{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T16:04:21Z","timestamp":1743005061668,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031459320"},{"type":"electronic","value":"9783031459337"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-45933-7_3","type":"book-chapter","created":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T09:02:37Z","timestamp":1700470957000},"page":"42-59","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Keeping Your Enemies Closer: Shedding Light on\u00a0the\u00a0Attacker\u2019s Optimal Strategy"],"prefix":"10.1007","author":[{"given":"Weixia","family":"Cai","sequence":"first","affiliation":[]},{"given":"Huashan","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,21]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","first-page":"100219","DOI":"10.1016\/j.cosrev.2019.100219","volume":"35","author":"HS Lallie","year":"2020","unstructured":"Lallie, H.S., Debattista, K., Bal, J.: A review of attack graph and attack tree visual syntax in cyber security. Comput. Sci. Rev. 35, 100219 (2020)","journal-title":"Comput. Sci. Rev."},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Shengwei, Y., et al.: Overview on attack graph generation and visualization technology In: International Conference on Anti-Counterfeiting, Security and Identification, pp. 1\u20136 (2013)","DOI":"10.1109\/ICASID.2013.6825274"},{"key":"3_CR3","unstructured":"Lockheed, M.: The cyber kill chain. https:\/\/www.lockheedmartin.com\/en-us\/capabilities\/cyber\/cyber-kill-chain.html"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Al Shebli, H.M.Z., Beheshti, B.D.: A study on penetration testing process and tools. In: 2018 IEEE Long Island Systems, Applications and Technology Conference, pp. 1\u20137 (2018)","DOI":"10.1109\/LISAT.2018.8378035"},{"key":"3_CR5","unstructured":"Vyas, S., Hannay, J., Bolton, A., Burnap, P.P.: Automated cyber defence: a review. arXiv (2023)"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Kadivar, M.: Cyber-attack attributes. Technol. Innov. Manage. Rev. 22\u201327 (2014)","DOI":"10.22215\/timreview\/846"},{"key":"3_CR7","unstructured":"Chapple, M., Seidl, D.: CompTIA Security+ Study Guide: Exam SY0-601. 8th edn. ISBN-13 is 978\u20131119736257, Sybex (2021)"},{"key":"3_CR8","unstructured":"Boddy, M.S., Gohde, J., Haigh, T., Harp, S.A.: Course of action generation for cyber security using classical planning. In: The Fifteenth International Conference on Automated Planning and Scheduling, pp. 12\u201321 (2005)"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Hoffmann, J.: Simulated penetration testing: from \u201cDijkstra\" to \u201cTuring Test++\u201d. In: The Twenty-Fifth International Conference on Automated Planning and Scheduling, pp. 364\u2013372 (2015)","DOI":"10.1609\/icaps.v25i1.13684"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Sarraute, C., Buffet, O., Hoffmann, J.: POMDPs make better hackers: accounting for uncertainty in penetration testing. In: The Twenty-Sixth AAAI Conference on Artificial Intelligence, pp. 1816\u20131824 (2012)","DOI":"10.1609\/aaai.v26i1.8363"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Sarraute, C., Richarte, G., Luc\u00e1ngeli Obes, J.: an algorithm to find optimal attack paths in nondeterministic scenarios. In: The 4th ACM Workshop on Security and Artificial Intelligence, pp. 71\u201380 (2011)","DOI":"10.1145\/2046684.2046695"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Shmaryahu, D., Shani, G., Hoffmann, J., Steinmetz, M.: Simulated penetration testing as contingent planning. In: The Twenty-Eighth International Conference on Automated Planning and Scheduling, pp. 241\u2013249 (2018)","DOI":"10.1609\/icaps.v28i1.13902"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Schwartz, J., Kurniawati, H., El-Mahassni, E.: \u201cPOMDP + information-decay: incorporating defender\u2019s behaviour in autonomous penetration testing. In: The Thirtieth International Conference on Automated Planning and Scheduling, pp. 235\u2013243 (2020)","DOI":"10.1609\/icaps.v30i1.6666"},{"issue":"2","key":"3_CR14","doi-asserted-by":"publisher","first-page":"1596","DOI":"10.1109\/TDSC.2022.3160792","volume":"20","author":"H Holm","year":"2023","unstructured":"Holm, H.: Lore a red team emulation tool. IEEE Trans. Dependable Secure Comput. 