<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>A. R. Neigel, V. L. Claypoole, G. E. Waldfogle, S. Acharya, G. M. Hancock, Holistic cyber hygiene
education: Accounting for the human factors, Comput. Secur.</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.1109/MSP.2004.58</article-id>
      <title-group>
        <article-title>CRASTE: Human Factors and Perception in Cybersecurity Education⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Vita Santa Barletta</string-name>
          <email>vita.barletta@uniba.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Danilo Caivano</string-name>
          <email>danilo.caivano@uniba.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Miriana Calvano</string-name>
          <email>miriana.calvano@uniba.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Antonio Curci</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Antonio Piccinno</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Bari Aldo Moro, Department of Computer Science</institution>
          ,
          <addr-line>Via Edoardo Orabona 4, Bari</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of Pisa, Department of Computer Science</institution>
          ,
          <addr-line>Largo B. Pontecorvo, 3 56127 Pisa</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2023</year>
      </pub-date>
      <volume>92</volume>
      <issue>2020</issue>
      <fpage>10</fpage>
      <lpage>13</lpage>
      <abstract>
        <p>Human interaction plays a key role in the achievement of cybersecurity goals. Addressing cyber threats necessitates an emphasis on human behavior and cognitive models, not merely relying on technical details, since individuals are the weakest link in the cybersecurity context. Thus, the design of cybersecurity-related training programs should be carried out accordingly to increase their efectiveness. The following research proposes a framework, called "CRASTE", which maps human factors and perception, the Red and Blue Team simulation and the Cyber Kill Chain to improve cybersecurity education with respect. The introduction of Artificial Intelligence (AI) in this process can foster the proper employment of the MITRE ATT&amp;CK, which is the most used knowledge base in cybersecurity, to present how the Large Language Models (LLMs) can support both Red and Blue Teams during attacks and their defense.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Cybersecurity</kwd>
        <kwd>Education</kwd>
        <kwd>Human Factors</kwd>
        <kwd>Perception</kwd>
        <kwd>Kill Chain</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Cybersecurity plays a crucial role in today’s era of technological innovation and the burgeoning digital
economy. Threat actors pose risks to individual safety in terms of the integrity of their intellectual
property by conducting attacks on several levels, such as illicit sales on the dark web or leveraging for
ransom demands [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. In the domain of cybersecurity, there are several frameworks that encompass
the phases, methodologies, and techniques of attacks that aim at providing a standardized approach to
facing attacks and solving issues. For example, the Cyber Kill Chain (CKC) gathers all the processes of
an attack, grouping them in 7 phases. A more technical approach, instead, is provided by the MITRE
ATT&amp;CK which is a globally-accessible knowledge base of adversary tactics and techniques based on
real-world observations [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Employing these frameworks, which will be explored below, supports
facing cyber threats with a holistic approach that goes beyond technical aspects, emphasizing human
behavior, cognitive models, and awareness [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>
        This implies that, in this field, human’s characteristics cover an important role since most of the
security challenges comes from their behaviours and skills. Thus, it is necessary to explore human
behavior when considering cyber threats to the mission, the mission-enabling infrastructure against
which attacks occur, the human defenders’ operational processes, and the roles that humans play in
cyberspace operations [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ].
      </p>
      <p>
        The integration of Artificial Intelligence (AI) in any field can boost productivity while providing
humans with enhanced skills and abilities thanks to the high computational power [
        <xref ref-type="bibr" rid="ref1 ref6">6, 1</xref>
        ]. In recent
years, Large Language Models (LLMs) have quickly and significantly spread, being used by millions of
individuals. The motivation behind this lies in the fact that they are particularly efective in humanizing
technology and addressing the mechanization of bottlenecks, implying an improvement of human
factors and perception in the interaction of humans with any kind of technology [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. These elements
become relevant in cybersecurity because it heavily relies on humans, their cognitive skills, and their
attitude toward reality. The goal of this research work is to investigate how to improve cybersecurity
education through an adequate design of the CKC that highlights human factors and perception.
