{"id":"https://openalex.org/W4320058201","doi":"https://doi.org/10.1145/3569902.3570188","title":"Modeling attacker behavior in Cyber-Physical-Systems","display_name":"Modeling attacker behavior in Cyber-Physical-Systems","publication_year":2022,"publication_date":"2022-11-21","ids":{"openalex":"https://openalex.org/W4320058201","doi":"https://doi.org/10.1145/3569902.3570188"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3569902.3570188","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3569902.3570188","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017616233","display_name":"Samuel Rodr\u00edguez-Gonz\u00e1lez","orcid":"https://orcid.org/0000-0003-4981-6505"},"institutions":[{"id":"https://openalex.org/I162096671","display_name":"Universidad de Los Andes","ror":"https://ror.org/02mhbdp94","country_code":"CO","type":"education","lineage":["https://openalex.org/I162096671"]},{"id":"https://openalex.org/I8692664","display_name":"University of Oklahoma","ror":"https://ror.org/02aqsxs83","country_code":"US","type":"education","lineage":["https://openalex.org/I8692664"]}],"countries":["CO","US"],"is_corresponding":false,"raw_author_name":"Samuel Rodriguez Gonzalez","raw_affiliation_strings":["School of Industrial and Systems Egineering, University of Oklahoma, USA and Dept. Of Industrial Engineering, Universidad de los Andes, Colombia"],"affiliations":[{"raw_affiliation_string":"School of Industrial and Systems Egineering, University of Oklahoma, USA and Dept. Of Industrial Engineering, Universidad de los Andes, Colombia","institution_ids":["https://openalex.org/I162096671","https://openalex.org/I8692664"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042160392","display_name":"Juan Betancourt Osorio","orcid":"https://orcid.org/0000-0002-6808-6256"},"institutions":[{"id":"https://openalex.org/I162096671","display_name":"Universidad de Los Andes","ror":"https://ror.org/02mhbdp94","country_code":"CO","type":"education","lineage":["https://openalex.org/I162096671"]}],"countries":["CO"],"is_corresponding":false,"raw_author_name":"Juan Betancourt Osorio","raw_affiliation_strings":["Dept. Of Industrial Engineering, Universidad de los Andes, Colombia"],"affiliations":[{"raw_affiliation_string":"Dept. Of Industrial Engineering, Universidad de los Andes, Colombia","institution_ids":["https://openalex.org/I162096671"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089770297","display_name":"Germ\u00e1n Pardo Gonz\u00e1lez","orcid":"https://orcid.org/0000-0002-6281-1090"},"institutions":[{"id":"https://openalex.org/I162096671","display_name":"Universidad de Los Andes","ror":"https://ror.org/02mhbdp94","country_code":"CO","type":"education","lineage":["https://openalex.org/I162096671"]}],"countries":["CO"],"is_corresponding":false,"raw_author_name":"Germ\u00e1n Pardo Gonz\u00e1lez","raw_affiliation_strings":["Dept. Of Industrial Engineering, Universidad de los Andes, Colombia"],"affiliations":[{"raw_affiliation_string":"Dept. Of Industrial Engineering, Universidad de los Andes, Colombia","institution_ids":["https://openalex.org/I162096671"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071317360","display_name":"Daniel Cu\u00e9llar","orcid":"https://orcid.org/0000-0001-6247-7726"},"institutions":[{"id":"https://openalex.org/I162096671","display_name":"Universidad de Los Andes","ror":"https://ror.org/02mhbdp94","country_code":"CO","type":"education","lineage":["https://openalex.org/I162096671"]}],"countries":["CO"],"is_corresponding":false,"raw_author_name":"Daniel Cuellar","raw_affiliation_strings":["Dept. Of Industrial Engineering, Universidad de los Andes, Colombia"],"affiliations":[{"raw_affiliation_string":"Dept. Of Industrial Engineering, Universidad de los Andes, Colombia","institution_ids":["https://openalex.org/I162096671"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086468404","display_name":"Camilo G\u00f3mez","orcid":"https://orcid.org/0000-0002-7233-1701"},"institutions":[{"id":"https://openalex.org/I162096671","display_name":"Universidad de Los Andes","ror":"https://ror.org/02mhbdp94","country_code":"CO","type":"education","lineage":["https://openalex.org/I162096671"]}],"countries":["CO"],"is_corresponding":false,"raw_author_name":"Camilo Gomez","raw_affiliation_strings":["Dept. Of Industrial Engineering, Universidad de los Andes, Colombia"],"affiliations":[{"raw_affiliation_string":"Dept. Of Industrial Engineering, Universidad de los