{"version.version":"0.0.7","version.cm_url":"https://github.com/ceurws/ceur-spt","spt.html_url":"/Vol-4143/paper-03.html","spt.description":null,"spt.id":"Vol-4143/paper-03","spt.wikidataid":null,"spt.title":"Simulating Online Behaviours and Threat Patterns for Training against Influence\n                  Operations","spt.pdfUrl":"https://ceur-ws.org/Vol-4143/paper-03.pdf","spt.volume":{"number":4143,"acronym":"C&ESAR 2025","wikidataid":null,"title":"Proceedings of the 32nd Computer & Electronics Security Application Rendezvous (C&ESAR 2025)","description":null,"url":null,"date":"2025-12-22","dblp":null,"k10plus":null,"urn":null},"spt.session":null,"cvb.id":"Vol-4143/paper-03","cvb.title":"Simulating Online Behaviours and Threat Patterns for Training against Influence\n                  Operations","cvb.type":null,"cvb.position":null,"cvb.pagesFrom":null,"cvb.pagesTo":null,"cvb.authors":"Ulysse OLIVERI,Alexandre DEY,Guillaume GADEK","cvb.vol_number":"4143","cvb.pdf_name":"paper-03.pdf","cvb.pages":"43-58","cvb.fail":null}