20(2), 1596\u20131608 (2023)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Randhawa, S., Turnbull, B., Yuen, J., Dean, J.: Mission-centric automated cyber red teaming. In: The 13th International Conference on Availability, Reliability and Security, pp. 1\u201311 (2018)","DOI":"10.1145\/3230833.3234688"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Vats, P., Mandot, M., Gosain, A.: A comprehensive literature review of penetration testing & its applications. In: 8th International Conference on Reliability, Infocom Technologies and Optimization, pp. 674\u2013680 (2020)","DOI":"10.1109\/ICRITO48877.2020.9197961"},{"key":"3_CR17","first-page":"102","volume":"100","author":"R Maeda","year":"2020","unstructured":"Maeda, R., Mimura, M.: Automating post-exploitation with deep reinforcement learning. Comput. Secur. 100, 102\u2013108 (2020)","journal-title":"Comput. Secur."},{"key":"3_CR18","unstructured":"Alsaheel, A., et al.: ATLAS: a sequence-based learning approach for attack investigation. In: The 30th USENIX Security Symposium, pp. 3005\u20133022 (2021)"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Li, J., Ou, X., Rajagopalan, R.: Uncertainty and risk management in cyber situational awareness. In: Uncertainty and Risk Management in Cyber Situational Awareness (2010)","DOI":"10.1007\/978-1-4419-0140-8_4"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Applebaum, A., Miller, D., Strom, B., Korban, C., Wolf, R.: Intelligent, automated red team emulation. In: The 32nd Annual Conference on Computer Security Applications, pp. 363\u2013373 (2020)","DOI":"10.1145\/2991079.2991111"},{"key":"3_CR21","doi-asserted-by":"publisher","first-page":"2490","DOI":"10.1109\/TIFS.2018.2819967","volume":"13","author":"M Erik","year":"2018","unstructured":"Erik, M., Mohammad, R., Demosthenis, T.: A POMDP approach to the dynamic defense of large-scale cyber networks. IEEE Trans. Inf. Forensics Secur. 13, 2490\u20132505 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Abomhara, M., K\u00f8ien, G.M.: Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. Cyber Secur. 65\u201388 (2015)","DOI":"10.13052\/jcsm2245-1439.414"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Munaiah, N., Rahman, A., Pelletier, J., Williams, L., Meneely, A.: Characterizing attacker behavior in a cybersecurity penetration testing competition. In: ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement, pp. 1\u20136 (2019)","DOI":"10.1109\/ESEM.2019.8870147"},{"key":"3_CR24","unstructured":"Gabrys, R., et al.: Emotional state classification and related behaviors among cyber attackers. In: Proceedings of the 56th Hawaii International Conference on System Sciences, pp. 846\u2013855 (2023)"},{"key":"3_CR25","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/0022-247X(65)90154-X","volume":"10","author":"KJ \u00c5str\u00f6m","year":"1965","unstructured":"\u00c5str\u00f6m, K.J.: Optimal control of Markov processes with incomplete state information. J. Math. Anal. Appl. 10, 174\u2013205 (1965)","journal-title":"J. Math. Anal. Appl."},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Perry, I., et al.: Differentiating and predicting cyberattack behaviors using LSTM. In: IEEE Conference on Dependable and Secure Computing, pp. 1\u20138 (2018)","DOI":"10.1109\/DESEC.2018.8625145"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Ghanem, M.C., Chen, T.M.: Reinforcement Learning for efficient network penetration testing. Article 6 (2020)","DOI":"10.3390\/info11010006"},{"key":"3_CR28","doi-asserted-by":"crossref","unstructured":"Lye, K.-W., Wing J.M.: Game Strategies in Network Security. vol. 4, pp. 1615\u20135262. Springer, Cham (2005)","DOI":"10.1007\/s10207-004-0060-x"},{"key":"3_CR29","unstructured":"Shridhar, M, Panpan, C.: Efficient point-based POMDP planning by approximating. Accessed 10 Nov 2021"}],"container-title":["Lecture Notes in Computer Science","Science of Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-45933-7_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,2]],"date-time":"2024-11-02T06:55:35Z","timestamp":1730530535000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-45933-7_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031459320","9783031459337"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-45933-7_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"21 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SciSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Science of Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, VIC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"scisec2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/scisec.org\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"60","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}