{"id":"https://openalex.org/W1483838597","doi":"https://doi.org/10.1007/978-3-540-74573-0_8","title":"Network Security Improvement with Isolation Implementation Based on ISO-17799 Standard","display_name":"Network Security Improvement with Isolation Implementation Based on ISO-17799 Standard","publication_year":2007,"publication_date":"2007-01-01","ids":{"openalex":"https://openalex.org/W1483838597","doi":"https://doi.org/10.1007/978-3-540-74573-0_8","mag":"1483838597"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-540-74573-0_8","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-74573-0_8","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047976185","display_name":"Yeu\u2010Pong Lai","orcid":null},"institutions":[{"id":"https://openalex.org/I111149068","display_name":"National Defense University","ror":"https://ror.org/01nqk4x38","country_code":"US","type":"education","lineage":["https://openalex.org/I111149068"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yeu-Pong Lai","raw_affiliation_strings":["Department of Computer Science and Information Engineering, Chung Cheng Institute of Technology, National Defense University, Taoyuan, Taiwan, 33509, R.O.C","Department of Computer Science and Information Engineering, Chung Cheng Institute of Technology, National Defense University, Taoyuan, Taiwan, R.O.C.#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Engineering, Chung Cheng Institute of Technology, National Defense University, Taoyuan, Taiwan, 33509, R.O.C","institution_ids":[]},{"raw_affiliation_string":"Department of Computer Science and Information Engineering, Chung Cheng Institute of Technology, National Defense University, Taoyuan, Taiwan, R.O.C.#TAB#","institution_ids":["https://openalex.org/I111149068"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017297983","display_name":"Jui-Heng Tai","orcid":null},"institutions":[{"id":"https://openalex.org/I111149068","display_name":"National Defense University","ror":"https://ror.org/01nqk4x38","country_code":"US","type":"education","lineage":["https://openalex.org/I111149068"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jui-Heng Tai","raw_affiliation_strings":["Department of Computer Science and Information Engineering, Chung Cheng Institute of Technology, National Defense University, Taoyuan, Taiwan, 33509, R.O.C","Department of Computer Science and Information Engineering, Chung Cheng Institute of Technology, National Defense University, Taoyuan, Taiwan, R.O.C.#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Engineering, Chung Cheng Institute of Technology, National Defense University, Taoyuan, Taiwan, 33509, R.O.C","institution_ids":[]},{"raw_affiliation_string":"Department of Computer Science and Information Engineering, Chung Cheng Institute of Technology, National Defense University, Taoyuan, Taiwan, R.O.C.#TAB#","institution_ids":["https://openalex.org/I111149068"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5047976185"],"corresponding_institution_ids":["https://openalex.org/I111149068"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":1.3679,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.78448786,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"69","last_page":"78"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.98089998960495,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.98089998960495,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9789999723434448,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9786999821662903,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/isolation","display_name":"Isolation (microbiology)","score":0.8989273309707642},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7712948322296143},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.655337929725647},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5601774454116821},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.5590387582778931},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5452277660369873},{"id":"https://openalex.org/keywords/government","display_name":"Government (linguistics)","score":0.43129435181617737},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.11207309365272522}],"concepts":[{"id":"https://openalex.org/C2775941552","wikidata":"https://www.wikidata.org/wiki/Q25212305","display_name":"Isolation (microbiology)","level":2,"score":0.8989273309707642},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7712948322296143},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.655337929725647},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5601774454116821},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.5590387582778931},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5452277660369873},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.43129435181617737},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.11207309365272522},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C121955636","wikidata":"https://www.wikidata.org/wiki/Q4116214","display_name":"Accounting","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C89423630","wikidata":"https://www.wikidata.org/wiki/Q7193","display_name":"Microbiology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-540-74573-0_8","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-74573-0_8","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7200000286102295,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W2000728998","https://openalex.org/W2391971199","https://openalex.org/W2505768305"],"related_works":["https://openalex.org/W2404937507","https://openalex.org/W2030757640","https://openalex.org/W2373849942","https://openalex.org/W151161666","https://openalex.org/W2394779770","https://openalex.org/W2118407572","https://openalex.org/W2415102733","https://openalex.org/W2260291664","https://openalex.org/W2360464208","https://openalex.org/W2042209980"],"abstract_inverted_index":null,"counts_by_year":[{"year":2016,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
