{"id":"https://openalex.org/W4408581786","doi":"https://doi.org/10.1007/s10207-025-01006-2","title":"CARIOCA: prioritizing the use of IoC by threats assessment shared on the MISP platform","display_name":"CARIOCA: prioritizing the use of IoC by threats assessment shared on the MISP platform","publication_year":2025,"publication_date":"2025-03-18","ids":{"openalex":"https://openalex.org/W4408581786","doi":"https://doi.org/10.1007/s10207-025-01006-2"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-025-01006-2","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-025-01006-2","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01006-2.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01006-2.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092921375","display_name":"Piero Delvecchio","orcid":"https://orcid.org/0009-0009-1230-2181"},"institutions":[{"id":"https://openalex.org/I4210143258","display_name":"SBS CyberSecurity (United States)","ror":"https://ror.org/0572r3k48","country_code":"US","type":"company","lineage":["https://openalex.org/I4210143258"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Piero Delvecchio","raw_affiliation_strings":["Cybersecurity Laboratory, BV TECH S.p.A., 20123, Milan, Italy"],"affiliations":[{"raw_affiliation_string":"Cybersecurity Laboratory, BV TECH S.p.A., 20123, Milan, Italy","institution_ids":["https://openalex.org/I4210143258"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085849149","display_name":"Stefano Galantucci","orcid":"https://orcid.org/0000-0002-3955-0478"},"institutions":[{"id":"https://openalex.org/I5561750","display_name":"University of Bari Aldo Moro","ror":"https://ror.org/027ynra39","country_code":"IT","type":"education","lineage":["https://openalex.org/I5561750"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Stefano Galantucci","raw_affiliation_strings":["Department of Computer Science, University of Bari Aldo Moro, 70125, Bari, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Bari Aldo Moro, 70125, Bari, Italy","institution_ids":["https://openalex.org/I5561750"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022590758","display_name":"Andrea Iannacone","orcid":"https://orcid.org/0000-0001-7344-636X"},"institutions":[{"id":"https://openalex.org/I4210143258","display_name":"SBS CyberSecurity (United States)","ror":"https://ror.org/0572r3k48","country_code":"US","type":"company","lineage":["https://openalex.org/I4210143258"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Andrea Iannacone","raw_affiliation_strings":["Cybersecurity Laboratory, BV TECH S.p.A., 20123, Milan, Italy"],"affiliations":[{"raw_affiliation_string":"Cybersecurity Laboratory, BV TECH S.p.A., 20123, Milan, Italy","institution_ids":["https://openalex.org/I4210143258"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038436210","display_name":"Giuseppe Pirlo","orcid":"https://orcid.org/0000-0002-7305-2210"},"institutions":[{"id":"https://openalex.org/I5561750","display_name":"University of Bari Aldo Moro","ror":"https://ror.org/027ynra39","country_code":"IT","type":"education","lineage":["https://openalex.org/I5561750"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Giuseppe Pirlo","raw_affiliation_strings":["Department of Computer Science, University of Bari Aldo Moro, 70125, Bari, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Bari Aldo Moro, 70125, Bari, Italy","institution_ids":["https://openalex.org/I5561750"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5092921375"],"corresponding_institution_ids":["https://openalex.org/I4210143258"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":{"value":2590,"currency":"EUR","value_usd":3190},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.05615555,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"24","issue":"2","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.9764999747276306,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.9764999747276306,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9591000080108643,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9381999969482422,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.554697573184967},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47590407729148865},{"id":"https://openalex.org/keywords/forensic-genetics","display_name":"Forensic genetics","score":0.43102723360061646},{"id":"https://openalex.org/keywords/biology","display_name":"Biology","score":0.15681779384613037}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.554697573184967},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47590407729148865},{"id":"https://openalex.org/C2911193946","wikidata":"https://www.wikidata.org/wiki/Q476697","display_name":"Forensic genetics","level":5,"score":0.43102723360061646},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.15681779384613037},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C180754005","wikidata":"https://www.wikidata.org/wiki/Q80726","display_name":"Allele","level":3,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C61320498","wikidata":"https://www.wikidata.org/wiki/Q265193","display_name":"Microsatellite","level":4,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s10207-025-01006-2","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-025-01006-2","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01006-2.