{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T18:50:31Z","timestamp":1763146231055,"version":"3.45.0"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T00:00:00Z","timestamp":1748822400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T00:00:00Z","timestamp":1748822400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,2]]},"DOI":"10.1109\/cogsima64436.2025.11079523","type":"proceedings-article","created":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T17:41:16Z","timestamp":1752601276000},"page":"79-86","source":"Crossref","is-referenced-by-count":0,"title":["Evaluating GPT-4o as a Cyberattack Simulator: Perspectives on AI and Human Decision-Making"],"prefix":"10.1109","author":[{"given":"Shubham","family":"Thakur","sequence":"first","affiliation":[{"name":"Indian Institute of Technology,Applied Cognitive Science Lab,Mandi,India"}]},{"given":"Shubham","family":"Sharma","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology,Applied Cognitive Science Lab,Mandi,India"}]},{"given":"Ranik","family":"Goyal","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology,Applied Cognitive Science Lab,Mandi,India"}]},{"given":"Megha","family":"Sharma","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology,Applied Cognitive Science Lab,Mandi,India"}]},{"given":"Shashank","family":"Uttrani","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology,Applied Cognitive Science Lab,Mandi,India"}]},{"given":"Varun","family":"Dutt","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology,Applied Cognitive Science Lab,Mandi,India"}]}],"member":"263","reference":[{"issue":"1","key":"ref1","first-page":"41","article-title":"Proactive Cyber Defense: Leveraging Adversarial Modeling to Anticipate Cyber Attacks","volume":"15","author":"Achleitner","year":"2017","journal-title":"IEEE Security & Privacy"},{"issue":"4","key":"ref2","first-page":"56","article-title":"Linear Predictability in Network Attack Strategies","volume":"12","author":"Turnbull","year":"2005","journal-title":"Cybersecurity and Systems Analysis Journal"},{"issue":"2","key":"ref3","first-page":"110","article-title":"Defensive Strategies in Network Topology Design: An Empirical Approach","volume":"4","author":"Webster","year":"2006","journal-title":"Journal of Network Systems and Security"},{"issue":"2","key":"ref4","first-page":"120","article-title":"Assessing the Resiliency of Critical Infrastructures to Cyber Attacks","volume":"8","author":"Albanese","year":"2012","journal-title":"Journal of Cybersecurity Research"},{"key":"ref5","first-page":"1877","article-title":"Language Models are Few-Shot Learners","volume":"33","author":"Brown","year":"2020","journal-title":"Advances in Neural Information Processing Systems (NeurIPS)"},{"article-title":"Exploring AI-Driven Cyber Attack Simulations with Large Language Models","volume-title":"Proc. International Conference on Cybersecurity (ICC)","author":"Zhang","key":"ref6"},{"issue":"1","key":"ref7","first-page":"78","article-title":"Anomaly Detection Using Large Language Models: New Horizons in AI Cyber Defense","volume":"15","author":"Wu","year":"2022","journal-title":"Cybersecurity Advances"},{"issue":"2","key":"ref8","first-page":"34","article-title":"Comparative Analysis of Human and AI-driven Attacks in Cyber-Physical Systems","volume":"19","author":"Uttrani","year":"2023","journal-title":"Cybersecurity Review"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref10","article-title":"Language Models are Unsupervised Multitask Learners","author":"Radford","year":"2019","journal-title":"OpenAI Technical Report"},{"issue":"140","key":"ref11","first-page":"1","article-title":"Exploring the Limits of Transfer Learning with a Unified Text-to-Text Transformer","volume":"21","author":"Raffel","year":"2020","journal-title":"Journal of Machine Learning Research"},{"article-title":"The Curious Case of Neural Text Degeneration","volume-title":"Proc. International Conference on Learning Representations (ICLR)","author":"Holtzman","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/p18-1082"},{"issue":"3","key":"ref14","first-page":"329","article-title":"Decision Trade-offs with Adaptive Choice Sets","volume":"20","author":"Pu","year":"2011","journal-title":"Journal of Decision Systems"},{"key":"ref15","first-page":"2778","article-title":"Training Language Models to Follow Instructions with Human Feedback","volume":"35","author":"Ouyang","year":"2022","journal-title":"Advances in Neural Information Processing Systems (NeurIPS)"}],"event":{"name":"2025 IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA)","start":{"date-parts":[[2025,6,2]]},"location":"Duisburg, Germany","end":{"date-parts":[[2025,6,5]]}},"container-title":["2025 IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11079407\/11079467\/11079523.pdf?arnumber=11079523","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T18:45:27Z","timestamp":1763145927000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11079523\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,2]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/cogsima64436.2025.11079523","relation":{},"subject":[],"published":{"date-parts":[[2025,6,2]]}}}