{"id":"https://openalex.org/W4380789502","doi":"https://doi.org/10.3389/fdata.2023.988007","title":"Does subnetting and port hardening influence human adversarial decisions? An investigation via a HackIT tool","display_name":"Does subnetting and port hardening influence human adversarial decisions? An investigation via a HackIT tool","publication_year":2023,"publication_date":"2023-06-15","ids":{"openalex":"https://openalex.org/W4380789502","doi":"https://doi.org/10.3389/fdata.2023.988007","pmid":"https://pubmed.ncbi.nlm.nih.gov/37397621"},"language":"en","primary_location":{"id":"doi:10.3389/fdata.2023.988007","is_oa":true,"landing_page_url":"https://doi.org/10.3389/fdata.2023.988007","pdf_url":"https://www.frontiersin.org/articles/10.3389/fdata.2023.988007/pdf","source":{"id":"https://openalex.org/S4210201220","display_name":"Frontiers in Big Data","issn_l":"2624-909X","issn":["2624-909X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320527","host_organization_name":"Frontiers Media","host_organization_lineage":["https://openalex.org/P4310320527"],"host_organization_lineage_names":["Frontiers Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Big Data","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj","pubmed"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.frontiersin.org/articles/10.3389/fdata.2023.988007/pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061719459","display_name":"Shashank Uttrani","orcid":"https://orcid.org/0000-0003-2601-2125"},"institutions":[{"id":"https://openalex.org/I9579091","display_name":"Indian Institute of Technology Mandi","ror":"https://ror.org/05r9r2f34","country_code":"IN","type":"education","lineage":["https://openalex.org/I9579091"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Shashank Uttrani","raw_affiliation_strings":["Applied Cognitive Science Lab, Indian Institute of Technology, Mandi, India"],"affiliations":[{"raw_affiliation_string":"Applied Cognitive Science Lab, Indian Institute of Technology, Mandi, India","institution_ids":["https://openalex.org/I9579091"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090959301","display_name":"Palvi Aggarwal","orcid":"https://orcid.org/0000-0003-2488-8959"},"institutions":[{"id":"https://openalex.org/I164936912","display_name":"The University of Texas at El Paso","ror":"https://ror.org/04d5vba33","country_code":"US","type":"education","lineage":["https://openalex.org/I164936912"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Palvi Aggarwal","raw_affiliation_strings":["Department of Computer Science, University of Texas El Paso, El Paso, TX, United States"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Texas El Paso, El Paso, TX, United States","institution_ids":["https://openalex.org/I164936912"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010689942","display_name":"Varun Dutt","orcid":"https://orcid.org/0000-0002-2151-8314"},"institutions":[{"id":"https://openalex.org/I9579091","display_name":"Indian Institute of Technology Mandi","ror":"https://ror.org/05r9r2f34","country_code":"IN","type":"education","lineage":["https://openalex.org/I9579091"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Varun Dutt","raw_affiliation_strings":["Applied Cognitive Science Lab, Indian Institute of Technology, Mandi, India"],"affiliations":[{"raw_affiliation_string":"Applied Cognitive Science Lab, Indian Institute of Technology, Mandi, India","institution_ids":["https://openalex.org/I9579091"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5010689942"],"corresponding_institution_ids":["https://openalex.org/I9579091"],"apc_list":{"value":1150,"currency":"USD","value_usd":1150},"apc_paid":{"value":1150,"currency":"USD","value_usd":1150},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10459766,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"6","issue":null,"first_page":"988007","last_page":"988007"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/subnet","display_name":"Subnet","score":0.9852395057678223},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5816479921340942},{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.5489833354949951},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4872788190841675},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4735625982284546},{"id":"https://openalex.org/keywords/hardening","display_name":"Hardening (computing)","score":0.4465722441673279},{"id":"https://openalex.org/keywords/port","display_name":"Port (circuit