{"id":"https://openalex.org/W4402363397","doi":"https://doi.org/10.1287/deca.2023.0072","title":"Measuring and Mitigating the Risk of Advanced Cyberattackers","display_name":"Measuring and Mitigating the Risk of Advanced Cyberattackers","publication_year":2024,"publication_date":"2024-09-09","ids":{"openalex":"https://openalex.org/W4402363397","doi":"https://doi.org/10.1287/deca.2023.0072"},"language":"en","primary_location":{"id":"doi:10.1287/deca.2023.0072","is_oa":false,"landing_page_url":"https://doi.org/10.1287/deca.2023.0072","pdf_url":null,"source":{"id":"https://openalex.org/S33235364","display_name":"Decision Analysis","issn_l":"1545-8490","issn":["1545-8490","1545-8504"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310315699","host_organization_name":"Institute for Operations Research and the Management Sciences","host_organization_lineage":["https://openalex.org/P4310315699"],"host_organization_lineage_names":["Institute for Operations Research and the Management Sciences"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Decision Analysis","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052206754","display_name":"Amitai Gilad","orcid":"https://orcid.org/0000-0002-5956-6952"},"institutions":[{"id":"https://openalex.org/I16391192","display_name":"Tel Aviv University","ror":"https://ror.org/04mhzgx49","country_code":"IL","type":"education","lineage":["https://openalex.org/I16391192"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"Amitai Gilad","raw_affiliation_strings":["Coller School of Management, Tel Aviv University, Tel Aviv 6997801, Israel"],"raw_orcid":"https://orcid.org/0000-0002-5956-6952","affiliations":[{"raw_affiliation_string":"Coller School of Management, Tel Aviv University, Tel Aviv 6997801, Israel","institution_ids":["https://openalex.org/I16391192"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017019057","display_name":"Asher Tishler","orcid":null},"institutions":[{"id":"https://openalex.org/I16391192","display_name":"Tel Aviv University","ror":"https://ror.org/04mhzgx49","country_code":"IL","type":"education","lineage":["https://openalex.org/I16391192"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Asher Tishler","raw_affiliation_strings":["Coller School of Management, Tel Aviv University, Tel Aviv 6997801, Israel"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Coller School of Management, Tel Aviv University, Tel Aviv 6997801, Israel","institution_ids":["https://openalex.org/I16391192"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5052206754"],"corresponding_institution_ids":["https://openalex.org/I16391192"],"apc_list":null,"apc_paid":null,"fwci":1.4255,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.86359111,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"21","issue":"4","first_page":"215","last_page":"234"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10994","display_name":"Terrorism, Counterterrorism, and Political Violence","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.47768884897232056},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4094841480255127},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.34969472885131836},{"id":"https://openalex.org/keywords/management-science","display_name":"Management science","score":0.3467696011066437},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3036462962627411}],"concepts":[{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.47768884897232056},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4094841480255127},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.34969472885131836},{"id":"https://openalex.org/C539667460","wikidata":"https://www.wikidata.org/wiki/Q2414942","display_name":"Management science","level":1,"score":0.3467696011066437},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3036462962627411}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1287/deca.2023.0072","is_oa":false,"landing_page_url":"https://doi.org/10.1287/deca.2023.0072","pdf_url":null,"source":{"id":"https://openalex.org/S33235364","display_name":"Decision Analysis","issn_l":"1545-8490","issn":["1545-8490","1545-8504"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310315699","host_organization_name":"Institute for Operations Research and the Management Sciences","host_organization_lineage":["https://openalex.org/P4310315699"],"host_organization_lineage_names":["Institute for Operations Research and the Management Sciences"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Decision