{"id":"https://openalex.org/W4387974064","doi":"https://doi.org/10.1007/s10207-023-00769-w","title":"Cyber threat assessment and management for securing healthcare ecosystems using natural language processing","display_name":"Cyber threat assessment and management for securing healthcare ecosystems using natural language processing","publication_year":2023,"publication_date":"2023-10-27","ids":{"openalex":"https://openalex.org/W4387974064","doi":"https://doi.org/10.1007/s10207-023-00769-w"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-023-00769-w","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-023-00769-w","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-023-00769-w.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10207-023-00769-w.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028272442","display_name":"Stefano Silvestri","orcid":"https://orcid.org/0000-0002-9890-8409"},"institutions":[{"id":"https://openalex.org/I3005160176","display_name":"Institute for High Performance Computing and Networking","ror":"https://ror.org/04r5fge26","country_code":"IT","type":"facility","lineage":["https://openalex.org/I3005160176","https://openalex.org/I4210155236"]},{"id":"https://openalex.org/I4210155236","display_name":"National Research Council","ror":"https://ror.org/04zaypm56","country_code":"IT","type":"funder","lineage":["https://openalex.org/I4210155236"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Stefano Silvestri","raw_affiliation_strings":["Institute for High Performance Computing and Networking of the National Research Council of Italy, ICAR-CNR, Via Pietro Castellino 111, 80131, Naples, Italy"],"affiliations":[{"raw_affiliation_string":"Institute for High Performance Computing and Networking of the National Research Council of Italy, ICAR-CNR, Via Pietro Castellino 111, 80131, Naples, Italy","institution_ids":["https://openalex.org/I3005160176","https://openalex.org/I4210155236"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109636290","display_name":"Shareful Islam","orcid":null},"institutions":[{"id":"https://openalex.org/I51216347","display_name":"Anglia Ruskin University","ror":"https://ror.org/0009t4v78","country_code":"GB","type":"education","lineage":["https://openalex.org/I51216347"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Shareful Islam","raw_affiliation_strings":["Focal Point, Waterloo, Belgium","School of Computing and Information, Science Anglia Ruskin University, Cambridge, UK"],"affiliations":[{"raw_affiliation_string":"Focal Point, Waterloo, Belgium","institution_ids":[]},{"raw_affiliation_string":"School of Computing and Information, Science Anglia Ruskin University, Cambridge, UK","institution_ids":["https://openalex.org/I51216347"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000220471","display_name":"D.V. Amelin","orcid":null},"institutions":[{"id":"https://openalex.org/I4210152467","display_name":"Fraunhofer Institute for Biomedical Engineering","ror":"https://ror.org/05tpsgh61","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210152467","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Dmitry Amelin","raw_affiliation_strings":["Fraunhofer Institute for Biomedical Engineering IBMT, Sulzbach, Germany"],"affiliations":[{"raw_affiliation_string":"Fraunhofer Institute for Biomedical Engineering IBMT, Sulzbach, Germany","institution_ids":["https://openalex.org/I4210152467"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075463666","display_name":"Gabriele Weiler","orcid":"https://orcid.org/0000-0002-3052-8776"},"institutions":[{"id":"https://openalex.org/I4210152467","display_name":"Fraunhofer Institute for Biomedical Engineering","ror":"https://ror.org/05tpsgh61","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210152467","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Gabriele Weiler","raw_affiliation_strings":["Fraunhofer Institute for Biomedical Engineering IBMT, Sulzbach, Germany"],"affiliations":[{"raw_affiliation_string":"Fraunhofer Institute for Biomedical Engineering IBMT, Sulzbach, Germany","institution_ids":["https://openalex.org/I4210152467"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011195262","display_name":"Spyridon Papastergiou","orcid":null},"institutions":[{"id":"https://openalex.org/I154757721","display_name":"University of Piraeus","ror":"https://ror.org/02qs84g94","country_code":"GR","type":"education","lineage":["https://openalex.org/I154757721"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Spyridon Papastergiou","raw_affiliation_strings":["Department of Informatics, University of Piraeus, Piraeus, Greece","Focal Point, Waterloo, Belgium"],"affiliations":[{"raw_affiliation_string":"Department of Informatics, University of Piraeus, Piraeus, Greece","institution_ids":["https://openalex.org/I154757721"]},{"raw_affiliation_string":"Focal Point, Waterloo, Belgium","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034161989","display_name":"Mario