theory)","score":0.4259710907936096},{"id":"https://openalex.org/keywords/deception","display_name":"Deception","score":0.41531679034233093},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.327387273311615},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.2399316430091858},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.0944620668888092},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.09125193953514099}],"concepts":[{"id":"https://openalex.org/C21099817","wikidata":"https://www.wikidata.org/wiki/Q7631721","display_name":"Subnet","level":2,"score":0.9852395057678223},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5816479921340942},{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.5489833354949951},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4872788190841675},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4735625982284546},{"id":"https://openalex.org/C44255700","wikidata":"https://www.wikidata.org/wiki/Q978423","display_name":"Hardening (computing)","level":3,"score":0.4465722441673279},{"id":"https://openalex.org/C32802771","wikidata":"https://www.wikidata.org/wiki/Q2443617","display_name":"Port (circuit theory)","level":2,"score":0.4259710907936096},{"id":"https://openalex.org/C2779267917","wikidata":"https://www.wikidata.org/wiki/Q170028","display_name":"Deception","level":2,"score":0.41531679034233093},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.327387273311615},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2399316430091858},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0944620668888092},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.09125193953514099},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.3389/fdata.2023.988007","is_oa":true,"landing_page_url":"https://doi.org/10.3389/fdata.2023.988007","pdf_url":"https://www.frontiersin.org/articles/10.3389/fdata.2023.988007/pdf","source":{"id":"https://openalex.org/S4210201220","display_name":"Frontiers in Big Data","issn_l":"2624-909X","issn":["2624-909X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320527","host_organization_name":"Frontiers Media","host_organization_lineage":["https://openalex.org/P4310320527"],"host_organization_lineage_names":["Frontiers Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Big Data","raw_type":"journal-article"},{"id":"pmid:37397621","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/37397621","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in big data","raw_type":null},{"id":"pmh:oai:pubmedcentral.nih.gov:10310473","is_oa":true,"landing_page_url":"https://www.ncbi.nlm.nih.gov/pmc/articles/10310473","pdf_url":"https://pmc.ncbi.nlm.nih.gov/articles/PMC10310473/pdf/fdata-06-988007.pdf","source":{"id":"https://openalex.org/S2764455111","display_name":"PubMed Central","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Front Big Data","raw_type":"Text"},{"id":"pmh:oai:doaj.org/article:3dfa718b0e604a74a3c59e22ce07a643","is_oa":true,"landing_page_url":"https://doaj.org/article/3dfa718b0e604a74a3c59e22ce07a643","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Frontiers in Big Data, Vol 6 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3389/fdata.2023.988007","is_oa":true,"landing_page_url":"https://doi.org/10.3389/fdata.2023.988007","pdf_url":"https://www.frontiersin.org/articles/10.3389/fdata.2023.988007/pdf","source":{"id":"https://openalex.org/S4210201220","display_name":"Frontiers in Big Data","issn_l":"2624-909X","issn":["2624-909X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320527","host_organization_name":"Frontiers Media","host_organization_lineage":["https://openalex.org/P4310320527"],"host_organization_lineage_names":["Frontiers Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Big Data","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4018744250","display_name":null,"funder_award_id":"Technology","funder_id":"https://openalex.org/F4320320719","funder_display_name":"Department of Science and Technology, Ministry of Science and Technology, India"},{"id":"https://openalex.org/G4412498071","display_name":null,"funder_award_id":"India","funder_id":"https://openalex.org/F4320320719","funder_display_name":"Department of Science and Technology, Ministry of Science and Technology, India"}],"funders":[{"id":"https://openalex.org/F4320320712","display_name":"Indian Institute of Technology Kanpur","ror":"https://ror.org/05pjsgx75"},{"id":"https://openalex.org/F4320320719","display_name":"Department of Science and Technology, Ministry of Science and Technology, India","ror":"https://ror.org/0101xrq71"},{"id":"https://openalex.org/F4320322211","display_name":"Indian Institute of