{"id":"https://openalex.org/W1432756459","doi":"https://doi.org/10.1007/978-3-642-31909-9_11","title":"SA3: Automatic Semantic Aware Attribution Analysis of Remote Exploits","display_name":"SA3: Automatic Semantic Aware Attribution Analysis of Remote Exploits","publication_year":2012,"publication_date":"2012-01-01","ids":{"openalex":"https://openalex.org/W1432756459","doi":"https://doi.org/10.1007/978-3-642-31909-9_11","mag":"1432756459"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-31909-9_11","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-31909-9_11","pdf_url":null,"source":{"id":"https://openalex.org/S4393917809","display_name":"Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","issn_l":"1867-8211","issn":["1867-8211","1867-822X"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046957909","display_name":"Deguang Kong","orcid":"https://orcid.org/0000-0001-9415-8439"},"institutions":[{"id":"https://openalex.org/I189196454","display_name":"The University of Texas at Arlington","ror":"https://ror.org/019kgqr73","country_code":"US","type":"education","lineage":["https://openalex.org/I189196454"]},{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Deguang Kong","raw_affiliation_strings":["College of Information Sciences and Technology, Pennsylvania State University, University Park, PA, 16802, USA","Dept. of Computer Science and Engineering, University of Texas at Arlington, TX, 76013, USA","Pennsylvania State University","University of Texas at Arlington"],"affiliations":[{"raw_affiliation_string":"College of Information Sciences and Technology, Pennsylvania State University, University Park, PA, 16802, USA","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"Dept. of Computer Science and Engineering, University of Texas at Arlington, TX, 76013, USA","institution_ids":["https://openalex.org/I189196454"]},{"raw_affiliation_string":"Pennsylvania State University","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"University of Texas at Arlington","institution_ids":["https://openalex.org/I189196454"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059751912","display_name":"Donghai Tian","orcid":"https://orcid.org/0000-0003-2217-4514"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Donghai Tian","raw_affiliation_strings":["College of Information Sciences and Technology, Pennsylvania State University, University Park, PA, 16802, USA","Pennsylvania State Univ#TAB#"],"affiliations":[{"raw_affiliation_string":"College of Information Sciences and Technology, Pennsylvania State University, University Park, PA, 16802, USA","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"Pennsylvania State Univ#TAB#","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100346828","display_name":"Peng Liu","orcid":"https://orcid.org/0000-0002-5091-8464"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Peng Liu","raw_affiliation_strings":["College of Information Sciences and Technology, Pennsylvania State University, University Park, PA, 16802, USA","Pennsylvania State Univ#TAB#"],"affiliations":[{"raw_affiliation_string":"College of Information Sciences and Technology, Pennsylvania State University, University Park, PA, 16802, USA","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"Pennsylvania State Univ#TAB#","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008435786","display_name":"Dinghao Wu","orcid":"https://orcid.org/0000-0002-0741-5511"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dinghao Wu","raw_affiliation_strings":["College of Information Sciences and Technology, Pennsylvania State University, University Park, PA, 16802, USA","Pennsylvania State Univ#TAB#"],"affiliations":[{"raw_affiliation_string":"College of Information Sciences and Technology, Pennsylvania State University, University Park, PA, 16802, USA","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"Pennsylvania State Univ#TAB#","institution_ids":["https://openalex.org/I130769515"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5046957909"],"corresponding_institution_ids":["https://openalex.org/I130769515","https://openalex.org/I189196454"],"apc_list":null,"apc_paid":null,"fwci":2.9748,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.92300513,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"190","last_page":"208"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.9605027437210083},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8252874612808228},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5123773813247681},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.456726610660553},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.36697402596473694},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.36044245958328247},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12703529000282288},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1220579445362091}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.9605027437210083},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8252874612808228},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5123773813247681},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.456726610660553},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.36697402596473694},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.36044245958328247},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12703529000282288},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1220579445362091}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-642-31909-9_11","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-31909-9_11","pdf_url":null,"source":{"id":"https://openalex.org/S4393917809","display_name":"Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","issn_l":"1867-8211","issn":["1867-8211","1867-822X"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","raw_type":"book-chapter"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.370.8840","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.370.8840","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://faculty.ist.psu.edu/wu/papers/SA3-SecureComm2011.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6499999761581421,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W1532737054","https://openalex.org/W1551618785","https://openalex.org/W1562491895","https://openalex.org/W1567046609","https://openalex.org/W1567375724","https://openalex.org/W1580559113","https://openalex.org/W1591237315","https://openalex.org/W1594536929","https://openalex.org/W1987644478","https://openalex.org/W1994020507","https://openalex.org/W1995713768","https://openalex.org/W2033874249","https://openalex.org/W2034346354","https://openalex.org/W2049633694","https://openalex.org/W2068211976","https://openalex.org/W2099206289","https://openalex.org/W2101310246","https://openalex.org/W2102970979","https://openalex.org/W2120361464","https://openalex.org/W2137786570","https://openalex.org/W2147388619","https://openalex.org/W2153649523","https://openalex.org/W2157153057","https://openalex.org/W2157912940","https://openalex.org/W2167146581","https://openalex.org/W2167671111","https://openalex.org/W2171029115","https://openalex.org/W2186294736","https://openalex.org/W2293768274","https://openalex.org/W2798766386","https://openalex.org/W4225591807","https://openalex.org/W4237171445","https://openalex.org/W4238295473","https://openalex.org/W4242893235","https://openalex.org/W4254313632","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W1590307681","https://openalex.org/W2536018345","https://openalex.org/W4312814274","https://openalex.org/W4285370786","https://openalex.org/W2296488620","https://openalex.org/W2358353312","https://openalex.org/W2353836703"],"abstract_inverted_index":null,"counts_by_year":[{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
