{"id":"https://openalex.org/W2757491816","doi":"https://doi.org/10.1007/s12652-017-0581-6","title":"Management platform of threats information in IoT environment","display_name":"Management platform of threats information in IoT environment","publication_year":2017,"publication_date":"2017-09-23","ids":{"openalex":"https://openalex.org/W2757491816","doi":"https://doi.org/10.1007/s12652-017-0581-6","mag":"2757491816"},"language":"en","primary_location":{"id":"doi:10.1007/s12652-017-0581-6","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s12652-017-0581-6","pdf_url":"https://link.springer.com/content/pdf/10.1007%2Fs12652-017-0581-6.pdf","source":{"id":"https://openalex.org/S48031226","display_name":"Journal of Ambient Intelligence and Humanized Computing","issn_l":"1868-5137","issn":["1868-5137","1868-5145"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Ambient Intelligence and Humanized Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007%2Fs12652-017-0581-6.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084462546","display_name":"Eunhye Ko","orcid":null},"institutions":[{"id":"https://openalex.org/I4210122441","display_name":"National Information Society Agency","ror":"https://ror.org/02hjfaw18","country_code":"KR","type":"other","lineage":["https://openalex.org/I4210122441"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Eunhye Ko","raw_affiliation_strings":["Korea Internet and Security Agency, 9, Jinheung-gil, Naju-si, Jeollanam-do, 58324, Korea"],"affiliations":[{"raw_affiliation_string":"Korea Internet and Security Agency, 9, Jinheung-gil, Naju-si, Jeollanam-do, 58324, Korea","institution_ids":["https://openalex.org/I4210122441"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101397915","display_name":"Tae-Eun Kim","orcid":"https://orcid.org/0000-0002-9339-2933"},"institutions":[{"id":"https://openalex.org/I4210122441","display_name":"National Information Society Agency","ror":"https://ror.org/02hjfaw18","country_code":"KR","type":"other","lineage":["https://openalex.org/I4210122441"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Taeeun Kim","raw_affiliation_strings":["Korea Internet and Security Agency, 9, Jinheung-gil, Naju-si, Jeollanam-do, 58324, Korea"],"affiliations":[{"raw_affiliation_string":"Korea Internet and Security Agency, 9, Jinheung-gil, Naju-si, Jeollanam-do, 58324, Korea","institution_ids":["https://openalex.org/I4210122441"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069700732","display_name":"Hwankuk Kim","orcid":"https://orcid.org/0000-0002-4449-5821"},"institutions":[{"id":"https://openalex.org/I4210122441","display_name":"National Information Society Agency","ror":"https://ror.org/02hjfaw18","country_code":"KR","type":"other","lineage":["https://openalex.org/I4210122441"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Hwankuk Kim","raw_affiliation_strings":["Korea Internet and Security Agency, 9, Jinheung-gil, Naju-si, Jeollanam-do, 58324, Korea"],"affiliations":[{"raw_affiliation_string":"Korea Internet and Security Agency, 9, Jinheung-gil, Naju-si, Jeollanam-do, 58324, Korea","institution_ids":["https://openalex.org/I4210122441"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5084462546"],"corresponding_institution_ids":["https://openalex.org/I4210122441"],"apc_list":{"value":2690,"currency":"EUR","value_usd":3390},"apc_paid":{"value":2690,"currency":"EUR","value_usd":3390},"fwci":3.5445,"has_fulltext":true,"cited_by_count":33,"citation_normalized_percentile":{"value":0.94027106,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"9","issue":"4","first_page":"1167","last_page":"1176"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9889000058174133,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9889000058174133,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9879999756813049,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13243","display_name":"Innovation in Digital Healthcare Systems","score":0.9858999848365784,"subfield":{"id":"https://openalex.org/subfields/3605","display_name":"Health Information Management"},"field":{"id":"https://openalex.org/fields/36","display_name":"Health Professions"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7917218208312988},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7597517967224121},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6687932014465332},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6355889439582825},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5020642280578613},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.48505300283432007},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.4552934467792511},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4447948634624481},{"id":"https://openalex.org/keywords/information-sharing","display_name":"Information