Additionally, to understand how to further improve this process the integration of LLMs in the MITRE
ATT&amp;CK is also explored.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Background</title>
      <p>Cybersecurity is an intricate domain and it is influenced by multiple factors. In this section, background
concepts and additional context is provided concerning human-factors and perception, the Red and
Blue teams, and the CKC.</p>
      <sec id="sec-2-1">
        <title>2.1. Human Factors &amp; Perception</title>
        <p>
          The way that individuals interact with computers and make decisions is a dynamic and intricate issue,
encompassing numerous factors [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ]. Software solutions are not a one-size fits-all solutions because
individual diferences, personality traits, and cognitive abilities play pivotal roles in the requirements of
any systems; this aspect influences cybersecurity as well: biases and heuristics shape risk perception.
Both risk perception and individual diferences are also afected by the environment in which they
occur; thus, it is necessary to emphasize the critical role of human factors in cybersecurity training
[9]. Corradini and Nardelli, for example, stress the need for tailored training programs and digital
awareness interventions, respectively, to address the human element in cybersecurity [10, 11]. Neigel
et al. further underscore the importance of individual diferences, such as trust in technology and
intrinsic motivation, in shaping cyber hygiene knowledge and behavior [12]. Instead, Thackray et al.
suggest that integrating social psychology into cybersecurity education can enhance communication
and understanding of cyber risks [13]. These findings collectively highlight the need for a holistic
approach that considers the human element and the perception in cybersecurity education.
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Cyber Kill Chain (CKC)</title>
        <p>The CKC is one of the defense models designed to help companies and large organizations mitigate the
most advanced cyber-attacks. The goal is to compromise a particular asset that contains specific data
or valuable information [14, 15]. A characteristic to keep in mind of this attack is that the attacker’s
actions are performed over a considerable time.</p>
        <p>The phases of the Kill Chain improve visibility into an attack and enrich the analyst’s understanding
of the adversary’s tactics, techniques and procedures. It consists of 7 phases [16, 17]:
1. Reconnaissance: the goal of this phase is to collect information about the victim and to understand
which are the most appropriate actions to perform during the attack; This process is also called
"footprinting" since at the end it is possible to obtain a detailed "snapshot" of the target.
2. Weaponization: it is the preparation and staging phase which has the objective to define a
penetration plan utilizing the information gathered from the previous stage.
3. Delivery: it is the malware transmission and delivery phase. It is expected that the victim
downloads and/or executes malicious files or visits malicious web pages.
4. Exploitation: in this phase the vulnerability previously found are exploited by the attacker to
obtain access to the target system and conduct the attack.
5. Installation: in this phase the backdoor or any equivalent systems is installed on the victim’s
device to guarantee the attacker persistent access in time.
6. Command &amp; Control (C2): in this phase the victim is manipulated by the attacker through the
malicious code previously installed.
7. Actions on Objectives: in this phases the attacker execute the attack reaching their objective.</p>
        <p>Typically, the attackers aim to perform data exfiltration which involves collecting, encrypting
and extracting information from the victim environment.</p>
      </sec>
      <sec id="sec-2-3">
        <title>2.3. Red Team vs Blue Team Approach</title>
        <p>The cybersecurity field can be described referring to two diferent and opposite perspective: Red Team
and Blue Team which represent the attack and defence side respectively. The Blue Team is "the group
responsible for defending an enterprise’s use of information systems by maintaining its security posture
against a group of mock attackers" [18]; the Red Team is "a group of people authorized and organized
to emulate a potential adversary’s attack or exploitation capabilities against an enterprise’s security
posture" [19].</p>
        <p>This approach is employed from organizations to deeply understand how to face a cyber threat being
able to "think like an attacker"; it brings benefits in terms of risk assessment, detection, and evolution
of threats [20, 21].</p>
        <p>The success of the Blue Team vs. Red Team approach hinges on interaction and mutual feedback. The
primary goal is to refine an organization’s detection and response capabilities. Through this
collaboration, it is possible to increase awareness of attack techniques and bring to light the vulnerabilities
in the attacker’s defense infrastructure. It is important to highlight that when a Security Operations
Center (SOC) fails to detect an intrusion, it is not always due to operator preparation or technological
ineficiency. Instead, the attacker’s success may result from the inefectiveness of controls against
sophisticated, previously unknown techniques. Therefore, the actions of the Red Team are functional in
exposing these control deficiencies, preventing them from being exploited to cause real damage [ 22].
