{"id":"https://openalex.org/W2980659949","doi":"https://doi.org/10.1007/978-3-030-30796-7_13","title":"The SEPSES Knowledge Graph: An Integrated Resource for Cybersecurity","display_name":"The SEPSES Knowledge Graph: An Integrated Resource for Cybersecurity","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2980659949","doi":"https://doi.org/10.1007/978-3-030-30796-7_13","mag":"2980659949"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-30796-7_13","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-030-30796-7_13","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1007/978-3-030-30796-7_13","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079760641","display_name":"Elmar Kiesling","orcid":"https://orcid.org/0000-0002-7856-2113"},"institutions":[{"id":"https://openalex.org/I145847075","display_name":"TU Wien","ror":"https://ror.org/04d836q62","country_code":"AT","type":"education","lineage":["https://openalex.org/I145847075"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Elmar Kiesling","raw_affiliation_strings":["TU Wien, Favoritenstra\u00dfe 9-11, Vienna, Austria"],"raw_orcid":"https://orcid.org/0000-0002-7856-2113","affiliations":[{"raw_affiliation_string":"TU Wien, Favoritenstra\u00dfe 9-11, Vienna, Austria","institution_ids":["https://openalex.org/I145847075"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035676027","display_name":"Andreas Ekelhart","orcid":"https://orcid.org/0000-0003-3682-1364"},"institutions":[{"id":"https://openalex.org/I145847075","display_name":"TU Wien","ror":"https://ror.org/04d836q62","country_code":"AT","type":"education","lineage":["https://openalex.org/I145847075"]},{"id":"https://openalex.org/I4210167190","display_name":"SBA Research","ror":"https://ror.org/05nny6x17","country_code":"AT","type":"facility","lineage":["https://openalex.org/I4210167190"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Andreas Ekelhart","raw_affiliation_strings":["SBA Research, Favoritenstra\u00dfe 16, Vienna, Austria","TU Wien, Favoritenstra\u00dfe 9-11, Vienna, Austria"],"raw_orcid":"https://orcid.org/0000-0003-3682-1364","affiliations":[{"raw_affiliation_string":"SBA Research, Favoritenstra\u00dfe 16, Vienna, Austria","institution_ids":["https://openalex.org/I4210167190"]},{"raw_affiliation_string":"TU Wien, Favoritenstra\u00dfe 9-11, Vienna, Austria","institution_ids":["https://openalex.org/I145847075"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014665205","display_name":"Kabul Kurniawan","orcid":"https://orcid.org/0000-0002-5353-7376"},"institutions":[{"id":"https://openalex.org/I129774422","display_name":"University of Vienna","ror":"https://ror.org/03prydq77","country_code":"AT","type":"education","lineage":["https://openalex.org/I129774422"]},{"id":"https://openalex.org/I145847075","display_name":"TU Wien","ror":"https://ror.org/04d836q62","country_code":"AT","type":"education","lineage":["https://openalex.org/I145847075"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Kabul Kurniawan","raw_affiliation_strings":["TU Wien, Favoritenstra\u00dfe 9-11, Vienna, Austria","University of Vienna, W\u00e4hringerstra\u00dfe 29, Vienna, Austria"],"raw_orcid":"https://orcid.org/0000-0002-5353-7376","affiliations":[{"raw_affiliation_string":"TU Wien, Favoritenstra\u00dfe 9-11, Vienna, Austria","institution_ids":["https://openalex.org/I145847075"]},{"raw_affiliation_string":"University of Vienna, W\u00e4hringerstra\u00dfe 29, Vienna, Austria","institution_ids":["https://openalex.org/I129774422"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012198006","display_name":"Fajar J. Ekaputra","orcid":"https://orcid.org/0000-0003-4569-2496"},"institutions":[{"id":"https://openalex.org/I145847075","display_name":"TU Wien","ror":"https://ror.org/04d836q62","country_code":"AT","type":"education","lineage":["https://openalex.org/I145847075"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Fajar Ekaputra","raw_affiliation_strings":["CDL-SQI - TU Wien, Favoritenstra\u00dfe 9-11, Vienna, Austria","TU Wien, Favoritenstra\u00dfe 9-11, Vienna, Austria"],"raw_orcid":"https://orcid.org/0000-0003-4569-2496","affiliations":[{"raw_affiliation_string":"CDL-SQI - TU Wien, Favoritenstra\u00dfe 9-11, Vienna, Austria","institution_ids":["https://openalex.org/I145847075"]},{"raw_affiliation_string":"TU Wien, Favoritenstra\u00dfe 9-11, Vienna, Austria","institution_ids":["https://openalex.org/I145847075"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5079760641"],"corresponding_institution_ids":["https://openalex.org/I145847075"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":{"value":5000,"currency":"EUR","value_usd":5392},"fwci":16.3768,"has_fulltext":false,"cited_by_count":93,"citation_normalized_percentile":{"value":0.9965239,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"198","last_page":"214"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.98580002784729,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8401642441749573},{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.6569280624389648},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5219611525535583},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4847221374511719},{"id":"https://openalex.org/keywords/knowledge-graph","display_name":"Knowledge