Technology Madras","ror":"https://ror.org/03v0r5n49"},{"id":"https://openalex.org/F4320326797","display_name":"Indian Institute of Technology Mandi","ror":"https://ror.org/05r9r2f34"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4380789502.pdf"},"referenced_works_count":32,"referenced_works":["https://openalex.org/W912346345","https://openalex.org/W1511560695","https://openalex.org/W1992403651","https://openalex.org/W2026351309","https://openalex.org/W2033729143","https://openalex.org/W2097076008","https://openalex.org/W2121063876","https://openalex.org/W2150802402","https://openalex.org/W2249595199","https://openalex.org/W2502834706","https://openalex.org/W2505685969","https://openalex.org/W2510995092","https://openalex.org/W2565020460","https://openalex.org/W2585830418","https://openalex.org/W2618991564","https://openalex.org/W2725073272","https://openalex.org/W2792586727","https://openalex.org/W2804413960","https://openalex.org/W2883502340","https://openalex.org/W2947676308","https://openalex.org/W2970101446","https://openalex.org/W3003710106","https://openalex.org/W3010360954","https://openalex.org/W3088436119","https://openalex.org/W3123895079","https://openalex.org/W3125354632","https://openalex.org/W4212885232","https://openalex.org/W6603788189","https://openalex.org/W6662488591","https://openalex.org/W6696067382","https://openalex.org/W6751807559","https://openalex.org/W6828115966"],"related_works":["https://openalex.org/W2350724208","https://openalex.org/W2000018903","https://openalex.org/W3142690625","https://openalex.org/W1534090575","https://openalex.org/W2360866534","https://openalex.org/W2372392697","https://openalex.org/W4312961703","https://openalex.org/W2362932354","https://openalex.org/W2391396896","https://openalex.org/W2998623387"],"abstract_inverted_index":{"Prior":[0],"research":[1,231],"in":[2,25,55,82,105,130,187,194,210,226,250],"cyber":[3],"deception":[4,13],"has":[5],"investigated":[6],"the":[7,10,26,30,45,60,138,166,188,195,203,227,233],"effectiveness":[8],"of":[9,12,32,47,64,140,165,190,197,221,235],"timing":[11],"on":[14,28,51,257],"human":[15,37,52,158],"decisions":[16,38,54],"using":[17,59],"simulation":[18],"tools.":[19],"However,":[20],"there":[21],"exists":[22],"a":[23,41,56,68,106,131,184,217],"gap":[24],"literature":[27],"how":[29],"availability":[31,196],"subnets":[33,48,65,112],"and":[34,49,70,94,115,145,151,177,199,237],"port-hardening":[35,50,71,238],"influence":[36,46],"to":[39,163,169,241],"attack":[40,53,170],"system.":[42],"We":[43],"tested":[44],"simulated":[57],"environment":[58],"HackIT":[61],"tool.":[62],"Availability":[63],"(present/absent)":[66],"within":[67,202],"network":[69,109],"(easy-to-attack/hard-to-attack)":[72],"were":[73,103,128,147,160,208,224],"varied":[74],"across":[75],"four":[76,119,167],"between-subject":[77],"conditions":[78,168,212],"(<i>N</i>":[79],"=":[80],"30":[81],"each":[83,116],"condition):":[84],"with-subnet":[85,88,99,211],"with":[86,89,92,96,110,239],"easy-to-attack,":[87,93],"hard-to-attack,":[90],"without-subnet":[91,95,123,214],"hard-to-attack.":[97],"In":[98,122,134,155],"conditions,":[100,124,137],"40":[101,126],"systems":[102,127,144,174,223,255],"connected":[104,113,120,129],"hybrid":[107],"topology":[108],"ten":[111],"linearly,":[114],"subnet":[117],"contained":[118],"systems.":[121],"all":[125],"bus":[132],"topology.":[133],"hard-to-attack":[135],"(easy-to-attack)":[136],"probabilities":[139],"successfully":[141],"attacking":[142],"real":[143,173,191,222,243],"honeypots":[146,207,240],"kept":[148],"low":[149],"(high)":[150],"high":[152],"(low),":[153],"respectively.":[154],"an":[156],"experiment,":[157],"participants":[159],"randomly":[161],"assigned":[162],"one":[164],"as":[171,175],"many":[172],"possible":[176],"steal":[178],"credit":[179],"card":[180],"information.":[181],"Results":[182],"revealed":[183],"significant":[185],"decrease":[186],"proportion":[189,220],"system":[192,244],"attacks":[193],"subnetting":[198,236],"port":[200],"hardening":[201],"network.":[204],"Also,":[205],"more":[206],"attacked":[209,225],"than":[213],"conditions.":[215],"Moreover,":[216],"significantly":[218],"lower":[219],"port-hardened":[228],"condition.":[229],"This":[230],"highlights":[232],"implications":[234],"reduce":[242],"attacks.":[245],"These":[246],"findings":[247],"are":[248],"relevant":[249],"developing":[251],"advanced":[252],"intrusion":[253],"detection":[254],"trained":[256],"hackers'":[258],"behavior.":[259]},"counts_by_year":[],"updated_date":"2026-03-13T16:22:10.518609","created_date":"2025-10-10T00:00:00"}
