{"id":"https://openalex.org/W4403982262","doi":"https://doi.org/10.1515/comp-2024-0016","title":"Comparing the influence of cybersecurity knowledge on attack detection: insights from experts and novice cybersecurity professionals","display_name":"Comparing the influence of cybersecurity knowledge on attack detection: insights from experts and novice cybersecurity professionals","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4403982262","doi":"https://doi.org/10.1515/comp-2024-0016"},"language":"en","primary_location":{"id":"doi:10.1515/comp-2024-0016","is_oa":true,"landing_page_url":"https://doi.org/10.1515/comp-2024-0016","pdf_url":"https://www.degruyterbrill.com/document/doi/10.1515/comp-2024-0016/pdf","source":{"id":"https://openalex.org/S4210177004","display_name":"Open Computer Science","issn_l":"2299-1093","issn":["2299-1093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Open Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.degruyterbrill.com/document/doi/10.1515/comp-2024-0016/pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078253426","display_name":"Mozamel M. Saeed","orcid":"https://orcid.org/0000-0002-5598-0734"},"institutions":[{"id":"https://openalex.org/I142608572","display_name":"Prince Sattam Bin Abdulaziz University","ror":"https://ror.org/04jt46d36","country_code":"SA","type":"education","lineage":["https://openalex.org/I142608572"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Mozamel M. Saeed","raw_affiliation_strings":["Department of Computer Science, Prince Sattam bin Abdulaziz University , Al Kharj , Saudi Arabia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Prince Sattam bin Abdulaziz University , Al Kharj , Saudi Arabia","institution_ids":["https://openalex.org/I142608572"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5078253426"],"corresponding_institution_ids":["https://openalex.org/I142608572"],"apc_list":{"value":1000,"currency":"EUR","value_usd":1078},"apc_paid":{"value":1000,"currency":"EUR","value_usd":1078},"fwci":0.7334,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.7957267,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"14","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7630294561386108},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.44335469603538513}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7630294561386108},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.44335469603538513}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1515/comp-2024-0016","is_oa":true,"landing_page_url":"https://doi.org/10.1515/comp-2024-0016","pdf_url":"https://www.degruyterbrill.com/document/doi/10.1515/comp-2024-0016/pdf","source":{"id":"https://openalex.org/S4210177004","display_name":"Open Computer Science","issn_l":"2299-1093","issn":["2299-1093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Open Computer Science","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:5b0df581d59a408eac4a610611e52148","is_oa":false,"landing_page_url":"https://doaj.org/article/5b0df581d59a408eac4a610611e52148","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Open Computer Science, Vol 14, Iss 1, Pp pp. 710-719 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1515/comp-2024-0016","is_oa":true,"landing_page_url":"https://doi.org/10.1515/comp-2024-0016","pdf_url":"https://www.degruyterbrill.com/document/doi/10.1515/comp-2024-0016/pdf","source":{"id":"https://openalex.org/S4210177004","display_name":"Open Computer Science","issn_l":"2299-1093","issn":["2299-1093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Open Computer Science","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.7099999785423279,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G219817464","display_name":null,"funder_award_id":"PSAU/2024/R/1445","funder_id":"https://openalex.org/F4320311227","funder_display_name":"Prince Sattam bin Abdulaziz University"}],"funders":[{"id":"https://openalex.org/F4320311227","display_name":"Prince Sattam bin Abdulaziz