{"id":"https://openalex.org/W4411341394","doi":"https://doi.org/10.1007/s10586-024-05092-0","title":"Towards deep learning enabled cybersecurity risk assessment for microservice architectures","display_name":"Towards deep learning enabled cybersecurity risk assessment for microservice architectures","publication_year":2025,"publication_date":"2025-06-16","ids":{"openalex":"https://openalex.org/W4411341394","doi":"https://doi.org/10.1007/s10586-024-05092-0"},"language":"en","primary_location":{"id":"doi:10.1007/s10586-024-05092-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10586-024-05092-0","pdf_url":null,"source":{"id":"https://openalex.org/S106148199","display_name":"Cluster Computing","issn_l":"1386-7857","issn":["1386-7857","1573-7543"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cluster Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1007/s10586-024-05092-0","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5094246439","display_name":"Majid Abdulsatar","orcid":null},"institutions":[{"id":"https://openalex.org/I5681781","display_name":"University of Adelaide","ror":"https://ror.org/00892tw58","country_code":"AU","type":"education","lineage":["https://openalex.org/I5681781"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Majid Abdulsatar","raw_affiliation_strings":["School of Computer and Mathematical Sciences, University of Adelaide, Adelaide, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computer and Mathematical Sciences, University of Adelaide, Adelaide, Australia","institution_ids":["https://openalex.org/I5681781"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078733718","display_name":"Hussain Ahmad","orcid":"https://orcid.org/0000-0001-6959-8352"},"institutions":[{"id":"https://openalex.org/I5681781","display_name":"University of Adelaide","ror":"https://ror.org/00892tw58","country_code":"AU","type":"education","lineage":["https://openalex.org/I5681781"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Hussain Ahmad","raw_affiliation_strings":["School of Computer and Mathematical Sciences, University of Adelaide, Adelaide, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computer and Mathematical Sciences, University of Adelaide, Adelaide, Australia","institution_ids":["https://openalex.org/I5681781"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084412291","display_name":"Diksha Goel","orcid":"https://orcid.org/0000-0001-8212-8793"},"institutions":[{"id":"https://openalex.org/I4210154771","display_name":"CSIRO Manufacturing","ror":"https://ror.org/04sx9wp33","country_code":"AU","type":"facility","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4210154771","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Diksha Goel","raw_affiliation_strings":["CSIRO\u2019s Data61, Clayton, Australia","CSIRO's Data61, Clayton, Australia"],"affiliations":[{"raw_affiliation_string":"CSIRO\u2019s Data61, Clayton, Australia","institution_ids":["https://openalex.org/I4210154771","https://openalex.org/I42894916"]},{"raw_affiliation_string":"CSIRO's Data61, Clayton, Australia","institution_ids":["https://openalex.org/I4210154771","https://openalex.org/I42894916"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101765155","display_name":"Faheem Ullah","orcid":"https://orcid.org/0000-0001-8476-1218"},"institutions":[{"id":"https://openalex.org/I91044093","display_name":"Zayed University","ror":"https://ror.org/03snqfa66","country_code":"AE","type":"education","lineage":["https://openalex.org/I91044093"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Faheem Ullah","raw_affiliation_strings":["Zayed University, Abu Dhabi, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Zayed University, Abu Dhabi, United Arab Emirates","institution_ids":["https://openalex.org/I91044093"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5084412291"],"corresponding_institution_ids":["https://openalex.org/I4210154771","https://openalex.org/I42894916"],"apc_list":{"value":2190,"currency":"EUR","value_usd":2790},"apc_paid":{"value":2190,"currency":"EUR","value_usd":2790},"fwci":9.7365,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.97941917,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"28","issue":"6","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.988099992275238,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9115638732910156},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5402010083198547},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4803851246833801},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4057018756866455}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9115638732910156},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5402010083198547},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4803851246833801},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4057018756866455}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s10586-024-05092-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10586-024-05092-0","pdf_url":null,"source":{"id":"https://openalex.org/S106148199","display_name":"Cluster