{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:54:22Z","timestamp":1773932062373,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T00:00:00Z","timestamp":1722297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"European Commission","doi-asserted-by":"publisher","award":["101070455"],"award-info":[{"award-number":["101070455"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,30]]},"DOI":"10.1145\/3664476.3670458","type":"proceedings-article","created":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T12:35:50Z","timestamp":1721910950000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A Multi-layer Approach through Threat Modelling and Attack Simulation for Enhanced Cyber Security Assessment"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5458-6049","authenticated-orcid":false,"given":"Eider","family":"Iturbe","sequence":"first","affiliation":[{"name":"TECNALIA, Basque Research and Technology Alliance (BRTA), Spain and University of the Basque Country, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6733-3713","authenticated-orcid":false,"given":"Javier","family":"Arcas","sequence":"additional","affiliation":[{"name":"TECNALIA, Basque Research and Technology Alliance (BRTA), Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5541-1091","authenticated-orcid":false,"given":"Erkuden","family":"Rios","sequence":"additional","affiliation":[{"name":"TECNALIA, Basque Research and Technology Alliance (BRTA), Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9394-1269","authenticated-orcid":false,"given":"Nerea","family":"Toledo","sequence":"additional","affiliation":[{"name":"University of the Basque Country, Spain"}]}],"member":"320","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"EVSE dataset","author":"Canadian Institute for Cybersecurity. 2024.","year":"2024","unstructured":"Canadian Institute for Cybersecurity. 2024. EVSE dataset 2024. https:\/\/www.unb.ca\/cic\/datasets\/evse-dataset-2024.html. Accessed: 2024-4-30."},{"key":"e_1_3_2_1_2_1","volume-title":"Research on Cyber Attack Modeling and Attack Path Discovery. In 2022 2nd International Conference on Computational Modeling, Simulation and Data Analysis (CMSDA). IEEE, 332\u2013338","author":"Chen Tianjiaojiao","year":"2022","unstructured":"Tianjiaojiao Chen, Huixiang Zhang, Tianluo Liu, and Renjie Li. 2022. Research on Cyber Attack Modeling and Attack Path Discovery. In 2022 2nd International Conference on Computational Modeling, Simulation and Data Analysis (CMSDA). IEEE, 332\u2013338."},{"key":"e_1_3_2_1_3_1","unstructured":"Elastic. 2024. System fields. https:\/\/www.elastic.co\/guide\/en\/beats\/metricbeat\/current\/exported-fields-system.html. Accessed: 2024-4-30."},{"key":"e_1_3_2_1_4_1","unstructured":"European Commission. 2022. EUR-Lex - 32022L2557 - EN. https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX%3A32022L2557. Accessed: 2024-4-30."},{"key":"e_1_3_2_1_5_1","unstructured":"Joint\u00a0Task Force. 2017. Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy (Discussion Draft). Technical Report. National Institute of Standards and Technology."},{"key":"e_1_3_2_1_6_1","unstructured":"Gartner. 2024. Breach and Attack Simulation (BAS) Tools. https:\/\/www.gartner.com\/reviews\/market\/breach-and-attack-simulation-bas-tools. Accessed: 2024-4-13."},{"key":"e_1_3_2_1_7_1","volume-title":"Generative adversarial nets. Advances in neural information processing systems 27","author":"Goodfellow Ian","year":"2014","unstructured":"Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative adversarial nets. Advances in neural information processing systems 27 (2014)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1186\/s42162-020-00134-4"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyab005"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103054"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9081218"},{"key":"e_1_3_2_1_12_1","volume-title":"ENISA threat landscape 2023","author":"Lella Ifigeneia","year":"2022","unstructured":"Ifigeneia Lella, Cosmin Ciobanu, Eleni Tsekmezoglou, Marianthi Theocharidou, Erika Magonara, Apostolos Malatras, and Rossen\u00a0Svetozarov Naydenov. 2023. ENISA threat landscape 2023: July 2022 to June 2023. (2023)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3445969.3450421"},{"key":"e_1_3_2_1_14_1","volume-title":"Synthetic flow-based cryptomining attack generation through Generative Adversarial Networks. Scientific reports 12, 1","author":"Mozo Alberto","year":"2022","unstructured":"Alberto Mozo, \u00c1ngel Gonz\u00e1lez-Prieto, Antonio Pastor, Sandra G\u00f3mez-Canaval, and Edgar Talavera. 2022. Synthetic flow-based cryptomining attack generation through Generative Adversarial Networks. Scientific reports 12, 1 (2022), 2091."},{"key":"e_1_3_2_1_15_1","unstructured":"National Institute of Standards and Technology. 2024. NVD - home. https:\/\/nvd.nist.gov\/. Accessed: 2024-4-30."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.12.012"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502822"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103284"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.03.010"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-021-00898-7"},{"key":"e_1_3_2_1_21_1","volume-title":"Electronics and Mobile Communication Conference (IEMCON). IEEE, 540","author":"Zingo Pasquale","year":"2020","unstructured":"Pasquale Zingo and Andrew Novocin. 2020. Can GAN-generated network traffic be used to train traffic anomaly classifiers?. In 2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON). IEEE, 540."}],"event":{"name":"ARES 2024: The 19th International Conference on Availability, Reliability and Security","location":"Vienna Austria","acronym":"ARES 2024"},"container-title":["Proceedings of the 19th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3670458","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664476.3670458","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:51:27Z","timestamp":1755881487000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3670458"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,30]]},"references-count":21,"alternative-id":["10.1145\/3664476.3670458","10.1145\/3664476"],"URL":"https:\/\/doi.org\/10.1145\/3664476.3670458","relation":{},"subject":[],"published":{"date-parts":[[2024,7,30]]},"assertion":[{"value":"2024-07-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}