{"id":"https://openalex.org/W2769808110","doi":"https://doi.org/10.1007/978-3-319-71075-4_22","title":"A Security Perspective on Publication Metrics (Transcript of Discussion)","display_name":"A Security Perspective on Publication Metrics (Transcript of Discussion)","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2769808110","doi":"https://doi.org/10.1007/978-3-319-71075-4_22","mag":"2769808110"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-71075-4_22","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-71075-4_22","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090429213","display_name":"Hugo Jonker","orcid":"https://orcid.org/0000-0002-7958-8921"},"institutions":[{"id":"https://openalex.org/I7876267","display_name":"Open University of the Netherlands","ror":"https://ror.org/018dfmf50","country_code":"NL","type":"education","lineage":["https://openalex.org/I7876267"]},{"id":"https://openalex.org/I145872427","display_name":"Radboud University Nijmegen","ror":"https://ror.org/016xsfp80","country_code":"NL","type":"education","lineage":["https://openalex.org/I145872427"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Hugo Jonker","raw_affiliation_strings":["Department of Computer Science, Open University of the Netherlands, Heerlen, Netherlands","Digital Security Group, Radboud University, Nijmegen, Netherlands"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Open University of the Netherlands, Heerlen, Netherlands","institution_ids":["https://openalex.org/I7876267"]},{"raw_affiliation_string":"Digital Security Group, Radboud University, Nijmegen, Netherlands","institution_ids":["https://openalex.org/I145872427"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5090429213"],"corresponding_institution_ids":["https://openalex.org/I145872427","https://openalex.org/I7876267"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.16744861,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"201","last_page":"213"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13337","display_name":"Korean Peninsula Historical and Political Studies","score":0.38429999351501465,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T13337","display_name":"Korean Peninsula Historical and Political Studies","score":0.38429999351501465,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.7867343425750732},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7760460376739502},{"id":"https://openalex.org/keywords/presentation","display_name":"Presentation (obstetrics)","score":0.7267012596130371},{"id":"https://openalex.org/keywords/measure","display_name":"Measure (data warehouse)","score":0.6559481620788574},{"id":"https://openalex.org/keywords/gauge","display_name":"Gauge (firearms)","score":0.5638850927352905},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3231791853904724},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.19628643989562988},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.14942237734794617},{"id":"https://openalex.org/keywords/history","display_name":"History","score":0.08573335409164429}],"concepts":[{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.7867343425750732},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7760460376739502},{"id":"https://openalex.org/C2777601897","wikidata":"https://www.wikidata.org/wiki/Q3409113","display_name":"Presentation (obstetrics)","level":2,"score":0.7267012596130371},{"id":"https://openalex.org/C2780009758","wikidata":"https://www.wikidata.org/wiki/Q6804172","display_name":"Measure (data warehouse)","level":2,"score":0.6559481620788574},{"id":"https://openalex.org/C40976572","wikidata":"https://www.wikidata.org/wiki/Q2330873","display_name":"Gauge (firearms)","level":2,"score":0.5638850927352905},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3231791853904724},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.19628643989562988},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.14942237734794617},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.08573335409164429},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C126838900","wikidata":"https://www.wikidata.org/wiki/Q77604","display_name":"Radiology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1007/978-3-319-71075-4_22","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-71075-4_22","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:repository.ubn.ru.nl:2066/180425","is_oa":false,"landing_page_url":"http://hdl.handle.net/2066/180425","pdf_url":null,"source":{"id":"https://openalex.org/S4306401067","display_name":"Radboud Repository (Radboud University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I145872427","host_organization_name":"Radboud University Nijmegen","host_organization_lineage":["https://openalex.org/I145872427"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Stajano, F.; Anderson, J.; Christianson, B. (ed.), Security Protocols XXV: 25th International Workshop, Cambridge, UK, March 20\u201322, 2017, Revised Selected Papers, pp. 201-213","raw_type":"Article in monograph or in proceedings"},{"id":"pmh:oai:research.ou.nl:publications/7fedc058-e554-4a3d-9a99-ee862ea7081a","is_oa":false,"landing_page_url":"https://hdl.handle.net/1820/7fedc058-e554-4a3d-9a99-ee862ea7081a","pdf_url":null,"source":{"id":"https://openalex.org/S4406922485","display_name":"Open University of the Netherlands Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Jonker, H 2017, A Security Perspective on Publication Metrics (Transcript of Discussion). in F Stajano, J Anderson, B Christianson & V Maty\u00e1\u0161 (eds), Security Protocols XXV : 25th International Workshop, Cambridge, UK, March 20\u201322, 2017, Revised Selected Papers. Springer International Publishing AG, Cham, Lecture Notes in Computer Science, vol. 10476, Security and Cryptology (LNCS subseries), vol. 10476, pp. 201-213. https://doi.org/10.1007/978-3-319-71075-4_22","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:ou:oai:research.ou.nl:publications/7fedc058-e554-4a3d-9a99-ee862ea7081a","is_oa":false,"landing_page_url":"https://research.ou.nl/en/publications/7fedc058-e554-4a3d-9a99-ee862ea7081a","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security Protocols XXV: 25th International Workshop, Cambridge, UK, March 20\u201322, 2017, Revised Selected Papers, 201 - 213","raw_type":"info:eu-repo/semantics/conferencepaper"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6499999761581421}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4387426029","https://openalex.org/W4254162896","https://openalex.org/W1477999932","https://openalex.org/W4388792380","https://openalex.org/W4386731653","https://openalex.org/W2376001620","https://openalex.org/W2925303117","https://openalex.org/W4285219045","https://openalex.org/W3167529338","https://openalex.org/W2072343831"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