Andes, Colombia","institution_ids":["https://openalex.org/I162096671"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046390525","display_name":"Francesco Mariotti","orcid":"https://orcid.org/0000-0002-1776-9591"},"institutions":[{"id":"https://openalex.org/I4210152452","display_name":"Consorzio Interuniversitario Nazionale per l'Informatica","ror":"https://ror.org/03v8v5y65","country_code":"IT","type":"facility","lineage":["https://openalex.org/I4210152452"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Francesco Mariotti","raw_affiliation_strings":["Dipartimento di Matematica e Informatica \"U. Dini\", University of Firenze, Italy and Consorzio Interuniversitario Nazionale per l'Informatica (CINI), Italy"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Matematica e Informatica \"U. Dini\", University of Firenze, Italy and Consorzio Interuniversitario Nazionale per l'Informatica (CINI), Italy","institution_ids":["https://openalex.org/I4210152452"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076688244","display_name":"Leonardo Montecchi","orcid":"https://orcid.org/0000-0002-7603-9695"},"institutions":[{"id":"https://openalex.org/I204778367","display_name":"Norwegian University of Science and Technology","ror":"https://ror.org/05xg72x27","country_code":"NO","type":"education","lineage":["https://openalex.org/I204778367"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Leonardo Montecchi","raw_affiliation_strings":["Department of Computer Science, Norwegian University of Science and Technology, Norway"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Norwegian University of Science and Technology, Norway","institution_ids":["https://openalex.org/I204778367"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089287870","display_name":"Paolo Lollini","orcid":"https://orcid.org/0000-0002-2364-2538"},"institutions":[{"id":"https://openalex.org/I4210152452","display_name":"Consorzio Interuniversitario Nazionale per l'Informatica","ror":"https://ror.org/03v8v5y65","country_code":"IT","type":"facility","lineage":["https://openalex.org/I4210152452"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Paolo Lollini","raw_affiliation_strings":["Dipartimento di Matematica e Informatica \"U. Dini\", University of Firenze, Italy and Consorzio Interuniversitario Nazionale per l'Informatica (CINI, Italy"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Matematica e Informatica \"U. Dini\", University of Firenze, Italy and Consorzio Interuniversitario Nazionale per l'Informatica (CINI, Italy","institution_ids":["https://openalex.org/I4210152452"]}]}],"institution_assertions":[],"countries_distinct_count":4,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.346,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":2,"citation_normalized_percentile":{"value":0.541206,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":70,"max":76},"biblio":{"volume":null,"issue":null,"first_page":"117","last_page":"124"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9915,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9809,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.6535278},{"id":"https://openalex.org/keywords/heuristics","display_name":"Heuristics","score":0.44416},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.44186234}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7525983},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.6535278},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6012376},{"id":"https://openalex.org/C106189395","wikidata":"https://www.wikidata.org/wiki/Q176789","display_name":"Markov decision process","level":3,"score":0.57975894},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.5710846},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.4904668},{"id":"https://openalex.org/C127705205","wikidata":"https://www.wikidata.org/wiki/Q5748245","display_name":"Heuristics","level":2,"score":0.44416},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.44186234},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.42226824},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3977321},{"id":"https://openalex.org/C159886148","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov process","level":2,"score":0.36743408},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2637018},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3569902.3570188","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://dl.acm.org/doi/abs/10.1145/3569902.3570188","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3569902.3570188","source":{"id":"https://openalex.org/S4306402033","display_name":"Florence