{"id":"https://openalex.org/W4402547405","doi":"https://doi.org/10.1177/00375497241268752","title":"Simulating cyberattacks with extended Petri nets","display_name":"Simulating cyberattacks with extended Petri nets","publication_year":2024,"publication_date":"2024-09-10","ids":{"openalex":"https://openalex.org/W4402547405","doi":"https://doi.org/10.1177/00375497241268752"},"language":"en","primary_location":{"id":"doi:10.1177/00375497241268752","is_oa":false,"landing_page_url":"https://doi.org/10.1177/00375497241268752","pdf_url":null,"source":{"id":"https://openalex.org/S32573412","display_name":"SIMULATION","issn_l":"0037-5497","issn":["0037-5497","1741-3133"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320017","host_organization_name":"SAGE Publishing","host_organization_lineage":["https://openalex.org/P4310320017"],"host_organization_lineage_names":["SAGE Publishing"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SIMULATION","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003894658","display_name":"Mikel D. Petty","orcid":"https://orcid.org/0000-0001-9838-2016"},"institutions":[{"id":"https://openalex.org/I82495205","display_name":"University of Alabama in Huntsville","ror":"https://ror.org/02zsxwr40","country_code":"US","type":"education","lineage":["https://openalex.org/I82495205"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mikel D Petty","raw_affiliation_strings":["Department of Computer Science, The University of Alabama in Huntsville, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, The University of Alabama in Huntsville, USA","institution_ids":["https://openalex.org/I82495205"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088836648","display_name":"John A. Bland","orcid":"https://orcid.org/0000-0002-8549-3451"},"institutions":[{"id":"https://openalex.org/I82495205","display_name":"University of Alabama in Huntsville","ror":"https://ror.org/02zsxwr40","country_code":"US","type":"education","lineage":["https://openalex.org/I82495205"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"John A Bland","raw_affiliation_strings":["Computer Engineering, The University of Alabama in Huntsville, USA"],"affiliations":[{"raw_affiliation_string":"Computer Engineering, The University of Alabama in Huntsville, USA","institution_ids":["https://openalex.org/I82495205"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035869278","display_name":"Tymaine S. Whitaker","orcid":"https://orcid.org/0000-0001-5852-6601"},"institutions":[{"id":"https://openalex.org/I82495205","display_name":"University of Alabama in Huntsville","ror":"https://ror.org/02zsxwr40","country_code":"US","type":"education","lineage":["https://openalex.org/I82495205"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tymaine S Whitaker","raw_affiliation_strings":["Department of Computer Science, The University of Alabama in Huntsville, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, The University of Alabama in Huntsville, USA","institution_ids":["https://openalex.org/I82495205"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062654312","display_name":"Walter Alan Cantrell","orcid":"https://orcid.org/0000-0003-2510-5119"},"institutions":[{"id":"https://openalex.org/I192487284","display_name":"Lipscomb University","ror":"https://ror.org/02gdc3814","country_code":"US","type":"education","lineage":["https://openalex.org/I192487284"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Walter Alan Cantrell","raw_affiliation_strings":["College of Computing and Technology, Lipscomb University, USA"],"affiliations":[{"raw_affiliation_string":"College of Computing and Technology, Lipscomb University, USA","institution_ids":["https://openalex.org/I192487284"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004866788","display_name":"Katia P. Maxwell","orcid":"https://orcid.org/0000-0003-0840-6200"},"institutions":[{"id":"https://openalex.org/I72702400","display_name":"Athens State University","ror":"https://ror.org/01zx16v02","country_code":"US","type":"education","lineage":["https://openalex.org/I72702400"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Katia P Maxwell","raw_affiliation_strings":["Computer Science, Athens State University, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science, Athens State University, USA","institution_ids":["https://openalex.org/I72702400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067628164","display_name":"C. Daniel Colvett","orcid":"https://orcid.org/0000-0003-3461-1486"},"institutions":[{"id":"https://openalex.org/I82495205","display_name":"University of Alabama in Huntsville","ror":"https://ror.org/02zsxwr40","country_code":"US","type":"education","lineage":["https://openalex.org/I82495205"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"C Daniel Colvett","raw_affiliation_strings":["Department of Industrial and Systems Engineering, The University of Alabama in Huntsville, USA"],"affiliations":[{"raw_affiliation_string":"Department of Industrial and Systems Engineering, The University of Alabama in Huntsville, USA","institution_ids":["https://openalex.org/I82495205"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030410428","display_name":"E. Michael Bearss","orcid":"https://orcid.org/0009-0008-8025-2318"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"E Michael Bearss","raw_affiliation_strings":["Trideum Corporation, USA"],"affiliations":[{"raw_affiliation_string":"Trideum Corporation, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5003894658"],"corresponding_institution_ids":["https://openalex.org/I82495205"],"apc_list":null,"apc_paid":null,"fwci":1.0297,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.79342993,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"100","issue":"12","first_page":"1257","last_page":"1280"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11195","display_name":"Simulation Techniques and Applications","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11195","display_name":"Simulation Techniques and Applications","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/petri-net","display_name":"Petri