{"id":"https://openalex.org/W1977550191","doi":"https://doi.org/10.4018/ijcwt.2013070104","title":"Tools and Technologies for Professional Offensive Cyber Operations","display_name":"Tools and Technologies for Professional Offensive Cyber Operations","publication_year":2013,"publication_date":"2013-07-01","ids":{"openalex":"https://openalex.org/W1977550191","doi":"https://doi.org/10.4018/ijcwt.2013070104","mag":"1977550191"},"language":"en","primary_location":{"id":"doi:10.4018/ijcwt.2013070104","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijcwt.2013070104","pdf_url":null,"source":{"id":"https://openalex.org/S4210168647","display_name":"International Journal of Cyber Warfare and Terrorism","issn_l":"1947-3435","issn":["1947-3435","1947-3443"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cyber Warfare and Terrorism","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113533747","display_name":"T. J. Grant","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"T. J. Grant","raw_affiliation_strings":["Retired But Active Researcher (R-BAR), Benschop, Netherlands"],"affiliations":[{"raw_affiliation_string":"Retired But Active Researcher (R-BAR), Benschop, Netherlands","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5113533747"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.15031812,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"3","issue":"3","first_page":"49","last_page":"71"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/offensive","display_name":"Offensive","score":0.9408799409866333},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6915215253829956},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6140344738960266},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.6032353639602661},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.5553255081176758},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.45197296142578125},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.44496938586235046},{"id":"https://openalex.org/keywords/government","display_name":"Government (linguistics)","score":0.42934292554855347},{"id":"https://openalex.org/keywords/national-security","display_name":"National security","score":0.42752930521965027},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.25104814767837524},{"id":"https://openalex.org/keywords/operations-research","display_name":"Operations research","score":0.23079225420951843},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.12921202182769775}],"concepts":[{"id":"https://openalex.org/C176856949","wikidata":"https://www.wikidata.org/wiki/Q2001676","display_name":"Offensive","level":2,"score":0.9408799409866333},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6915215253829956},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6140344738960266},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.6032353639602661},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.5553255081176758},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.45197296142578125},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.44496938586235046},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.42934292554855347},{"id":"https://openalex.org/C528167355","wikidata":"https://www.wikidata.org/wiki/Q258307","display_name":"National security","level":2,"score":0.42752930521965027},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.25104814767837524},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.23079225420951843},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.12921202182769775},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/ijcwt.2013070104","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijcwt.2013070104","pdf_url":null,"source":{"id":"https://openalex.org/S4210168647","display_name":"International Journal of Cyber Warfare and Terrorism","issn_l":"1947-3435","issn":["1947-3435","1947-3443"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cyber Warfare and Terrorism","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jcwt00:v:3:y:2013:i:3:p:49-71","is_oa":false,"landing_page_url":"http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijcwt.2013070104","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320320721","display_name":"Council of Scientific and Industrial Research, India","ror":"https://ror.org/021wm7p51"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W38460778","https://openalex.org/W64403799","https://openalex.org/W154066666","https://openalex.org/W1483640767","https://openalex.org/W1496257659","https://openalex.org/W1583844605","https://openalex.org/W2012885235","https://openalex.org/W2095347754","https://openalex.org/W2143467145","https://openalex.org/W2315226716","https://openalex.org/W2626494995","https://openalex.org/W4285719527","https://openalex.org/W6601688655","https://openalex.org/W6602621658"],"related_works":["https://openalex.org/W1568520348","https://openalex.org/W3214407891","https://openalex.org/W3194113117","https://openalex.org/W3213194066","https://openalex.org/W4287020359","https://openalex.org/W268355439","https://openalex.org/W2967125893","https://openalex.org/W4385323698","https://openalex.org/W2385362579","https://openalex.org/W2932194183"],"abstract_inverted_index":{"Since":[0],"2008,":[1],"several":[2],"countries":[3],"have":[4,225],"published":[5],"new":[6],"national":[7,21,59],"cyber":[8,18,29,44,68,77,134,154,161],"security":[9],"strategies":[10,22],"that":[11,103],"allow":[12],"for":[13,24,151],"the":[14,25,83,87,104,129,137,146,160,178,214],"possibility":[15],"of":[16,27,33,89,111,139,159,171,207,221],"offensive":[17,67,153],"operations.":[19,155],"Typically,":[20],"call":[23],"establishment":[26],"a":[28,116,126,169],"operations":[30,45,69],"unit":[31,46,78],"capable":[32],"computer":[34,71],"network":[35,72],"defence,":[36],"exploitation,":[37],"and,":[38,124],"in":[39,86,177,193],"some":[40],"nations,":[41],"attack.":[42],"The":[43,76,216],"will":[47],"be":[48,80],"manned":[49],"by":[50,133,166,199,228],"professionals":[51],"and":[52,60,74,92,96,99,114,148,188,203,209,219,223],"operate":[53],"under":[54],"government":[55],"authority":[56],"compliant":[57],"with":[58,82],"international":[61],"law.":[62],"Our":[63],"research":[64],"focuses":[65],"on":[66],"(i.e.":[70],"exploitation":[73],"attack).":[75],"must":[79],"provided":[81],"right":[84],"resources,":[85],"form":[88],"accommodation,":[90],"computing":[91],"networking":[93],"infrastructure,":[94],"tools":[95,113,147,208,222],"technologies,":[97],"doctrine,":[98],"training.":[100],"We":[101],"contend":[102],"open":[105],"literature":[106],"gives":[107],"an":[108],"unbalanced":[109],"view":[110],"what":[112],"technologies":[115,149,210,224],"professional":[117],"group":[118],"needs":[119],"because":[120],"it":[121],"emphasizes":[122],"malware":[123],"to":[125,143],"lesser":[127],"extent,":[128],"delivery":[130],"media":[131],"used":[132],"criminals.":[135],"Hence,":[136],"purpose":[138],"this":[140],"paper":[141],"is":[142],"identify":[144],"systematically":[145],"needed":[150],"professional,":[152],"A":[156,205],"canonical":[157,181,217],"model":[158,182,218],"attack":[162,173],"process":[163,174],"was":[164,183,211],"obtained":[165],"rationally":[167],"reconstructing":[168],"set":[170,206,220],"existing":[172],"models":[175],"found":[176],"literature.":[179],"This":[180],"formalized":[184],"using":[185],"Structured":[186],"Analysis":[187],"Design":[189],"Technique":[190],"(SADT)":[191],"notation,":[192],"which":[194],"processes":[195],"are":[196],"logically":[197],"linked":[198],"inputs,":[200],"outputs,":[201],"controls,":[202],"mechanisms.":[204,215],"extracted":[212],"from":[213],"been":[226],"checked":[227],"subject":[229],"matter":[230],"experts.":[231]},"counts_by_year":[{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