graph","score":0.46952763199806213},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.413796603679657},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.41347694396972656},{"id":"https://openalex.org/keywords/domain-knowledge","display_name":"Domain knowledge","score":0.4134329855442047},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.4038797616958618},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3954296112060547},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.2317546308040619},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.222889244556427},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.16630062460899353},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.16230598092079163}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8401642441749573},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.6569280624389648},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5219611525535583},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4847221374511719},{"id":"https://openalex.org/C2987255567","wikidata":"https://www.wikidata.org/wiki/Q33002955","display_name":"Knowledge graph","level":2,"score":0.46952763199806213},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.413796603679657},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.41347694396972656},{"id":"https://openalex.org/C207685749","wikidata":"https://www.wikidata.org/wiki/Q2088941","display_name":"Domain knowledge","level":2,"score":0.4134329855442047},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.4038797616958618},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3954296112060547},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.2317546308040619},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.222889244556427},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.16630062460899353},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.16230598092079163},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-030-30796-7_13","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-030-30796-7_13","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.1007/978-3-030-30796-7_13","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-030-30796-7_13","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W62218527","https://openalex.org/W67298675","https://openalex.org/W1983551905","https://openalex.org/W2012644581","https://openalex.org/W2030684361","https://openalex.org/W2073305212","https://openalex.org/W2104740883","https://openalex.org/W2121697735","https://openalex.org/W2138524462","https://openalex.org/W2152216561","https://openalex.org/W2186628146","https://openalex.org/W2402136125","https://openalex.org/W2407451098","https://openalex.org/W2487152776"],"related_works":["https://openalex.org/W1981780420","https://openalex.org/W2182707996","https://openalex.org/W45233828","https://openalex.org/W4292070284","https://openalex.org/W4312933959","https://openalex.org/W4386298164","https://openalex.org/W4229080059","https://openalex.org/W4286257253","https://openalex.org/W2916853871","https://openalex.org/W2798664319"],"abstract_inverted_index":{"Abstract":[0],"This":[1],"paper":[2],"introduces":[3],"an":[4,68,83],"evolving":[5],"cybersecurity":[6,81],"knowledge":[7,40,62,89],"graph":[8,90],"that":[9,86,101],"integrates":[10],"and":[11,19,53,58,66,96,114,122,150],"links":[12],"critical":[13],"information":[14,93,118],"on":[15],"real-world":[16],"vulnerabilities,":[17],"weaknesses":[18],"attack":[20],"patterns":[21],"from":[22,76],"various":[23],"publicly":[24],"available":[25,133],"sources.":[26],"Cybersecurity":[27],"constitutes":[28],"a":[29,37,61,97],"particularly":[30,42],"interesting":[31],"domain":[32],"for":[33],"the":[34,80,88,145],"development":[35],"of":[36,71,99,140,147],"domain-specific":[38],"public":[39],"graph,":[41,63],"due":[43],"to":[44,119,131],"its":[45],"highly":[46],"dynamic":[47],"landscape":[48],"characterized":[49],"by":[50,138],"time-critical,":[51],"dispersed,":[52],"heterogeneous":[54],"information.":[55],"To":[56],"build":[57],"continually":[59],"maintain":[60],"we":[64,136],"provide":[65,102],"describe":[67],"integrated":[69,103,115],"set":[70,98],"resources,":[72],"including":[73],"vocabularies":[74],"derived":[75],"well-established":[77],"standards":[78],"in":[79,144],"domain,":[82],"ETL":[84],"workflow":[85],"updates":[87],"as":[91,135],"new":[92],"becomes":[94],"available,":[95],"services":[100],"access":[104],"through":[105],"multiple":[106],"interfaces.":[107],"The":[108],"resulting":[109],"semantic":[110],"resource":[111],"offers":[112],"comprehensive":[113],"up-to-date":[116],"instance":[117],"security":[120],"researchers":[121],"professionals":[123],"alike.":[124],"Furthermore,":[125],"it":[126],"can":[127],"be":[128],"easily":[129],"linked":[130],"locally":[132],"information,":[134],"demonstrate":[137],"means":[139],"two":[141],"use":[142],"cases":[143],"context":[146],"vulnerability":[148],"assessment":[149],"intrusion":[151],"detection.":[152]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":13},{"year":2024,"cited_by_count":23},{"year":2023,"cited_by_count":18},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":16},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