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},{"id":"pmh:oai:ricerca.uniba.it:11586/539341","is_oa":true,"landing_page_url":"https://link.springer.com/article/10.1007/s10207-025-01006-2","pdf_url":null,"source":{"id":"https://openalex.org/S4377196296","display_name":"CINECA IRIS Institutional Research Information System (University of Bari Aldo Moro)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I5561750","host_organization_name":"University of Bari Aldo Moro","host_organization_lineage":["https://openalex.org/I5561750"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"doi:10.1007/s10207-025-01006-2","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-025-01006-2","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01006-2.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4408581786.pdf"},"referenced_works_count":28,"referenced_works":["https://openalex.org/W2533698187","https://openalex.org/W2763475576","https://openalex.org/W2774150231","https://openalex.org/W2862457273","https://openalex.org/W2890289428","https://openalex.org/W2964522977","https://openalex.org/W2968538311","https://openalex.org/W2968970356","https://openalex.org/W2982379052","https://openalex.org/W3009066821","https://openalex.org/W3009904707","https://openalex.org/W3024317787","https://openalex.org/W3086908239","https://openalex.org/W3186266735","https://openalex.org/W3198127954","https://openalex.org/W3214485518","https://openalex.org/W3215879207","https://openalex.org/W4200000055","https://openalex.org/W4288048355","https://openalex.org/W4293238230","https://openalex.org/W4297792532","https://openalex.org/W4312306882","https://openalex.org/W4320737526","https://openalex.org/W4381137026","https://openalex.org/W4383904403","https://openalex.org/W4387745904","https://openalex.org/W4399621644","https://openalex.org/W6833478184"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Abstract":[0],"As":[1],"the":[2,19,32,57,87,110,141,192,198,202,223,230],"use":[3,45],"of":[4,34,60,86,126,148,150,194,201,234],"information":[5,29,46,61,74,99],"systems":[6,44,80],"exponentially":[7],"increases,":[8],"every":[9],"organization":[10],"is":[11,75,95,132,168],"exposed":[12],"to":[13,27,50,71,77,81,96,112,136,144,205],"cyber-attacks.":[14],"To":[15],"detect":[16,51],"and":[17,40,52,100,124,175],"mitigate":[18],"damage":[20],"caused":[21],"by":[22],"such":[23,68,114],"attacks,":[24,66],"organizations":[25],"need":[26,111],"share":[28],"extracted":[30],"from":[31],"analysis":[33],"known":[35,48,65],"ones.":[36],"Intrusion":[37],"detection":[38],"(IDS)":[39],"intrusion":[41],"prevention":[42],"(IPS)":[43],"on":[47,164],"threats":[49],"prevent":[53],"attack":[54],"re-execution.":[55],"Given":[56],"large":[58],"amount":[59,69],"usually":[62],"available":[63],"for":[64,156,236],"restricting":[67],"only":[70],"really":[72],"valuable":[73],"necessary":[76],"allow":[78],"protection":[79,157],"work":[82],"more":[83],"efficiently.":[84],"One":[85],"main":[88],"challenges":[89],"in":[90,140,222,228],"cyber":[91],"threat":[92],"intelligence":[93],"(CTI)":[94],"filter":[97],"relevant":[98,155,207,232],"eliminate":[101],"obsolete":[102],"data.":[103],"The":[104,189,219],"recently":[105],"published":[106],"RFC":[107],"9424":[108],"emphasizes":[109],"produce":[113],"systems.":[115,158],"In":[116],"this":[117],"work,":[118],"a":[119,146,180],"methodology":[120],"named":[121,183],"comprehensive":[122],"assessment":[123],"rating":[125],"IoCs":[127,161,173,217,235],"via":[128],"CADE":[129],"algorithm":[130],"(CARIOCA)":[131],"proposed,":[133,169],"which":[134],"aims":[135],"analyze":[137],"data":[138],"contained":[139],"CTI":[142,176,203],"platform":[143],"select":[145,206],"subset":[147,233],"indicators":[149],"compromise":[151],"(IoCs)":[152],"considered":[153],"most":[154,231],"Through":[159],"CARIOCA,":[160],"evaluation":[162,187],"based":[163],"three":[165,211],"level":[166],"scorings":[167],"considering":[170],"sources\u2019":[171],"reliability,":[172],"freshness,":[174],"reports":[177],"quality":[178],"using":[179],"new":[181],"algorithm,":[182],"category":[184],"attribute":[185],"density":[186],"(CADE).":[188],"state-of-the-art":[190],"considers":[191],"qualities":[193],"an":[195],"IoC":[196],"or":[197],"estimated":[199],"reliability":[200],"source":[204],"IoCs.":[208],"By":[209],"combining":[210],"scores,":[212],"CARIOCA":[213],"can":[214],"comprehensively":[215],"assess":[216],"relevance.":[218],"results":[220],"obtained":[221],"experiments":[224],"support":[225],"CARIOCA\u2019s":[226],"effectiveness":[227],"selecting":[229],"IDS/IPS.":[237]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
