{"id":"https://openalex.org/W2768184276","doi":"https://doi.org/10.1007/978-3-319-71075-4_21","title":"A Security Perspective on Publication Metrics","display_name":"A Security Perspective on Publication Metrics","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2768184276","doi":"https://doi.org/10.1007/978-3-319-71075-4_21","mag":"2768184276"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-71075-4_21","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-71075-4_21","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://orbilu.uni.lu/handle/10993/33830","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090429213","display_name":"Hugo Jonker","orcid":"https://orcid.org/0000-0002-7958-8921"},"institutions":[{"id":"https://openalex.org/I7876267","display_name":"Open University of the Netherlands","ror":"https://ror.org/018dfmf50","country_code":"NL","type":"education","lineage":["https://openalex.org/I7876267"]},{"id":"https://openalex.org/I145872427","display_name":"Radboud University Nijmegen","ror":"https://ror.org/016xsfp80","country_code":"NL","type":"education","lineage":["https://openalex.org/I145872427"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Hugo Jonker","raw_affiliation_strings":["Digital Security Group, Sciences, Radboud University, Nijmegen, Netherlands","School of Computer Science, Open University of the Netherlands, Heerlen, Netherlands"],"affiliations":[{"raw_affiliation_string":"Digital Security Group, Sciences, Radboud University, Nijmegen, Netherlands","institution_ids":["https://openalex.org/I145872427"]},{"raw_affiliation_string":"School of Computer Science, Open University of the Netherlands, Heerlen, Netherlands","institution_ids":["https://openalex.org/I7876267"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024602195","display_name":"Sjouke Mauw","orcid":"https://orcid.org/0000-0002-2818-4433"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Sjouke Mauw","raw_affiliation_strings":["CSC/SnT, University of Luxembourg, Luxembourg, Luxembourg"],"affiliations":[{"raw_affiliation_string":"CSC/SnT, University of Luxembourg, Luxembourg, Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5090429213"],"corresponding_institution_ids":["https://openalex.org/I145872427","https://openalex.org/I7876267"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20621762,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"186","last_page":"200"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10102","display_name":"scientometrics and bibliometrics research","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1804","display_name":"Statistics, Probability and Uncertainty"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10102","display_name":"scientometrics and bibliometrics research","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1804","display_name":"Statistics, Probability and Uncertainty"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.9423999786376953,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.9409999847412109,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.801531195640564},{"id":"https://openalex.org/keywords/measure","display_name":"Measure (data warehouse)","score":0.7718584537506104},{"id":"https://openalex.org/keywords/incentive","display_name":"Incentive","score":0.7605891823768616},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.760362982749939},{"id":"https://openalex.org/keywords/value","display_name":"Value (mathematics)","score":0.5317881107330322},{"id":"https://openalex.org/keywords/index","display_name":"Index (typography)","score":0.5314309597015381},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.405994176864624},{"id":"https://openalex.org/keywords/operations-research","display_name":"Operations research","score":0.34020301699638367},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3301665782928467},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.24524492025375366},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.13367927074432373},{"id":"https://openalex.org/keywords/microeconomics","display_name":"Microeconomics","score":0.11172148585319519},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.10712647438049316},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.10153937339782715},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09498727321624756},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08108082413673401},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.05054795742034912}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.801531195640564},{"id":"https://openalex.org/C2780009758","wikidata":"https://www.wikidata.org/wiki/Q6804172","display_name":"Measure (data warehouse)","level":2,"score":0.7718584537506104},{"id":"https://openalex.org/C29122968","wikidata":"https://www.wikidata.org/wiki/Q1414816","display_name":"Incentive","level":2,"score":0.7605891823768616},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.760362982749939},{"id":"https://openalex.org/C2776291640","wikidata":"https://www.wikidata.org/wiki/Q2912517","display_name":"Value (mathematics)","level":2,"score":0.5317881107330322},{"id":"https://openalex.org/C2777382242","wikidata":"https://www.wikidata.org/wiki/Q6017816","display_name":"Index (typography)","level":2,"score":0.5314309597015381},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.405994176864624},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.34020301699638367},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3301665782928467},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.24524492025375366},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.13367927074432373},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.11172148585319519},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.10712647438049316},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.10153937339782715},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09498727321624756},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08108082413673401},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.05054795742034912}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1007/978-3-319-71075-4_21","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-71075-4_21","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:research.ou.nl:publications/0b026f8b-8bad-4a3b-9724-5cfcad5d0c10","is_oa":false,"landing_page_url":"https://research.ou.nl/en/publications/0b026f8b-8bad-4a3b-9724-5cfcad5d0c10","pdf_url":null,"source":{"id":"https://openalex.org/S4406922485","display_name":"Open University of the Netherlands Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Jonker, H & Mauw, S 2017, A Security Perspective on Publication Metrics. in F Stajano, J Anderson, B Christianson & V Maty\u00e1\u0161 (eds), Security Protocols XXV : 25th International Workshop, Cambridge, UK, March 20\u201322, 2017, Revised Selected Papers. Springer International Publishing AG, Cham, Security and Cryptology (LNCS subseries), vol. 10476, Lecture Notes in Computer Science, no. 10476, pp. 186-200. https://doi.org/10.1007/978-3-319-71075-4_21","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:orbilu.uni.lu:10993/33830","is_oa":true,"landing_page_url":"https://orbilu.uni.lu/handle/10993/33830","pdf_url":null,"source":{"id":"https://openalex.org/S4306401815","display_name":"Open Repository and Bibliography (University of Luxembourg)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I186903577","host_organization_name":"University of Luxembourg","host_organization_lineage":["https://openalex.org/I186903577"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Proc. 25th Security Protocols Workshop, 186-200 (2017); 25th Security Protocols Workshop, Cambridge, United Kingdom [GB], March 20-22 2017","raw_type":"peer reviewed"},{"id":"pmh:oai:repository.ubn.ru.nl:2066/180414","is_oa":false,"landing_page_url":"http://hdl.handle.net/2066/180414","pdf_url":null,"source":{"id":"https://openalex.org/S4306401067","display_name":"Radboud Repository (Radboud University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I145872427","host_organization_name":"Radboud University Nijmegen","host_organization_lineage":["https://openalex.org/I145872427"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Stajano, F. (ed.), Security Protocols XXV: 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers, pp. 186-200","raw_type":"Article in monograph or in proceedings"}],"best_oa_location":{"id":"pmh:oai:orbilu.uni.lu:10993/33830","is_oa":true,"landing_page_url":"https://orbilu.uni.lu/handle/10993/33830","pdf_url":null,"source":{"id":"https://openalex.org/S4306401815","display_name":"Open Repository and Bibliography (University of Luxembourg)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I186903577","host_organization_name":"University of Luxembourg","host_organization_lineage":["https://openalex.org/I186903577"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Proc. 25th Security Protocols Workshop, 186-200 (2017); 25th Security Protocols Workshop, Cambridge, United Kingdom [GB], March 20-22 2017","raw_type":"peer reviewed"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1767470961","https://openalex.org/W2005706022","https://openalex.org/W2030191465","https://openalex.org/W2057721084","https://openalex.org/W2059440729","https://openalex.org/W2060346815","https://openalex.org/W2071378251","https://openalex.org/W2093708032","https://openalex.org/W2098104370","https://openalex.org/W2128186353","https://openalex.org/W2128438887","https://openalex.org/W2130247873","https://openalex.org/W2169089330","https://openalex.org/W2523971623","https://openalex.org/W2587248788","https://openalex.org/W4237494090"],"related_works":["https://openalex.org/W1589252962","https://openalex.org/W2367468089","https://openalex.org/W2098133976","https://openalex.org/W2358591856","https://openalex.org/W1975467175","https://openalex.org/W2347416728","https://openalex.org/W4255837520","https://openalex.org/W2149537132","https://openalex.org/W2215702767","https://openalex.org/W4317371977"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
