https://openalex.org/W2901841247","https://openalex.org/W2091260341","https://openalex.org/W597347111","https://openalex.org/W2064254377"],"abstract_inverted_index":{"In":[0],"today's":[1],"world":[2],"every":[3],"system":[4],"developer":[5],"and":[6,13,27,50,55,69,104],"administrator":[7],"should":[8],"be":[9,86],"familiar":[10],"with":[11,66],"cyberattacks":[12,29,78],"possible":[14],"threats":[15],"to":[16,25,75,92,108],"their":[17],"organizations":[18],"systems.":[19,81],"Petri":[20,42,64],"Nets":[21,43,65],"have":[22,44],"been":[23,45,72],"used":[24,46],"model":[26,76],"simulate":[28],"allowing":[30],"for":[31],"additional":[32],"knowledge":[33],"on":[34,79],"the":[35,48,99],"planning":[36],"stages":[37],"of":[38,57,101],"defending":[39],"a":[40,105,110],"system.":[41],"since":[47],"1960's":[49],"there":[51],"exists":[52],"several":[53],"extensions":[54],"variations":[56],"how":[58],"they":[59],"are":[60],"designed,":[61],"in":[62],"particular":[63],"Players,":[67],"Strategies":[68],"Cost":[70],"has":[71],"recently":[73],"proposed":[74],"individual":[77],"target":[80],"These":[82],"models":[83],"can":[84],"also":[85],"broken":[87],"down":[88],"into":[89],"smaller":[90],"components":[91,103],"build":[93],"different":[94],"models.":[95],"This":[96],"study":[97],"introduces":[98],"concept":[100],"fine-grain":[102],"bottom-up":[106],"approach":[107],"create":[109],"cyberattack":[111],"model.":[112]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