University","ror":"https://ror.org/04jt46d36"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4403982262.pdf"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W1944720853","https://openalex.org/W1968909445","https://openalex.org/W2105413315","https://openalex.org/W2121513440","https://openalex.org/W2136136174","https://openalex.org/W2168620475","https://openalex.org/W2755027283","https://openalex.org/W2781662152","https://openalex.org/W2887975821","https://openalex.org/W3006556904","https://openalex.org/W3131541364","https://openalex.org/W3146612261","https://openalex.org/W3152052375","https://openalex.org/W3158946937","https://openalex.org/W3159994884","https://openalex.org/W3200780444","https://openalex.org/W3202078809","https://openalex.org/W3208426274","https://openalex.org/W4224027214","https://openalex.org/W4283655642","https://openalex.org/W4296654684","https://openalex.org/W4304189780","https://openalex.org/W4309327252","https://openalex.org/W4319457863","https://openalex.org/W4361732072","https://openalex.org/W4386896216","https://openalex.org/W4388440664","https://openalex.org/W4390311802","https://openalex.org/W4390494344","https://openalex.org/W4390542272","https://openalex.org/W4390636382","https://openalex.org/W4390726564","https://openalex.org/W4390740554"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Abstract":[0],"This":[1],"article":[2],"investigates":[3],"the":[4,10,84,153,159,170,190,224,240,253],"effect":[5],"of":[6,155,161,172,182,193,206,230,242,255,265,273],"cybersecurity":[7,187,220,256],"knowledge":[8,188,257],"on":[9,219],"ability":[11],"to":[12,27,148,176,226],"detect":[13],"malicious":[14,157,178,194,274],"events":[15,166,195,200,244,275],"in":[16,107,258,267],"a":[17,21,50,127,141,207],"network.":[18],"We":[19],"developed":[20],"simplified":[22],"intrusion":[23,40],"detection":[24,33,45,131,150,192,215,287],"system":[25],"(IDS)":[26],"simulate":[28],"real-world":[29],"scenarios":[30,91,124,137],"and":[31,46,80,96,125,138,169,196,238,260,270],"assess":[32,234],"capabilities.":[34,288],"The":[35,117,144,180,263],"IDS":[36],"features":[37],"typical":[38],"network":[39,209,236,268],"characteristics,":[41],"such":[42],"as":[43,167,201],"signature-based":[44],"anomaly":[47],"detection,":[48],"providing":[49],"realistic":[51],"environment":[52],"for":[53,212,284],"participants.":[54],"A":[55,203],"cross-sectional":[56],"study":[57,118,184,251],"was":[58],"conducted":[59],"by":[60],"recruiting":[61],"75":[62],"respondents":[63],"who":[64],"were":[65,103,111],"from":[66,114],"Al":[67],"Neelain":[68],"University,":[69],"with":[70,245],"novices":[71,105,121],"observing":[72,122],"ten":[73,123],"distinct":[74],"cyber-attack":[75],"scenarios,":[76],"including":[77],"phishing,":[78],"malware,":[79],"denial-of-service":[81],"attacks.":[82],"At":[83],"same":[85],"time,":[86],"experts":[87,134,266],"examined":[88],"three":[89,136],"complex":[90],"involving":[92],"advanced":[93],"persistent":[94],"threats":[95],"zero-day":[97],"exploits.":[98],"Among":[99],"these":[100],"participants,":[101],"35":[102],"considered":[104],"(students)":[106],"cybersecurity,":[108],"while":[109,133],"40":[110],"security":[112],"professionals":[113],"technical":[115],"communities.":[116],"procedure":[119],"involved":[120],"completing":[126],"questionnaire":[128],"assessing":[129],"their":[130,277],"accuracy,":[132],"observed":[135],"filled":[139],"out":[140],"similar":[142],"questionnaire.":[143],"specific":[145],"measures":[146],"used":[147],"determine":[149,239],"capabilities":[151],"included":[152],"accuracy":[154],"identifying":[156],"events,":[158],"rate":[160,171],"false":[162,173],"positives":[163],"(mislabelling":[164],"benign":[165,199],"malicious),":[168],"negatives":[174],"(failing":[175],"identify":[177],"events).":[179],"findings":[181,280],"this":[183,250],"demonstrate":[185],"that":[186],"facilitates":[189],"accurate":[191],"reduces":[197],"mislabelling":[198],"malicious.":[202],"deep":[204],"understanding":[205],"particular":[208],"is":[210],"necessary":[211],"making":[213],"precise":[214,271],"decisions,":[216],"which":[217],"rely":[218],"knowledge.":[221],"Experts":[222],"exhibit":[223],"capability":[225],"differentiate":[227],"different":[228],"types":[229],"cyber-attacks.":[231,262],"They":[232],"accurately":[233],"various":[235],"settings":[237],"maliciousness":[241],"networking":[243],"greater":[246],"precision.":[247],"In":[248],"conclusion,":[249],"highlights":[252],"importance":[254],"detecting":[259],"differentiating":[261],"expertise":[264],"analysis":[269],"determination":[272],"emphasizes":[276],"significance.":[278],"These":[279],"have":[281],"practical":[282],"implications":[283],"enhancing":[285],"attack":[286]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