For this reason, a final report must be created to highlight the details concerning all the aspects related
to the attack (e.g. how the breach occurred, the timeline of the attack, the details of the vulnerabilities
that were exploited to gain access, the business impact to the company, etc.) [23].</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. CRASTE: Human Aspects in Cyber Kill Chain</title>
      <p>In this section, CRASTE is presented. It is a framework concerning the integration of human factors
and perception at various stages of the CKC. The goal is to understand how such human aspects can
improve training in cybersecurity and the Red/Blue simulation.</p>
      <p>Human Factors They refer to environmental, organisational and job factors, and human and individual
characteristics, which influence behaviour at work in a way which can afect health and safety [24]. This
concept includes three main aspects that must be considered:
• Job: the nature of the task, workload, the working environment, the design of displays and
controls, and the role of procedures (What people are being asked to do).
• Individual: this aspect includes his/her competence, skills, personality, attitude, and risk
perception. Individual characteristics influence behaviour in complex ways ( Who is doing it).
• Organization: the work patterns, the culture of the workplace, resources, communications,
leadership and so on (Where they are working).</p>
      <p>
        Perception It is a subjective process influenced by various factors which shape how individuals
interpret and comprehend their surroundings. These factors influence the selection, organization, and
interpretation of sensory information, resulting in diverse and unique perceptions among people. For
this reason, it is essential to design a learning and playful environment that integrates diferent aspects
of cybersecurity education; in this way individuals can be allowed to expand their knowledge beyond
technical aspects and consider human factor risks [
        <xref ref-type="bibr" rid="ref3">25, 3</xref>
        ].
      </p>
      <p>
        Table 1 presents the human factors and perceptions identified in the previous work [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] considering
which phase of the kill chain they afect and which perspective (i.e. Blue and/or Red Team). Each
element and its description is provided in Section 4 referring to a broader context, which is represented
by the MITRE ATT&amp;CK framework, along with the influence of LLMs in this context.
      </p>
    </sec>
    <sec id="sec-4">
      <title>4. LLMs role in the MITRE ATT&amp;cCK</title>
      <p>
        This section aims at gathering insights into the influence of AI in cybersecurity by considering the
MITRE ATT&amp;CK framework, human factors and perception. The diference between the MITRE
ATT&amp;CK and the CKC lies in the fact that the first is a knowledge base that encompasses all the
elements, tools, techniques, and procedures that belong to cyber-attacks [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]; the second instead, is
a more general framework that gathers all the processes that lead to a successful execution of an
attack. The MITRE ATT&amp;CK diverges from this sequential model, since it prioritizes aiding security
professionals in identifying and addressing individual adversary tactics and techniques as they manifest
in various contexts.
      </p>
      <p>The integration of AI can bring significant advantages because it can provide details, explanations, and
suggestions concerning aspects that humans might not detect by themselves. It can strongly influence
human factors and perception of users while being involved in an attack from both perspectives (i.e.,
Red and Blue Team). The correlation between the elements presented in Table 1 with the specific role
of LLMs is discussed below.
(E1) Social Engineering This element of the framework exploits human psychology to manipulate
individuals in order to make them perform actions that are in favor of the attacker. The integration of
LLMs in this component becomes crucial in the Reconnaissance phase, since it can allow humans to
receive easily-understandable information concerning the threat target and suggest a suitable delivery
method for the attacker based on their expertise; it influences their perception of the attack’s success
and their own abilities.</p>
      <p>Human factors are influenced in terms of individual skills, in fact, when a red team consists of
multiple individuals, they are all influenced by where the operation takes place and the tasks assigned
to others to carry out the attack.
(E2) User Awareness It refers to the perception of risks and humans’ understanding of safe practices.
In this case, for Weaponization, a LLM can suggests techniques for the attack design and tools. During
Installation, an AI agent can help in the implementation of a strong and long-lasting backdoor. Perception
is influenced by the success or failure of implementing these suggestions. Humans can utilize AI to
understand ongoing situations (both from blue and red team perspectives) - user awareness.
(E3) Usability and Security Trade-Ofs Lack of usability can lead to issues in the efective
communication between humans and any kind of system. This implies that users might attempt to find
workarounds to ignore security protocols or warnings that could prevent them from falling into dangers.