Analysis","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:inm:ordeca:v:21:y:2024:i:4:p:215-234","is_oa":false,"landing_page_url":"http://doi.org/10.1287/deca.2023.0072","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W315231380","https://openalex.org/W1526250527","https://openalex.org/W1531062873","https://openalex.org/W1925725102","https://openalex.org/W1972914161","https://openalex.org/W2000050888","https://openalex.org/W2041583140","https://openalex.org/W2056075452","https://openalex.org/W2059209509","https://openalex.org/W2062863452","https://openalex.org/W2063544705","https://openalex.org/W2089041911","https://openalex.org/W2090487162","https://openalex.org/W2105935934","https://openalex.org/W2106112138","https://openalex.org/W2106307116","https://openalex.org/W2131951904","https://openalex.org/W2141492178","https://openalex.org/W2143174928","https://openalex.org/W2156607688","https://openalex.org/W2157884494","https://openalex.org/W2404932809","https://openalex.org/W2595223733","https://openalex.org/W2605381169","https://openalex.org/W2622610444","https://openalex.org/W2731529204","https://openalex.org/W2751179444","https://openalex.org/W2774222527","https://openalex.org/W2785674860","https://openalex.org/W2910791480","https://openalex.org/W2920950522","https://openalex.org/W2966828561","https://openalex.org/W3007410458","https://openalex.org/W3014589148","https://openalex.org/W3034847244","https://openalex.org/W3043110762","https://openalex.org/W3046626997","https://openalex.org/W3094866229","https://openalex.org/W3109815903","https://openalex.org/W3132967942","https://openalex.org/W4213060883","https://openalex.org/W4316467454","https://openalex.org/W4385563080"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W4391375266","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W2382290278","https://openalex.org/W4395014643"],"abstract_inverted_index":{"Sophisticated":[0],"cyberattackers":[1],"(commonly":[2],"known":[3],"as":[4,15,137,167],"advanced":[5],"persistent":[6],"threats":[7],"(APTs))":[8],"pose":[9],"enormous":[10],"risks":[11],"to":[12,35,41,50,80,98,188,225],"organizations":[13,40,175],"such":[14],"financial":[16,153],"institutions,":[17,23],"industrial":[18],"and":[19,24,32,44,76,88,95,117,121,130,135,165,232],"commercial":[20],"firms,":[21],"government":[22],"power":[25],"grids.":[26],"This":[27],"study":[28],"presents":[29],"a":[30,47,63,71,82,89,138],"method":[31],"an":[33,162],"index":[34,59,184,199],"measure":[36],"the":[37,67,86,103,114,118,158,174,191,195,247,255],"vulnerability":[38,58,109,183],"of":[39,70,152,169,173,197,219],"APT":[42,52],"risk":[43,53,128],"shows":[45,206],"why":[46],"one-size-fits-all":[48],"solution":[49],"mitigate":[51],"does":[54],"not":[55,208],"exist.":[56],"Our":[57],"is":[60,211,222,251,272],"based":[61],"on":[62],"model":[64],"that":[65,84,92,149,160,176,179,207],"describes":[66],"optimal":[68,131],"behavior":[69],"cyberattacker":[72],"(APT)":[73],"with":[74],"research":[75],"development":[77],"capabilities":[78],"aspiring":[79],"attack":[81],"network":[83,90],"manages":[85],"organization":[87,101],"operator":[91],"deploys":[93],"blocking":[94,233],"detection":[96,231,260],"measures":[97,234],"protect":[99],"its":[100],"from":[102],"attack.":[104],"We":[105,146],"demonstrate":[106],"how":[107],"our":[108,180,198],"index,":[110],"which":[111],"accounts":[112],"for":[113,140,227],"network\u2019s":[115],"structure":[116],"APTs\u2019":[119,144,228],"resources":[120],"strategy,":[122],"can":[123,235],"be":[124,186,236],"used":[125],"in":[126,200],"realistic":[127],"assessments":[129,172],"resource":[132],"allocation":[133],"procedures":[134,205],"serve":[136],"benchmark":[139],"organizations\u2019":[141],"preparedness":[142],"against":[143,216],"cyberattacks.":[145],"also":[147,223],"propose":[148],"regulatory":[150],"agencies":[151],"(and":[154],"other)":[155],"institutions":[156],"provide":[157],"parameters":[159],"define":[161],"APT\u2019s":[163],"profile":[164],"request,":[166],"part":[168],"their":[170],"periodic":[171],"they":[177],"regulate,":[178],"(or":[181],"similar)":[182],"will":[185],"reported":[187],"them":[189],"by":[190],"regulated":[192],"institutions.":[193],"Finally,":[194],"viability":[196],"modeling":[201],"modern":[202],"cybersecurity":[203],"defense":[204,215],"only":[209,259],"there":[210],"no":[212],"silver":[213],"bullet":[214],"all":[217],"types":[218],"APTs,":[220],"it":[221],"imperative":[224],"account":[226],"heterogeneity":[229],"because":[230],"complements,":[237],"substitutes,":[238],"or":[239],"even":[240],"degrade":[241],"each":[242],"other.":[243],"For":[244],"example,":[245],"when":[246],"attacker\u2019s":[248],"(defender\u2019s)":[249],"budget":[250],"extremely":[252],"large":[253],"(small),":[254],"defender":[256],"should":[257],"deploy":[258],"measures,":[261],"strongly":[262],"advocating":[263],"Zero":[264],"Trust":[265],"practices.":[266],"Supplemental":[267],"Material:":[268],"The":[269],"online":[270],"appendix":[271],"available":[273],"at":[274],"https://doi.org/10.1287/deca.2023.0072":[275],".":[276]},"counts_by_year":[{"year":2026,"cited_by_count":2}],"updated_date":"2026-05-21T09:19:25.381259","created_date":"2025-10-10T00:00:00"}