Computing","issn_l":"1386-7857","issn":["1386-7857","1573-7543"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cluster Computing","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1007/s10586-024-05092-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10586-024-05092-0","pdf_url":null,"source":{"id":"https://openalex.org/S106148199","display_name":"Cluster Computing","issn_l":"1386-7857","issn":["1386-7857","1573-7543"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cluster Computing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W426413943","https://openalex.org/W1981276685","https://openalex.org/W1992159015","https://openalex.org/W2144211451","https://openalex.org/W2580334929","https://openalex.org/W2603292144","https://openalex.org/W2766248701","https://openalex.org/W2773120226","https://openalex.org/W2774546595","https://openalex.org/W2791003924","https://openalex.org/W2795516651","https://openalex.org/W2804174676","https://openalex.org/W2810911101","https://openalex.org/W2908223572","https://openalex.org/W2910187721","https://openalex.org/W2936268283","https://openalex.org/W2942615718","https://openalex.org/W2953599647","https://openalex.org/W2963026732","https://openalex.org/W2979826702","https://openalex.org/W3011512329","https://openalex.org/W3015316038","https://openalex.org/W3027203390","https://openalex.org/W3102673518","https://openalex.org/W3130767031","https://openalex.org/W3157719223","https://openalex.org/W3177328664","https://openalex.org/W3183394046","https://openalex.org/W3194450833","https://openalex.org/W3196720945","https://openalex.org/W3205374593","https://openalex.org/W4210443011","https://openalex.org/W4213108923","https://openalex.org/W4285992209","https://openalex.org/W4315480688","https://openalex.org/W4382200919","https://openalex.org/W4383345785","https://openalex.org/W4401352430","https://openalex.org/W4411242563","https://openalex.org/W6681406824","https://openalex.org/W6702248584"],"related_works":["https://openalex.org/W2731899572","https://openalex.org/W3215138031","https://openalex.org/W3009238340","https://openalex.org/W4360585206","https://openalex.org/W4321369474","https://openalex.org/W4285208911","https://openalex.org/W3082895349","https://openalex.org/W4213079790","https://openalex.org/W2248239756","https://openalex.org/W3086377361"],"abstract_inverted_index":{"Abstract":[0],"The":[1],"widespread":[2],"adoption":[3],"of":[4,14,63,68,75,115,131,139],"microservice":[5,98],"architectures":[6],"has":[7],"given":[8],"rise":[9],"to":[10,31,112,121],"a":[11,87],"new":[12],"set":[13],"software":[15,37],"security":[16,38,42,61,69,94,123],"challenges.":[17],"These":[18],"challenges":[19],"stem":[20],"from":[21],"the":[22,60,66,73,129],"unique":[23],"features":[24],"inherent":[25],"in":[26,57,141],"microservices.":[27,64],"It":[28],"is":[29],"important":[30],"systematically":[32],"assess":[33,122],"and":[34,92],"address":[35,79],"these":[36,76,80],"issues":[39],"through":[40],"effective":[41],"risk":[43,47,148],"assessments.":[44],"However,":[45],"existing":[46],"assessment":[48],"approaches,":[49],"such":[50],"as":[51],"expert-based":[52],"manual":[53],"assessment,":[54],"prove":[55],"inefficient":[56],"accurately":[58],"evaluating":[59],"risks":[62,95],"Furthermore,":[65],"absence":[67],"vulnerability":[70,119,144],"metrics":[71,120,145],"hampers":[72],"evaluation":[74,127],"risks.":[77,124],"To":[78],"issues,":[81],"we":[82],"propose":[83],"CyberWise":[84,132],"Predictor":[85,133],",":[86,134],"framework":[88,101],"designed":[89],"for":[90,117,146],"predicting":[91,118,143],"assessing":[93],"associated":[96],"with":[97],"architectures.":[99],"Our":[100,125],"employs":[102],"transformers,":[103],"which":[104],"are":[105],"deep":[106],"learning-based":[107],"natural":[108],"language":[109],"processing":[110],"models,":[111],"analyze":[113],"descriptions":[114],"vulnerabilities":[116],"experimental":[126],"shows":[128],"effectiveness":[130],"achieving":[135],"an":[136],"average":[137],"accuracy":[138],"92%":[140],"automatically":[142],"their":[147],"assessment.":[149]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":5}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