In this case, a LLM tool can suggest exploit and malware installation methods, leveraging usability and
security. It influences red team human factors in terms of skills and support for conducting an attack.
(E4) Organizational Culture This element encompasses the array of values, anticipations, and
behaviors that direct and shape the behavior of every team member. An organization that allows
the employment of LLMs when it comes to cybersecurity can allow individuals to improve their
understanding of dangerous situations, providing support in obtaining explanations regarding notions or
techniques. The blue team can improve its understanding reconnaissance, delivery, and action methods.
Organizational culture is considered because individuals within the blue team behave according to their
skills, workplace environment, and organizational influences.
(E5) Risk Assessment Being able to appropriately assess risks and threats implies possessing the
right judging skills in order to find the proper danger levels. The blue team, with the help of AI,
understands how attacks are executed to perform risk assessments. Perception is influenced in terms of
the ability to manage, confront, and evaluate situations.
(E6) Risk Detection It gathers the processes and actions to identify concealed threats inside a
network or system and responding to them. AI assists the blue team in risk detection to understand
how attacks are executed. It afects how the blue team interprets and evaluates the attack, consequently
afecting their ability to counter it. For example, an individual can ask a LLM model to interpret or
analyze an email in order to understand if it is phishing. The LLM can provide human-like explanations,
fully understandable even by non-experts.
(E7) Incident Response It refers to how individuals respond to security incidents and how to report
them. AI helps the red team understand how the blue team might counter the attack, and the blue
team in actually countering it. Human factors and perception are influenced. Human factors include
personal skills and their impact on their work and organization (from both perspectives); perception is
influenced by the success of the attack (red team) and the response skills (blue team). Perception in
terms of dificulty.
(E8) Response to Threat It refers to security threats and incidents that have actually happened.
Referring to the timing of the attack, AI can signal real-time attacks for the blue team. For the red team,
AI can monitor the attack’s progress and assess if their objectives are met. It influences the blue team’s
perception of how the attack is interpreted and the stress it causes, while the red team focuses on the
attack’s success and efects.
(E9) Compliance It ensures an organization’s security measures meet regulatory standards and
guidelines. These standards are designed to protect the integrity, confidentiality, and availability of
sensitive data from various cyber threats. With AI, the blue team can evaluate if security measures
comply with regulations. Thus, the blue team’s perception refers to how they perceive their security
measures based on whether the attack was successful or not.</p>
      <p>In conclusion, the employment of LLMs with the MITRE ATT&amp;CK can bring positive implications
on cybersecurity education. Through the explanations and indications provided by LLMs, individuals
are enabled to receive real-time and personalized feedback that can be adapted to specific threats and
dangerous situations. In this way, individuals can avoid feeling lost when facing cybersecurity risks,
especially in case of low levels of expertise.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion</title>
      <p>This paper analyzes how human factors and perception, integrated in the CKC, can support the activities
concerning the attack and defence perspective. This aspect is further investigated considering a broader
context concerning the MITRE ATT&amp;CK framework along with the impact that LLMs can have on
human’s behaviors and feelings. By integrating AI functionalities it is possible to improve the training
process of both perspective having, in some cases, a real-time feedback and suggestion. The CRASTE
framework maps the elements of human factors and perception at the various stages of the CKC to
improve cybersecurity training.</p>
      <p>Future work concerns the execution of experiments of this approach in university courses to compare
how the integration and analysis of these aspects can improve the knowledge about attacks (Red Team)
and defense (Blue Team). It is also intended to introduce gaming elements in the learning process
to increase student’s knowledge and skills by recreating red and blue team simulations through the
application of gamification and serious games.</p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgments</title>
      <p>This study has been partially supported by the following projects: SSA - “Secure Safe Apulia - Regional
Security Center” (Codice Progetto 6ESURE5) and SERICS - “Security and Rights In the CyberSpace
SERICS” (PE00000014) under the MUR National Recovery and Resilience Plan funded by the European
Union - NextGenerationEU. The research of Antonio Curci and Miriana Calvano is supported by the
co-funding of the European Union - Next Generation EU: NRRP Initiative, Mission 4, Component 2,
Investment 1.3 – Partnerships extended to universities, research centers, companies, and research D.D.
