{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T07:44:55Z","timestamp":1770277495560,"version":"3.49.0"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3272629","type":"journal-article","created":{"date-parts":[[2023,5,3]],"date-time":"2023-05-03T18:51:42Z","timestamp":1683139902000},"page":"70443-70458","source":"Crossref","is-referenced-by-count":10,"title":["Toward Effective Evaluation of Cyber Defense: Threat Based Adversary Emulation Approach"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4418-4959","authenticated-orcid":false,"given":"Abdul Basit","family":"Ajmal","sequence":"first","affiliation":[{"name":"Department of Computer Science, COMSATS University Islamabad (CUI), Islamabad, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5952-8502","authenticated-orcid":false,"given":"Shawal","family":"Khan","sequence":"additional","affiliation":[{"name":"Department of Computer Science, COMSATS University Islamabad (CUI), Islamabad, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8839-593X","authenticated-orcid":false,"given":"Masoom","family":"Alam","sequence":"additional","affiliation":[{"name":"Department of Computer Science, COMSATS University Islamabad (CUI), Islamabad, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0945-512X","authenticated-orcid":false,"given":"Abolfazl","family":"Mehbodniya","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, Kuwait College of Science and Technology (KCST), Doha, Safat, Kuwait"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7796-2898","authenticated-orcid":false,"given":"Julian","family":"Webber","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, Kuwait College of Science and Technology (KCST), Doha, Safat, Kuwait"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0974-6154","authenticated-orcid":false,"given":"Abdul","family":"Waheed","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Women University Swabi, Swabi, Pakistan"}]}],"member":"263","reference":[{"key":"ref13","author":"clark","year":"2014","journal-title":"RTFM Red Team Field Manual"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2016.7813778"},{"key":"ref12","author":"weidman","year":"2014","journal-title":"de Penetration Testing A hands on introduction to hacking"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3390\/fi11040089"},{"key":"ref15","article-title":"Module development in metasploit for pentesting","author":"pages","year":"2019"},{"key":"ref37","first-page":"73","article-title":"The ghost in the system: Technical analysis of remote access trojan","volume":"11","author":"kara","year":"2019","journal-title":"Int J Inf Technol Secur"},{"key":"ref14","author":"wrightson","year":"2014","journal-title":"Advanced Persistent Threat Hacking The Art and Science of Hacking Any Organization"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-03-2017-0009"},{"key":"ref31","article-title":"APT3 adversary emulation plan","author":"korban","year":"2017"},{"key":"ref30","first-page":"1","article-title":"Mitre att&ck: Design and philosophy","author":"strom","year":"2018"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TLA.2019.8931199"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2014.09.005"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIC.2013.6724216"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2021.03.647"},{"key":"ref2","author":"canner","year":"2020","journal-title":"Here is Why Endpoint Security is Important to Your Enterprise"},{"key":"ref1","first-page":"1","article-title":"8 reasons why business email compromise is a risk for trustees","author":"herbert-lowe","year":"2022","journal-title":"Australas Law Manag J"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2016.7856742"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3374664.3375741"},{"key":"ref16","author":"moran","year":"2014","journal-title":"Operation Double Tap"},{"key":"ref38","first-page":"47","article-title":"Getting credentials without exploiting the target","volume":"5","author":"raval","year":"2020","journal-title":"Digital Forensics (4N6)"},{"key":"ref19","article-title":"Automated adversary emulation: A case for planning and acting with unknowns","author":"miller","year":"2018"},{"key":"ref18","author":"singh","year":"2018","journal-title":"Metasploit Penetration Testing Cookbook Evade Antiviruses Bypass Firewalls and Exploit Complex Environments With the Most Widely Used Penetration Testing Framework"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3934\/era.2023097"},{"key":"ref23","first-page":"196","article-title":"Advances in adversarial attacks and defenses in intrusion detection system: A survey","author":"mbow","year":"2023","journal-title":"Science of Cyber Security-SciSec 2022 Workshops AI-CryptoSec TA-BC-NFT and MathSci-Qsafe 2022 Matsue Japan August 10&#x2013;12 2022 Revised Selected Papers"},{"key":"ref26","year":"2022","journal-title":"Adversary Emulation Plans"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/HONET53078.2021.9615485"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-25460-4_12"},{"key":"ref42","author":"isaev","year":"2020","journal-title":"Method for performing TLS\/SSL inspection based on verified subject name"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.07.052"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3104260"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/fi15010011"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS49300.2020.9116399"},{"key":"ref28","first-page":"368","article-title":"Actionable cyber threat intelligence for automated incident response","author":"leite","year":"2023","journal-title":"Proc 27th Nordic Conf Secure IT Syst (NordSec)"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3563525"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59000-0_5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/STARTUP.2016.7583912"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3169349"},{"key":"ref9","first-page":"47","article-title":"A modern approach to cyber security analysis using vulnerability assessment and penetration testing","volume":"4","author":"shah","year":"2013","journal-title":"Int J Electron Commun Comput Eng"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/LISAT.2018.8378035"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/LISAT.2016.7494156"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2022.3199817"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3846\/20294913.2017.1280558"},{"key":"ref40","first-page":"1","article-title":"Hypervisor injection attack using X-cross API calls (HI-API attack)","volume":"12","author":"arul","year":"2020","journal-title":"J Ambient Intell Humanized Comput"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10114933.pdf?arnumber=10114933","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,14]],"date-time":"2023-08-14T17:57:10Z","timestamp":1692035830000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10114933\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3272629","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}