Research (University of Florence)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I45084792","host_organization_name":"University of Florence","host_organization_lineage":["https://openalex.org/I45084792"],"host_organization_lineage_names":["University of Florence"],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":true,"landing_page_url":"https://hdl.handle.net/2158/1308193","pdf_url":"https://flore.unifi.it/bitstream/2158/1308193/5/Modeling%20attacker%20behavior%20in%20Cyber-Physical-Systems.pdf","source":{"id":"https://openalex.org/S4306402033","display_name":"Florence Research (University of Florence)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I45084792","host_organization_name":"University of Florence","host_organization_lineage":["https://openalex.org/I45084792"],"host_organization_lineage_names":["University of Florence"],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://dl.acm.org/doi/abs/10.1145/3569902.3570188","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3569902.3570188","source":{"id":"https://openalex.org/S4306402033","display_name":"Florence Research (University of Florence)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I45084792","host_organization_name":"University of Florence","host_organization_lineage":["https://openalex.org/I45084792"],"host_organization_lineage_names":["University of Florence"],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions","score":0.8}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":5,"referenced_works":["https://openalex.org/W1763073788","https://openalex.org/W2404932809","https://openalex.org/W2524056220","https://openalex.org/W4224232484","https://openalex.org/W4312559172"],"related_works":["https://openalex.org/W4255368532","https://openalex.org/W4252555497","https://openalex.org/W3143197806","https://openalex.org/W3121175838","https://openalex.org/W3110253113","https://openalex.org/W2898614832","https://openalex.org/W2803684864","https://openalex.org/W2280422768","https://openalex.org/W2162286586","https://openalex.org/W187740018"],"abstract_inverted_index":{"Societies":[0],"are":[1,10],"increasingly":[2],"dependent":[3],"on":[4,18,31,96,104,132],"Cyber":[5],"Physical":[6],"Systems":[7],"(CPSs),":[8],"which":[9,148,181],"exposed":[11],"to":[12,39,44,56,66,70,100,112,118,150,159,172],"natural":[13],"and":[14,25,121,170,178],"human-made":[15],"attacks.":[16,161],"Attacks":[17],"CPSs":[19],"can":[20],"result":[21],"in":[22,138,167],"security":[23],"breaches":[24],"behaviors":[26],"that":[27,54,116,155],"may":[28],"impose":[29],"harm":[30],"their":[32,107],"environments.":[33],"Understanding":[34],"attack":[35,102,153],"mechanisms":[36],"is":[37,127,182],"crucial":[38],"preventing":[40],"losses":[41],"or":[42,47,82],"damage":[43],"people,":[45],"assets":[46],"information.":[48],"We":[49,94],"develop":[50],"a":[51,61,133,145],"computational":[52],"environment":[53,115,126],"allows":[55,117,149,165,171],"implement":[57],"attacker":[58,120,177],"agents":[59],"under":[60],"stochastic":[62,83],"optimization":[63],"framework,":[64],"allowing":[65],"use":[67],"different":[68],"techniques":[69],"model":[71],"attacking":[72],"behavior":[73],"(i.e.,":[74],"policies),":[75],"including":[76],"approximate":[77],"dynamic":[78],"programming,":[79,84],"reinforcement":[80],"learning,":[81],"as":[85,87,184],"well":[86],"arbitrary":[88],"policies":[89],"(e.g.,":[90],"rules":[91],"of":[92,188],"thumb).":[93],"rely":[95],"the":[97,139,152,185],"ADVISE":[98],"formalism":[99],"represent":[101],"paths":[103],"CPSs,":[105],"leveraging":[106],"Markov":[108],"Decision":[109],"Process":[110],"structure":[111],"build":[113],"an":[114],"test":[119],"defender":[122,179],"policies.":[123],"The":[124,162],"proposed":[125,163],"tested":[128],"by":[129],"simulating":[130],"attacks":[131],"SCADA":[134],"system":[135],"previously":[136],"addressed":[137],"literature,":[140],"demonstrating":[141],"satisfactory":[142],"convergence":[143],"for":[144],"Q-learning":[146],"algorithm,":[147],"identify":[151],"steps":[154],"most":[156],"frequently":[157],"lead":[158],"successful":[160],"approach":[164],"flexibility":[166],"modeling":[168],"attackers,":[169],"conceive":[173],"models":[174],"with":[175],"interacting":[176],"agents,":[180],"left":[183],"main":[186],"goal":[187],"future":[189],"work.":[190]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4320058201","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-01-16T23:24:46.830128","created_date":"2023-02-12"}