MUR n. 341 del 15.03.2022 – Next Generation EU (PE0000013 – “Future Artificial Intelligence Research –
FAIR” - CUP: H97G22000210007).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>V. S.</given-names>
            <surname>Barletta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Cassano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Pagano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Piccinno</surname>
          </string-name>
          ,
          <article-title>New perspectives for cyber security in software development: when end-user development meets artificial intelligence</article-title>
          ,
          <source>in: 2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>531</fpage>
          -
          <lpage>534</lpage>
          . doi:
          <volume>10</volume>
          .1109/3ICT56508.
          <year>2022</year>
          .
          <volume>9990622</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>T. M.</given-names>
            <surname>Corporation</surname>
          </string-name>
          , Mitreatt&amp;ck, https://attack.mitre.org/,
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>V. S.</given-names>
            <surname>Barletta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Calvano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Caruso</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Curci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Piccinno</surname>
          </string-name>
          ,
          <article-title>Serious games for cybersecurity: How to improve perception and human factors</article-title>
          ,
          <source>in: 2023 IEEE International Conference on Metrology for eXtended Reality, Artificial Intelligence and Neural Engineering (MetroXRAINE)</source>
          ,
          <year>2023</year>
          , pp.
          <fpage>1110</fpage>
          -
          <lpage>1115</lpage>
          . doi:
          <volume>10</volume>
          .1109/MetroXRAINE58569.
          <year>2023</year>
          .
          <volume>10405607</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>N. L.</given-names>
            <surname>Crabtree</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. A.</given-names>
            <surname>Orr</surname>
          </string-name>
          ,
          <article-title>Cyber red/blue and gamified military cyberspace operations, Lincoln Lab</article-title>
          . J.
          <volume>23</volume>
          (
          <year>2019</year>
          )
          <fpage>1</fpage>
          -
          <lpage>12</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>M.</given-names>
            <surname>Calvano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Caruso</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Curci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Piccinno</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Rossano</surname>
          </string-name>
          ,
          <string-name>
            <surname>A Rapid</surname>
          </string-name>
          <article-title>Review on Serious Games for Cybersecurity Education: Are “Serious" and Gaming Aspects Well Balanced?</article-title>
          ,
          <source>in: Proceedings of the 9th International Symposium on End-User Development (IS-EUD 2023)</source>
          , volume
          <volume>3408</volume>
          , CEUR Workshop Proceedings, Cagliari, Italy,
          <year>2023</year>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3408</volume>
          /short-s3-
          <fpage>05</fpage>
          .pdf.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>V. S.</given-names>
            <surname>Barletta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Cassano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Pagano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Piccinno</surname>
          </string-name>
          ,
          <article-title>A collaborative ai dataset creation for speech therapies</article-title>
          , volume
          <volume>3136</volume>
          ,
          <year>2022</year>
          , p.
          <fpage>81</fpage>
          -
          <lpage>85</lpage>
          . URL: https://www.scopus.com/inward/record.uri?eid=
          <fpage>2</fpage>
          -
          <lpage>s2</lpage>
          .
          <fpage>0</fpage>
          -
          <lpage>85130701005</lpage>
          &amp;partnerID=
          <volume>40</volume>
          &amp;
          <article-title>md5=e5349d9fedc09b849dc4fc1c8debf3be, cited by: 7.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>P.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <source>Large Language Models Humanize Technology</source>
          ,
          <year>2023</year>
          . URL: http://arxiv.org/abs/2305. 05576, arXiv:
          <fpage>2305</fpage>
          .05576 [cs].
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>V. S.</given-names>
            <surname>Barletta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Caruso</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. Di</given-names>
            <surname>Mascio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Piccinno</surname>
          </string-name>
          ,
          <article-title>Serious games for autism based on immersive virtual reality: A lens on methodological and technological challenges</article-title>
          , in: M.
          <string-name>
            <surname>Temperini</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Scarano</surname>
            , I. Marenzi,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Kravcik</surname>
            , E. Popescu,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Lanzilotti</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Gennari</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>De La Prieta</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Di</surname>
          </string-name>
          Mas-
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>