net","score":0.8036729097366333},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6337419152259827},{"id":"https://openalex.org/keywords/stochastic-petri-net","display_name":"Stochastic Petri net","score":0.5454382300376892},{"id":"https://openalex.org/keywords/petri-dish","display_name":"Petri dish","score":0.47431039810180664},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.4282035231590271},{"id":"https://openalex.org/keywords/process-architecture","display_name":"Process architecture","score":0.4162417948246002},{"id":"https://openalex.org/keywords/biology","display_name":"Biology","score":0.07351464033126831}],"concepts":[{"id":"https://openalex.org/C38677869","wikidata":"https://www.wikidata.org/wiki/Q724168","display_name":"Petri net","level":2,"score":0.8036729097366333},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6337419152259827},{"id":"https://openalex.org/C197551870","wikidata":"https://www.wikidata.org/wiki/Q7617809","display_name":"Stochastic Petri net","level":3,"score":0.5454382300376892},{"id":"https://openalex.org/C146763376","wikidata":"https://www.wikidata.org/wiki/Q81714","display_name":"Petri dish","level":2,"score":0.47431039810180664},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.4282035231590271},{"id":"https://openalex.org/C136155141","wikidata":"https://www.wikidata.org/wiki/Q7247260","display_name":"Process architecture","level":3,"score":0.4162417948246002},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.07351464033126831},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1177/00375497241268752","is_oa":false,"landing_page_url":"https://doi.org/10.1177/00375497241268752","pdf_url":null,"source":{"id":"https://openalex.org/S32573412","display_name":"SIMULATION","issn_l":"0037-5497","issn":["0037-5497","1741-3133"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320017","host_organization_name":"SAGE Publishing","host_organization_lineage":["https://openalex.org/P4310320017"],"host_organization_lineage_names":["SAGE Publishing"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SIMULATION","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W1502189906","https://openalex.org/W1561267729","https://openalex.org/W1849377404","https://openalex.org/W1990190960","https://openalex.org/W1996109622","https://openalex.org/W2061068374","https://openalex.org/W2068031356","https://openalex.org/W2089591250","https://openalex.org/W2121863487","https://openalex.org/W2158698691","https://openalex.org/W2163051406","https://openalex.org/W2243346683","https://openalex.org/W2403044140","https://openalex.org/W2474253221","https://openalex.org/W2503470518","https://openalex.org/W2557449628","https://openalex.org/W2559404560","https://openalex.org/W2581103495","https://openalex.org/W2736601468","https://openalex.org/W2766607585","https://openalex.org/W2771752929","https://openalex.org/W2772085561","https://openalex.org/W2774222527","https://openalex.org/W2810144504","https://openalex.org/W2913361692","https://openalex.org/W2919184664","https://openalex.org/W2975136527","https://openalex.org/W3004686484","https://openalex.org/W3193349927","https://openalex.org/W4231043727","https://openalex.org/W4249362488","https://openalex.org/W4250473655","https://openalex.org/W4251338657","https://openalex.org/W4300633564","https://openalex.org/W4362650413","https://openalex.org/W4389108024","https://openalex.org/W4392562160"],"related_works":["https://openalex.org/W1543378523","https://openalex.org/W2257573499","https://openalex.org/W2381491984","https://openalex.org/W2064254377","https://openalex.org/W2148229336","https://openalex.org/W2901841247","https://openalex.org/W2001922003","https://openalex.org/W117466158","https://openalex.org/W4244333532","https://openalex.org/W2159539963"],"abstract_inverted_index":{"Cybersecurity":[0,5],"is":[1,7,63,103],"an":[2,8],"urgent":[3],"concern.":[4],"simulation":[6,27,168],"important":[9],"part":[10],"of":[11,23,45,59,121,145],"the":[12,46,98,105,126,155],"response":[13],"to":[14,66,111,164,172],"it.":[15],"This":[16],"article":[17],"describes":[18],"a":[19,136],"research":[20,28],"program":[21],"consisting":[22],"several":[24],"interconnected":[25],"cybersecurity":[26],"projects.":[29],"Cyberattacks":[30],"are":[31,78,109,138,162,170],"modeled":[32],"using":[33,82],"Petri":[34,89],"nets":[35],"extended":[36],"with":[37,151],"features":[38],"designed":[39],"for":[40,72],"modeling":[41],"cyberattacks,":[42],"including":[43],"representations":[44,120],"attacker\u2019s":[47],"and":[48,53,80,93,115,140,157],"defender\u2019s":[49],"strategies,":[50],"their":[51,54],"actions,":[52],"actions\u2019":[55],"cost.":[56],"A":[57],"database":[58,102],"known":[60],"attack":[61,74,100],"patterns":[62],"automatically":[64,178],"processed":[65],"generate":[67],"cyberattack":[68,106,160],"component":[69,107,132],"models,":[70],"one":[71],"each":[73,152],"pattern.":[75],"The":[76,159],"models":[77,108,133,144,161],"verified":[79],"validated":[81],"multiple":[83],"application-relevant":[84],"methods":[85],"that":[86,177],"consider":[87],"both":[88],"nets\u2019":[90],"theoretical":[91],"properties":[92],"cyberattacks\u2019":[94],"practical":[95],"characteristics.":[96],"Because":[97],"source":[99],"pattern":[101],"attacker-centric,":[104],"enhanced":[110],"include":[112],"defender":[113,183],"actions":[114],"responses,":[116],"as":[117,119],"well":[118],"normal":[122],"user":[123],"activities":[124],"on":[125],"computer":[127,147],"system":[128],"being":[129],"attacked.":[130],"Cyberattack":[131],"stored":[134],"in":[135],"repository":[137],"selected":[139],"composed":[141],"into":[142],"complete":[143],"target":[146],"systems.":[148],"Metadata":[149],"associated":[150],"model":[153],"guides":[154],"selection":[156],"composition.":[158],"executed":[163],"simulate":[165],"cyberattacks.":[166],"Multiple":[167],"iterations":[169],"used":[171],"train":[173],"reinforcement":[174],"learning":[175],"algorithms":[176],"learn":[179],"improved":[180],"attacker":[181],"or":[182],"strategies.":[184]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
