{"id":"https://openalex.org/W1517445255","doi":"https://doi.org/10.1002/9780470050118.ecse268","title":"Network Security Fundamentals","display_name":"Network Security Fundamentals","publication_year":2007,"publication_date":"2007-12-06","ids":{"openalex":"https://openalex.org/W1517445255","doi":"https://doi.org/10.1002/9780470050118.ecse268","mag":"1517445255"},"language":"en","primary_location":{"id":"doi:10.1002/9780470050118.ecse268","is_oa":false,"landing_page_url":"https://doi.org/10.1002/9780470050118.ecse268","pdf_url":null,"source":{"id":"https://openalex.org/S4306534807","display_name":"Wiley Encyclopedia of Computer Science and Engineering","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wiley Encyclopedia of Computer Science and Engineering","raw_type":"other"},"type":"other","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013340723","display_name":"Steven Graham","orcid":null},"institutions":[{"id":"https://openalex.org/I125467818","display_name":"Dakota State University","ror":"https://ror.org/016yv6y68","country_code":"US","type":"education","lineage":["https://openalex.org/I125467818"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Steven Graham","raw_affiliation_strings":["Dakota State University, Madison, South Dakota"],"affiliations":[{"raw_affiliation_string":"Dakota State University, Madison, South Dakota","institution_ids":["https://openalex.org/I125467818"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063375840","display_name":"Xinwen Fu","orcid":"https://orcid.org/0000-0003-2391-7789"},"institutions":[{"id":"https://openalex.org/I125467818","display_name":"Dakota State University","ror":"https://ror.org/016yv6y68","country_code":"US","type":"education","lineage":["https://openalex.org/I125467818"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xinwen Fu","raw_affiliation_strings":["Dakota State University, Madison, South Dakota"],"affiliations":[{"raw_affiliation_string":"Dakota State University, Madison, South Dakota","institution_ids":["https://openalex.org/I125467818"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054805083","display_name":"Bin Lu","orcid":"https://orcid.org/0000-0002-8650-444X"},"institutions":[{"id":"https://openalex.org/I161171246","display_name":"West Chester University","ror":"https://ror.org/0053n5071","country_code":"US","type":"education","lineage":["https://openalex.org/I161171246"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bin Lu","raw_affiliation_strings":["West Chester University of Pennsylvania, West Chester, Pennsylvania"],"affiliations":[{"raw_affiliation_string":"West Chester University of Pennsylvania, West Chester, Pennsylvania","institution_ids":["https://openalex.org/I161171246"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5013340723"],"corresponding_institution_ids":["https://openalex.org/I125467818"],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.8420000076293945,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.8420000076293945,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7944804430007935},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7302711009979248},{"id":"https://openalex.org/keywords/kerberos","display_name":"Kerberos","score":0.5111609101295471},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4569355547428131},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.4529711604118347},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4521234333515167},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.3646332621574402},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.34953752160072327}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7944804430007935},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7302711009979248},{"id":"https://openalex.org/C32455479","wikidata":"https://www.wikidata.org/wiki/Q506053","display_name":"Kerberos","level":3,"score":0.5111609101295471},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4569355547428131},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.4529711604118347},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4521234333515167},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.3646332621574402},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.34953752160072327}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/9780470050118.ecse268","is_oa":false,"landing_page_url":"https://doi.org/10.1002/9780470050118.ecse268","pdf_url":null,"source":{"id":"https://openalex.org/S4306534807","display_name":"Wiley Encyclopedia of Computer Science and Engineering","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wiley Encyclopedia of Computer Science and Engineering","raw_type":"other"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.8299999833106995}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W17033065","https://openalex.org/W1490509368","https://openalex.org/W1493144261","https://openalex.org/W1543344803","https://openalex.org/W1566733061","https://openalex.org/W1639305476","https://openalex.org/W1862271745","https://openalex.org/W1967949770","https://openalex.org/W2143642500","https://openalex.org/W2268194428","https://openalex.org/W2281921305","https://openalex.org/W2966841456","https://openalex.org/W4210921465","https://openalex.org/W4298921906","https://openalex.org/W4300591638"],"related_works":["https://openalex.org/W4383744984","https://openalex.org/W3097731564","https://openalex.org/W2111669528","https://openalex.org/W2026027869","https://openalex.org/W2555884170","https://openalex.org/W2891168291","https://openalex.org/W3178820540","https://openalex.org/W3093519219","https://openalex.org/W2567442985","https://openalex.org/W3104824074"],"abstract_inverted_index":{"Abstract":[0],"Communication":[1],"is":[2,14],"at":[3,11],"the":[4,29,32,39,48,68,77,92,103,119,138,153,178,184],"heart":[5],"of":[6,31,56,76,94,160,170,177,181,211],"computer":[7],"systems.":[8],"Information":[9],"stored":[10],"one":[12,75],"location":[13],"moved":[15],"to":[16,27,53,172,201],"another":[17],"location,":[18],"combined":[19],"with":[20],"data":[21,49],"from":[22],"other":[23],"sources,":[24],"and":[25,50,83,116,134,150,166,192,199,218],"processed":[26],"meet":[28],"needs":[30],"users.":[33],"Rarely":[34],"can":[35],"user":[36],"commands":[37],"or":[38,65],"information":[40],"they":[41],"access":[42],"avoid":[43],"traversing":[44],"networks,":[45],"which":[46],"leakes":[47],"systems":[51,191],"vulnerable":[52],"a":[54,158,174,208],"variety":[55,159],"attacks.":[57,204],"A":[58],"malicious":[59],"intruder":[60],"might":[61],"intercept,":[62],"falsify,":[63],"damage,":[64],"altogether":[66],"prevent":[67],"networked":[69],"communications.":[70],"Network":[71],"security":[72,109,144,190,214],"has":[73],"become":[74],"more":[78],"critical":[79],"issues":[80],"challenging":[81],"businesses":[82],"our":[84],"daily":[85],"life.":[86],"In":[87,102,118,137,152,183],"this":[88],"chapter,":[89],"we":[90,106,122,141,156,187,206],"introduce":[91,107,142,188],"fundamentals":[93],"network":[95,213],"security.":[96],"The":[97],"chapter":[98],"comprises":[99],"six":[100],"sections.":[101],"first":[104],"section,":[105,121,140,155,186],"basic":[108,124,143],"concepts":[110],"such":[111,126,146,162,194,215],"as":[112,127,147,163,195,216],"CIA":[113],"(confidentiality,":[114],"integrity,":[115],"availability).":[117],"second":[120],"discuss":[123,157],"cryptography,":[125,130,133],"secret":[128],"key":[129,132,148],"public":[131],"hash":[135],"functions.":[136],"third":[139],"services":[145],"management":[149],"authentication.":[151],"fourth":[154],"attacks":[161],"sniffing,":[164],"spoofing,":[165],"DDoS":[167],"(Distributed":[168],"Denial":[169],"Service)":[171],"give":[173,207],"big":[175],"picture":[176],"cruel":[179],"world":[180],"cyberspace.":[182],"fifth":[185],"some":[189],"protocols":[193],"Kerberos,":[196],"IPSec,":[197],"Firewall,":[198],"VPN":[200],"combat":[202],"those":[203],"Finally,":[205],"brief":[209],"overview":[210],"wireless":[212],"WEP":[217],"WPA.":[219]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
