{"id":"https://openalex.org/W3178709430","doi":"https://doi.org/10.23919/cycon51939.2021.9467801","title":"Towards an AI-powered Player in Cyber Defence Exercises","display_name":"Towards an AI-powered Player in Cyber Defence Exercises","publication_year":2021,"publication_date":"2021-05-25","ids":{"openalex":"https://openalex.org/W3178709430","doi":"https://doi.org/10.23919/cycon51939.2021.9467801","mag":"3178709430"},"language":"en","primary_location":{"id":"doi:10.23919/cycon51939.2021.9467801","is_oa":false,"landing_page_url":"https://doi.org/10.23919/cycon51939.2021.9467801","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 13th International Conference on Cyber Conflict (CyCon)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003682993","display_name":"Roland Meier","orcid":"https://orcid.org/0000-0002-8268-9037"},"institutions":[{"id":"https://openalex.org/I35440088","display_name":"ETH Zurich","ror":"https://ror.org/05a28rw58","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]}],"countries":["CH"],"is_corresponding":true,"raw_author_name":"Roland Meier","raw_affiliation_strings":["ETH Z\u00fcrich, Z\u00fcrich, Switzerland"],"affiliations":[{"raw_affiliation_string":"ETH Z\u00fcrich, Z\u00fcrich, Switzerland","institution_ids":["https://openalex.org/I35440088"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089091345","display_name":"Art\u016brs Lavrenovs","orcid":"https://orcid.org/0000-0001-9961-2637"},"institutions":[{"id":"https://openalex.org/I2802296436","display_name":"NATO Cooperative Cyber Defence Centre of Excellence","ror":"https://ror.org/050reks70","country_code":"EE","type":"facility","lineage":["https://openalex.org/I2802296436","https://openalex.org/I4210162703"]}],"countries":["EE"],"is_corresponding":false,"raw_author_name":"Arturs Lavrenovs","raw_affiliation_strings":["NATO CCDCOE, Tallinn, Estonia"],"affiliations":[{"raw_affiliation_string":"NATO CCDCOE, Tallinn, Estonia","institution_ids":["https://openalex.org/I2802296436"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024498362","display_name":"Kimmo Heinaaro","orcid":null},"institutions":[{"id":"https://openalex.org/I2802296436","display_name":"NATO Cooperative Cyber Defence Centre of Excellence","ror":"https://ror.org/050reks70","country_code":"EE","type":"facility","lineage":["https://openalex.org/I2802296436","https://openalex.org/I4210162703"]}],"countries":["EE"],"is_corresponding":false,"raw_author_name":"Kimmo Heinaaro","raw_affiliation_strings":["NATO CCDCOE, Tallinn, Estonia"],"affiliations":[{"raw_affiliation_string":"NATO CCDCOE, Tallinn, Estonia","institution_ids":["https://openalex.org/I2802296436"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031490259","display_name":"Luca Gambazzi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Luca Gambazzi","raw_affiliation_strings":["Science and Technology armasuisse, Thun, Switzerland"],"affiliations":[{"raw_affiliation_string":"Science and Technology armasuisse, Thun, Switzerland","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048330561","display_name":"Vincent Lenders","orcid":"https://orcid.org/0000-0002-2289-3722"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Vincent Lenders","raw_affiliation_strings":["Science and Technology armasuisse, Thun, Switzerland"],"affiliations":[{"raw_affiliation_string":"Science and Technology armasuisse, Thun, Switzerland","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5003682993"],"corresponding_institution_ids":["https://openalex.org/I35440088"],"apc_list":null,"apc_paid":null,"fwci":1.2225,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.80142626,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"309","last_page":"326"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7131915092468262},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.6658284664154053},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6329938173294067},{"id":"https://openalex.org/keywords/forcing","display_name":"Forcing (mathematics)","score":0.5999617576599121},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.5900998115539551},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.5500923991203308},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.4967718720436096},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.4443700313568115},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.43692657351493835},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.4224429726600647},{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.41112658381462097},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.10119929909706116}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7131915092468262},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.6658284664154053},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6329938173294067},{"id":"https://openalex.org/C197115733","wikidata":"https://www.wikidata.org/wiki/Q1003136","display_name":"Forcing (mathematics)","level":2,"score":0.5999617576599121},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.5900998115539551},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.5500923991203308},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.4967718720436096},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.4443700313568115},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.43692657351493835},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.4224429726600647},{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.41112658381462097},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.10119929909706116},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C49204034","wikidata":"https://www.wikidata.org/wiki/Q52139","display_name":"Climatology","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/cycon51939.2021.9467801","is_oa":false,"landing_page_url":"https://doi.org/10.23919/cycon51939.2021.9467801","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 13th International Conference on Cyber Conflict (CyCon)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6299999952316284,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W42722137","https://openalex.org/W305533213","https://openalex.org/W1961102902","https://openalex.org/W2095852873","https://openalex.org/W2137789775","https://openalex.org/W2142889610","https://openalex.org/W2278186031","https://openalex.org/W2281963941","https://openalex.org/W2342408547","https://openalex.org/W2509966261","https://openalex.org/W2786947513","https://openalex.org/W2791319131","https://openalex.org/W2902907165","https://openalex.org/W2904112547","https://openalex.org/W2905542721","https://openalex.org/W2947054660","https://openalex.org/W2961835015","https://openalex.org/W2969402780","https://openalex.org/W2970404429","https://openalex.org/W3003372411","https://openalex.org/W3004908285","https://openalex.org/W3032981517","https://openalex.org/W3045229347","https://openalex.org/W3098637454","https://openalex.org/W4252295490","https://openalex.org/W6674300885"],"related_works":["https://openalex.org/W2358245908","https://openalex.org/W2803684864","https://openalex.org/W2762996619","https://openalex.org/W2974890647","https://openalex.org/W4321484089","https://openalex.org/W4401664841","https://openalex.org/W4242728933","https://openalex.org/W2493430149","https://openalex.org/W4366290225","https://openalex.org/W3191735619"],"abstract_inverted_index":{"Cyber":[0],"attacks":[1,55],"are":[2],"becoming":[3],"increasingly":[4],"frequent,":[5],"sophisticated,":[6],"and":[7,33,53,109],"stealthy.":[8],"This":[9],"makes":[10],"it":[11],"harder":[12],"for":[13,95],"cyber":[14,41,76,103,125,143],"defence":[15,25,42,77,144],"teams":[16,82],"to":[17,22,29,51,84,121],"keep":[18],"up,":[19],"forcing":[20],"them":[21],"automate":[23],"their":[24,31,86,96],"capabilities":[26],"in":[27,119],"order":[28,120],"improve":[30],"reactivity":[32],"efficiency.":[34],"Therefore,":[35],"we":[36],"propose":[37],"a":[38,57,66,140],"fully":[39,141],"automated":[40,117,142],"framework":[43,63,99,134],"that":[44,146],"no":[45],"longer":[46],"needs":[47],"support":[48],"from":[49,152],"humans":[50],"detect":[52],"mitigate":[54],"within":[56],"complex":[58,150],"infrastructure.":[59],"We":[60],"design":[61],"our":[62,131,133],"based":[64],"on":[65],"real-world":[67],"case":[68],"-":[69,72],"Locked":[70],"Shields":[71],"the":[73,124,128,136],"world's":[74],"largest":[75],"exercise.":[78],"In":[79],"this":[80],"exercise,":[81],"have":[83],"defend":[85],"networked":[87],"infrastructure":[88],"against":[89],"attacks,":[90],"while":[91],"maintaining":[92],"operational":[93],"services":[94],"users.":[97],"Our":[98],"architecture":[100],"connects":[101],"various":[102],"sensors":[104],"with":[105],"network,":[106],"device,":[107],"application,":[108],"user":[110],"actuators":[111],"through":[112],"an":[113],"artificial":[114],"intelligence":[115],"(AI)-powered":[116],"team":[118,145],"dynamically":[122],"secure":[123],"environment.":[126],"To":[127],"best":[129],"of":[130],"knowledge,":[132],"is":[135],"first":[137],"attempt":[138],"towards":[139],"aims":[147],"at":[148],"protecting":[149],"environments":[151],"sophisticated":[153],"attacks.":[154]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":4},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
