{"id":"https://openalex.org/W2912359980","doi":"https://doi.org/10.1007/978-981-13-5826-5_1","title":"A Graph-Based Decision Support Model for Vulnerability Analysis in IoT Networks","display_name":"A Graph-Based Decision Support Model for Vulnerability Analysis in IoT Networks","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2912359980","doi":"https://doi.org/10.1007/978-981-13-5826-5_1","mag":"2912359980"},"language":"en","primary_location":{"id":"doi:10.1007/978-981-13-5826-5_1","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-13-5826-5_1","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020528398","display_name":"Gemini George","orcid":"https://orcid.org/0000-0001-5367-9588"},"institutions":[{"id":"https://openalex.org/I68695296","display_name":"Indian Institute of Information Technology and Management, Kerala","ror":"https://ror.org/02w9cdh50","country_code":"IN","type":"education","lineage":["https://openalex.org/I68695296"]},{"id":"https://openalex.org/I20497027","display_name":"Cochin University of Science and Technology","ror":"https://ror.org/00a4kqq17","country_code":"IN","type":"education","lineage":["https://openalex.org/I20497027"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Gemini George","raw_affiliation_strings":["Center for Research and Innovation in Cyber Threat Resilience, Indian Institute of Information Technology and Management-Kerala, Thiruvananthapuram, Kerala, India","Cochin University of Science and Tecnology, Kochi, Kerala, India","Cochin University of Science and Tecnology, Kochi, India","Center for Research and Innovation in Cyber Threat Resilience, Indian Institute of Information Technology and Management-Kerala, Thiruvananthapuram, India"],"affiliations":[{"raw_affiliation_string":"Center for Research and Innovation in Cyber Threat Resilience, Indian Institute of Information Technology and Management-Kerala, Thiruvananthapuram, Kerala, India","institution_ids":["https://openalex.org/I68695296"]},{"raw_affiliation_string":"Cochin University of Science and Tecnology, Kochi, Kerala, India","institution_ids":["https://openalex.org/I20497027"]},{"raw_affiliation_string":"Cochin University of Science and Tecnology, Kochi, India","institution_ids":["https://openalex.org/I20497027"]},{"raw_affiliation_string":"Center for Research and Innovation in Cyber Threat Resilience, Indian Institute of Information Technology and Management-Kerala, Thiruvananthapuram, India","institution_ids":["https://openalex.org/I68695296"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016838632","display_name":"Sabu M. Thampi","orcid":"https://orcid.org/0000-0001-6453-5520"},"institutions":[{"id":"https://openalex.org/I68695296","display_name":"Indian Institute of Information Technology and Management, Kerala","ror":"https://ror.org/02w9cdh50","country_code":"IN","type":"education","lineage":["https://openalex.org/I68695296"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Sabu M. Thampi","raw_affiliation_strings":["Center for Research and Innovation in Cyber Threat Resilience, Indian Institute of Information Technology and Management-Kerala, Thiruvananthapuram, Kerala, India","Technology and Management, Indian Institute of Information, Kerala, India","Center for Research and Innovation in Cyber Threat Resilience, Indian Institute of Information Technology and Management-Kerala, Thiruvananthapuram, India"],"affiliations":[{"raw_affiliation_string":"Center for Research and Innovation in Cyber Threat Resilience, Indian Institute of Information Technology and Management-Kerala, Thiruvananthapuram, Kerala, India","institution_ids":["https://openalex.org/I68695296"]},{"raw_affiliation_string":"Technology and Management, Indian Institute of Information, Kerala, India","institution_ids":["https://openalex.org/I68695296"]},{"raw_affiliation_string":"Center for Research and Innovation in Cyber Threat Resilience, Indian Institute of Information Technology and Management-Kerala, Thiruvananthapuram, India","institution_ids":["https://openalex.org/I68695296"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5016838632"],"corresponding_institution_ids":["https://openalex.org/I68695296"],"apc_list":null,"apc_paid":null,"fwci":2.2937,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.86511313,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"23"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6678580045700073},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5807356834411621},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5435296297073364},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4660056531429291},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.24377092719078064},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1919991672039032},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1436389982700348}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6678580045700073},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5807356834411621},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5435296297073364},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4660056531429291},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.24377092719078064},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1919991672039032},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1436389982700348}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-981-13-5826-5_1","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-13-5826-5_1","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.699999988079071,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W1495565380","https://openalex.org/W1497322298","https://openalex.org/W1505421125","https://openalex.org/W1563330328","https://openalex.org/W1572090670","https://openalex.org/W1602380388","https://openalex.org/W1753954055","https://openalex.org/W1858915531","https://openalex.org/W1954514523","https://openalex.org/W2015071685","https://openalex.org/W2020999234","https://openalex.org/W2027487162","https://openalex.org/W2030014066","https://openalex.org/W2031551949","https://openalex.org/W2049973206","https://openalex.org/W2053944475","https://openalex.org/W2054127354","https://openalex.org/W2060379782","https://openalex.org/W2104588447","https://openalex.org/W2117694832","https://openalex.org/W2118188826","https://openalex.org/W2121805588","https://openalex.org/W2131875370","https://openalex.org/W2143075689","https://openalex.org/W2146525400","https://openalex.org/W2185493608","https://openalex.org/W2273943936","https://openalex.org/W2278169311","https://openalex.org/W2293605433","https://openalex.org/W2383813018","https://openalex.org/W2538768042","https://openalex.org/W2580334929","https://openalex.org/W2611145822","https://openalex.org/W2733765803","https://openalex.org/W2768696376","https://openalex.org/W2792715678","https://openalex.org/W2887949427","https://openalex.org/W4230164823","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2390279801","https://openalex.org/W2625093826","https://openalex.org/W2950174689","https://openalex.org/W2358668433","https://openalex.org/W4200598720","https://openalex.org/W2921026492"],"abstract_inverted_index":null,"counts_by_year":[{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