Ciampi","orcid":"https://orcid.org/0000-0002-7286-6212"},"institutions":[{"id":"https://openalex.org/I3005160176","display_name":"Institute for High Performance Computing and Networking","ror":"https://ror.org/04r5fge26","country_code":"IT","type":"facility","lineage":["https://openalex.org/I3005160176","https://openalex.org/I4210155236"]},{"id":"https://openalex.org/I4210155236","display_name":"National Research Council","ror":"https://ror.org/04zaypm56","country_code":"IT","type":"funder","lineage":["https://openalex.org/I4210155236"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Mario Ciampi","raw_affiliation_strings":["Institute for High Performance Computing and Networking of the National Research Council of Italy, ICAR-CNR, Via Pietro Castellino 111, 80131, Naples, Italy"],"affiliations":[{"raw_affiliation_string":"Institute for High Performance Computing and Networking of the National Research Council of Italy, ICAR-CNR, Via Pietro Castellino 111, 80131, Naples, Italy","institution_ids":["https://openalex.org/I3005160176","https://openalex.org/I4210155236"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5028272442"],"corresponding_institution_ids":["https://openalex.org/I3005160176","https://openalex.org/I4210155236"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":{"value":2590,"currency":"EUR","value_usd":3190},"fwci":16.5126,"has_fulltext":false,"cited_by_count":36,"citation_normalized_percentile":{"value":0.99125525,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"23","issue":"1","first_page":"31","last_page":"50"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.984000027179718,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9731000065803528,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7290651202201843},{"id":"https://openalex.org/keywords/health-care","display_name":"Health care","score":0.6627777218818665},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6279759407043457},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.5884335041046143},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5868898630142212},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.42014414072036743},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.418521910905838},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.3306153416633606},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.20098936557769775},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10959646105766296}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7290651202201843},{"id":"https://openalex.org/C160735492","wikidata":"https://www.wikidata.org/wiki/Q31207","display_name":"Health care","level":2,"score":0.6627777218818665},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6279759407043457},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.5884335041046143},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5868898630142212},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.42014414072036743},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.418521910905838},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.3306153416633606},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.20098936557769775},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10959646105766296},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1007/s10207-023-00769-w","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-023-00769-w","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-023-00769-w.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},{"id":"pmh:oai:it.cnr:prodotti:487947","is_oa":false,"landing_page_url":"http://www.cnr.it/prodotto/i/487947","pdf_url":null,"source":{"id":"https://openalex.org/S7407055101","display_name":"CNR ExploRA","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"info:cnr-pdr/source/autori:Stefano Silvestri; \nShareful Islam; \nDmitry Amelin; \nGabriele Weiler; \nSpyridon Papastergiou; \nMario Ciampi/titolo:Cyber threat assessment and management for securing healthcare ecosystems using natural language processing/doi:10.1007%2Fs10207-023-00769-w/rivista:International journal of information security (Internet)/anno:2023/pagina_da:/pagina_a:/intervallo_pagine:/volume:","raw_type":"Articolo in rivista"},{"id":"pmh:oai:publica.fraunhofer.de:publica/456914","is_oa":false,"landing_page_url":"https://publica.fraunhofer.de/handle/publica/456914","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"journal article"},{"id":"pmh:oai:zenodo.org:10211760","is_oa":true,"landing_page_url":"https://zenodo.org/communities/cybersecdomeeu","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"International Journal of Information Security, 22(6), (2023-10-27)","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"doi:10.1007/s10207-023-00769-w","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-023-00769-w","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-023-00769-w.