{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T20:48:30Z","timestamp":1747169310133,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,5,25]]},"DOI":"10.23919\/cycon51939.2021.9467801","type":"proceedings-article","created":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T20:27:07Z","timestamp":1625516827000},"page":"309-326","source":"Crossref","is-referenced-by-count":5,"title":["Towards an AI-powered Player in Cyber Defence Exercises"],"prefix":"10.23919","author":[{"given":"Roland","family":"Meier","sequence":"first","affiliation":[]},{"given":"Arturs","family":"Lavrenovs","sequence":"additional","affiliation":[]},{"given":"Kimmo","family":"Heinaaro","sequence":"additional","affiliation":[]},{"given":"Luca","family":"Gambazzi","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Lenders","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Zeek Flowmeter","year":"0","key":"ref33"},{"journal-title":"LockedShields 2012 After Action Report","year":"0","key":"ref32"},{"journal-title":"LockedShields 2013 After Action Report","year":"0","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/R10-HTC.2017.8288910"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecPODS.2018.8560673"},{"key":"ref11","article-title":"Artificial intelligence in cyber defense","author":"tyugu","year":"2011","journal-title":"presented at the 3rd Int Conf on Cyb Conf"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IWMN.2019.8805036"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-8793-6.ch011"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3372823"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-28374-2_35"},{"journal-title":"Suricata","year":"0","key":"ref16"},{"journal-title":"Anti-virus Software","year":"0","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.23919\/CYCON.2019.8756814"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.11.016"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICITACEE.2018.8576921"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"ref27","article-title":"Survey on Chatbot Design Techniques in Speech Conversation Systems","volume":"6","author":"abdul-kader","year":"2015","journal-title":"Int J Adv Comput Sci Appl"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-6648-6_10"},{"journal-title":"Locked shields","year":"0","key":"ref6"},{"key":"ref29","article-title":"AI Chatbot to Realize Sophistication of Customer Contact Points","volume":"54","author":"office","year":"2018","journal-title":"FUJITSU Sci Tech J"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2805680"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44781-0_11"},{"key":"ref7","article-title":"Lessons learned from Locked Shields 2013 exercise","author":"kasak","year":"2013","journal-title":"2nd ENISA Int Conf Cyber Crisis Coop and Exercises"},{"journal-title":"SNORT","year":"0","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1126\/science.aar6404"},{"journal-title":"Zeek","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.003"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101739"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972733.3"},{"journal-title":"A recommender system in the cyber defense domain","year":"2014","author":"lyons","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2020.113008"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1414004.1414065"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-019-0090-6"}],"event":{"name":"2021 13th International Conference on Cyber Conflict (CyCon)","start":{"date-parts":[[2021,5,25]]},"location":"Tallinn, Estonia","end":{"date-parts":[[2021,5,28]]}},"container-title":["2021 13th International Conference on Cyber Conflict (CyCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9467797\/9467799\/09467801.pdf?arnumber=9467801","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,9]],"date-time":"2021-08-09T22:11:48Z","timestamp":1628547108000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9467801\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,25]]},"references-count":33,"URL":"https:\/\/doi.org\/10.23919\/cycon51939.2021.9467801","relation":{},"subject":[],"published":{"date-parts":[[2021,5,25]]}}}