{"id":"https://openalex.org/W2906353818","doi":"https://doi.org/10.1007/s11042-018-7005-2","title":"Network attack prediction method based on threat intelligence for IoT","display_name":"Network attack prediction method based on threat intelligence for IoT","publication_year":2018,"publication_date":"2018-12-20","ids":{"openalex":"https://openalex.org/W2906353818","doi":"https://doi.org/10.1007/s11042-018-7005-2","mag":"2906353818"},"language":"en","primary_location":{"id":"doi:10.1007/s11042-018-7005-2","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11042-018-7005-2","pdf_url":null,"source":{"id":"https://openalex.org/S110206669","display_name":"Multimedia Tools and Applications","issn_l":"1380-7501","issn":["1380-7501","1573-7721"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Multimedia Tools and Applications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100442139","display_name":"Hongbin Zhang","orcid":"https://orcid.org/0000-0001-9841-0961"},"institutions":[{"id":"https://openalex.org/I34155123","display_name":"Hebei University of Science and Technology","ror":"https://ror.org/05h3pkk68","country_code":"CN","type":"education","lineage":["https://openalex.org/I34155123"]},{"id":"https://openalex.org/I94611258","display_name":"Hebei Normal University","ror":"https://ror.org/004rbbw49","country_code":"CN","type":"education","lineage":["https://openalex.org/I94611258"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hongbin Zhang","raw_affiliation_strings":["Hebei Key Laboratory of Network and Information Security, Hebei Normal University, Shijiazhuang, 050024, China","School of Information Science and Engineering, Hebei University of Science and Technology, Shijiazhuang, People\u2019s Republic of China","School of Information Science and Engineering, Hebei University of Science and Technology, Shijiazhuang, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"Hebei Key Laboratory of Network and Information Security, Hebei Normal University, Shijiazhuang, 050024, China","institution_ids":["https://openalex.org/I94611258"]},{"raw_affiliation_string":"School of Information Science and Engineering, Hebei University of Science and Technology, Shijiazhuang, People\u2019s Republic of China","institution_ids":["https://openalex.org/I34155123"]},{"raw_affiliation_string":"School of Information Science and Engineering, Hebei University of Science and Technology, Shijiazhuang, People's Republic of China","institution_ids":["https://openalex.org/I34155123"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041656136","display_name":"Yuzi Yi","orcid":null},"institutions":[{"id":"https://openalex.org/I34155123","display_name":"Hebei University of Science and Technology","ror":"https://ror.org/05h3pkk68","country_code":"CN","type":"education","lineage":["https://openalex.org/I34155123"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuzi Yi","raw_affiliation_strings":["School of Information Science and Engineering, Hebei University of Science and Technology, Shijiazhuang, People\u2019s Republic of China","School of Information Science and Engineering, Hebei University of Science and Technology, Shijiazhuang, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Hebei University of Science and Technology, Shijiazhuang, People\u2019s Republic of China","institution_ids":["https://openalex.org/I34155123"]},{"raw_affiliation_string":"School of Information Science and Engineering, Hebei University of Science and Technology, Shijiazhuang, People's Republic of China","institution_ids":["https://openalex.org/I34155123"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018294805","display_name":"Junshe Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I34155123","display_name":"Hebei University of Science and Technology","ror":"https://ror.org/05h3pkk68","country_code":"CN","type":"education","lineage":["https://openalex.org/I34155123"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junshe Wang","raw_affiliation_strings":["School of Information Science and Engineering, Hebei University of Science and Technology, Shijiazhuang, People\u2019s Republic of China","School of Information Science and Engineering, Hebei University of Science and Technology, Shijiazhuang, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Hebei University of Science and Technology, Shijiazhuang, People\u2019s Republic of China","institution_ids":["https://openalex.org/I34155123"]},{"raw_affiliation_string":"School of Information Science and Engineering, Hebei University of Science and Technology, Shijiazhuang, People's Republic of China","institution_ids":["https://openalex.org/I34155123"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057973707","display_name":"Ning Cao","orcid":"https://orcid.org/0000-0001-6430-3586"},"institutions":[{"id":"https://openalex.org/I186691195","display_name":"Qingdao Binhai University","ror":"https://ror.org/023er3e86","country_code":"CN","type":"education","lineage":["https://openalex.org/I186691195"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ning Cao","raw_affiliation_strings":["College of Information Engineering, Qingdao Binhai University, Qingdao, 266555, People\u2019s Republic of China","College of Information Engineering, Qingdao Binhai University, Qingdao, 266555, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"College of Information Engineering, Qingdao Binhai University, Qingdao, 266555, People\u2019s Republic of China","institution_ids":["https://openalex.org/I186691195"]},{"raw_affiliation_string":"College of Information Engineering, Qingdao Binhai University, Qingdao, 266555, People's Republic of China","institution_ids":["https://openalex.org/I186691195"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001056903","display_name":"Qiang Duan","orcid":"https://orcid.org/0000-0001-7832-1937"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Qiang Duan","raw_affiliation_strings":["Department of Information Science & Technology, Pennsylvania State University, 1600 Woodland Rd., Abington, PA, 19001, USA"],"affiliations":[{"raw_affiliation_string":"Department of Information Science & Technology, Pennsylvania State University, 1600 Woodland Rd., Abington, PA, 19001, USA","institution_ids":["https://openalex.org/I130769515"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100442139"],"corresponding_institution_ids":["https://openalex.org/I34155123","https://openalex.org/I94611258"],"apc_list":null,"apc_paid":null,"fwci":0.39,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.6799298,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"78","issue":"21","first_page":"30257","last_page":"30270"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8615783452987671},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6109626889228821},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.5723941326141357},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4123459756374359},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.38690394163131714},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.32729971408843994},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.32252973318099976}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8615783452987671},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6109626889228821},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.5723941326141357},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4123459756374359},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38690394163131714},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.32729971408843994},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.32252973318099976}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s11042-018-7005-2","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11042-018-7005-2","pdf_url":null,"source":{"id":"https://openalex.org/S110206669","display_name":"Multimedia Tools and Applications","issn_l":"1380-7501","issn":["1380-7501","1573-7721"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Multimedia Tools and Applications","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4399999976158142,"id":"https://metadata.un.org/sdg/13","display_name":"Climate action"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1520914943","https://openalex.org/W1781642226","https://openalex.org/W1992685726","https://openalex.org/W2005002286","https://openalex.org/W2010543673","https://openalex.org/W2037011398","https://openalex.org/W2047537658","https://openalex.org/W2099399367","https://openalex.org/W2110753472","https://openalex.org/W2128910824","https://openalex.org/W2156909104","https://openalex.org/W2799568795","https://openalex.org/W2962896707","https://openalex.org/W4247692230","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W2950174689","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4361251261","https://openalex.org/W2090763504","https://openalex.org/W3031181660"],"abstract_inverted_index":null,"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