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4387974064.pdf"},"referenced_works_count":37,"referenced_works":["https://openalex.org/W2143472559","https://openalex.org/W2749414669","https://openalex.org/W2805641541","https://openalex.org/W2941354264","https://openalex.org/W2946119234","https://openalex.org/W2963341956","https://openalex.org/W2963367792","https://openalex.org/W2998286882","https://openalex.org/W3002784191","https://openalex.org/W3004288456","https://openalex.org/W3013136547","https://openalex.org/W3035858791","https://openalex.org/W3040493431","https://openalex.org/W3093904885","https://openalex.org/W3157029757","https://openalex.org/W3165688004","https://openalex.org/W3176785816","https://openalex.org/W3178340556","https://openalex.org/W3180238884","https://openalex.org/W3191656082","https://openalex.org/W3209329320","https://openalex.org/W4210629855","https://openalex.org/W4213029780","https://openalex.org/W4213300563","https://openalex.org/W4223518423","https://openalex.org/W4226346873","https://openalex.org/W4280538689","https://openalex.org/W4281709424","https://openalex.org/W4285389070","https://openalex.org/W4288369688","https://openalex.org/W4289529467","https://openalex.org/W4290999202","https://openalex.org/W4300819682","https://openalex.org/W4310884457","https://openalex.org/W4312420419","https://openalex.org/W4313648836","https://openalex.org/W4367678287"],"related_works":["https://openalex.org/W2284759612","https://openalex.org/W4378555281","https://openalex.org/W2953081822","https://openalex.org/W2752145644","https://openalex.org/W4237803945","https://openalex.org/W1887981150","https://openalex.org/W4229446828","https://openalex.org/W2016027324","https://openalex.org/W2004641193","https://openalex.org/W1981675923"],"abstract_inverted_index":{"Abstract":[0],"The":[1,140],"healthcare":[2,32,41,148,160,197,232,245],"sectors":[3],"have":[4,227],"constantly":[5],"faced":[6],"significant":[7],"challenge":[8],"due":[9],"to":[10,43,49,112,130,152,175,185,192,211,220,267,272],"the":[11,25,30,40,47,74,107,114,147,156,177,187,196,200,213,216,222,255,259,276,279,284],"rapid":[12],"rise":[13],"of":[14,65,86,98,104,195,215,257,261],"cyber":[15,99,208],"threats.":[16],"These":[17],"threats":[18,48,56,134,158,218],"can":[19,170],"pose":[20],"any":[21],"potential":[22],"risk":[23],"within":[24,159],"system":[26],"context":[27],"and":[28,45,53,60,77,96,132,150,154,167,219,252,274,282],"disrupt":[29],"critical":[31],"service":[33],"delivery.":[34],"It":[35],"is":[36,62,70,265],"therefore":[37],"necessary":[38],"for":[39,94,146,237],"organisations":[42],"understand":[44],"tackle":[46,176],"ensure":[50],"overall":[51],"security":[52,209],"resilience.":[54],"However,":[55],"are":[57,83,183],"continuously":[58],"evolved":[59],"there":[61],"large":[63],"amount":[64],"unstructured":[66,118],"security-related":[67,119,203],"textual":[68],"information":[69,116,161,190,204],"available.":[71],"This":[72],"makes":[73],"threat":[75,115,189,280],"assessment":[76],"management":[78],"task":[79],"very":[80],"challenging.":[81],"There":[82],"a":[84,127,269],"number":[85],"existing":[87],"works":[88],"that":[89,164],"consider":[90],"Machine":[91],"Learning":[92],"models":[93],"detection":[95],"prediction":[97],"attack":[100],"but":[101],"they":[102],"lack":[103],"focus":[105],"on":[106,205,230],"Natural":[108],"Language":[109],"Processing":[110],"(NLP)":[111],"extract":[113,186],"from":[117,199],"text.":[120],"To":[121],"this":[122,124],"end,":[123],"work":[125],"proposes":[126],"novel":[128],"method":[129,142],"assess":[131,155,275],"manage":[133],"by":[135],"adopting":[136],"natural":[137],"language":[138],"processing.":[139],"proposed":[141],"has":[143],"been":[144],"tailored":[145],"ecosystem":[149],"allows":[151],"identify":[153,273],"possible":[157],"infrastructure":[162],"so":[163],"appropriate":[165],"control":[166],"mitigation":[168,224,286],"actions":[169],"be":[171],"taken":[172],"into":[173],"consideration":[174],"threat.":[178],"In":[179],"detail,":[180],"NLP":[181],"techniques":[182],"used":[184],"useful":[188],"related":[191],"specific":[193],"assets":[194],"ecosystems":[198,233],"largely":[201],"available":[202],"Internet":[206],"(e.g.":[207],"news),":[210],"evaluate":[212,278],"level":[214,281],"identified":[217],"select":[221],"required":[223,285],"actions.":[225,287],"We":[226],"performed":[228],"experiments":[229],"real":[231],"in":[234,241],"Fraunhofer":[235],"Institute":[236],"Biomedical":[238],"Engineering,":[239],"considering":[240],"particular":[242],"three":[243],"different":[244],"scenarios,":[246],"namely":[247],"implantable":[248],"medical":[249],"devices,":[250],"wearables,":[251],"biobank,":[253],"with":[254],"purpose":[256],"demonstrating":[258],"feasibility":[260],"our":[262],"approach,":[263],"which":[264],"able":[266],"provide":[268],"realistic":[270],"manner":[271],"threats,":[277],"suggest":[283]},"counts_by_year":[{"year":2026,"cited_by_count":5},{"year":2025,"cited_by_count":20},{"year":2024,"cited_by_count":11}],"updated_date":"2026-03-25T14:56:36.534964","created_date":"2025-10-10T00:00:00"}