sharing","score":0.44268566370010376},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.3739514946937561},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.2162441611289978},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.20675122737884521},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.181422621011734},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.15573963522911072},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.09518405795097351},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08988481760025024}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7917218208312988},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7597517967224121},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6687932014465332},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6355889439582825},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5020642280578613},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.48505300283432007},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.4552934467792511},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4447948634624481},{"id":"https://openalex.org/C2776854237","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information sharing","level":2,"score":0.44268566370010376},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.3739514946937561},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.2162441611289978},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.20675122737884521},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.181422621011734},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.15573963522911072},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.09518405795097351},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08988481760025024},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s12652-017-0581-6","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s12652-017-0581-6","pdf_url":"https://link.springer.com/content/pdf/10.1007%2Fs12652-017-0581-6.pdf","source":{"id":"https://openalex.org/S48031226","display_name":"Journal of Ambient Intelligence and Humanized Computing","issn_l":"1868-5137","issn":["1868-5137","1868-5145"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Ambient Intelligence and Humanized Computing","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1007/s12652-017-0581-6","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s12652-017-0581-6","pdf_url":"https://link.springer.com/content/pdf/10.1007%2Fs12652-017-0581-6.pdf","source":{"id":"https://openalex.org/S48031226","display_name":"Journal of Ambient Intelligence and Humanized Computing","issn_l":"1868-5137","issn":["1868-5137","1868-5145"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Ambient Intelligence and Humanized Computing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6072120315","display_name":null,"funder_award_id":"funded","funder_id":"https://openalex.org/F4320335489","funder_display_name":"Institute for Information and Communications Technology Promotion"},{"id":"https://openalex.org/G8808406072","display_name":null,"funder_award_id":"2016-0-00193","funder_id":"https://openalex.org/F4320322030","funder_display_name":"Ministry of Science, ICT and Future Planning"}],"funders":[{"id":"https://openalex.org/F4320322030","display_name":"Ministry of Science, ICT and Future Planning","ror":"https://ror.org/032e49973"},{"id":"https://openalex.org/F4320328359","display_name":"Ministry of Science and ICT, South Korea","ror":"https://ror.org/01wpjm123"},{"id":"https://openalex.org/F4320335489","display_name":"Institute for Information and Communications Technology Promotion","ror":"https://ror.org/01g0hqq23"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2757491816.pdf","grobid_xml":"https://content.openalex.org/works/W2757491816.grobid-xml"},"referenced_works_count":20,"referenced_works":["https://openalex.org/W1641682171","https://openalex.org/W1881619864","https://openalex.org/W1983442091","https://openalex.org/W2001637908","https://openalex.org/W2014316112","https://openalex.org/W2014653722","https://openalex.org/W2035061007","https://openalex.org/W2100695817","https://openalex.org/W2123258673","https://openalex.org/W2124628099","https://openalex.org/W2334508133","https://openalex.org/W2467685368","https://openalex.org/W2495508754","https://openalex.org/W2537950665","https://openalex.org/W2560666832","https://openalex.org/W2565056576","https://openalex.org/W2592364586","https://openalex.org/W2740486038","https://openalex.org/W3186276894","https://openalex.org/W3198688698"],"related_works":["https://openalex.org/W4311097251","https://openalex.org/W4245926026","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4361251261","https://openalex.org/W3031181660","https://openalex.org/W2098721272","https://openalex.org/W3200895730"],"abstract_inverted_index":{"Recently,":[0],"the":[1,13,21,68],"use":[2],"of":[3,15,23,25,33,71],"IoT":[4,26,51,72,125],"devices":[5,27,52],"in":[6,100],"living":[7],"environments":[8],"has":[9,28],"increased":[10],"due":[11,66],"to":[12,67,77,102],"development":[14],"various":[16],"wireless":[17],"communication":[18],"technologies.":[19],"As":[20,45],"number":[22],"types":[24],"grown":[29],"exponentially,":[30],"many":[31],"kinds":[32],"insecure":[34],"operating":[35,69],"systems":[36],"and":[37,56,94,106,114,120],"open":[38],"source":[39],"software":[40,57],"programs":[41],"are":[42,84],"being":[43],"used.":[44],"they":[46],"run":[47],"with":[48],"security":[49,79,97,104],"vulnerabilities,":[50],"using":[53],"such":[54],"OS":[55],"can":[58],"be":[59],"targeted":[60],"by":[61],"malicious":[62],"attackers.":[63],"In":[64],"addition,":[65],"characteristics":[70],"devices,":[73],"it":[74],"is":[75,88],"difficult":[76],"apply":[78],"patches":[80],"immediately":[81],"when":[82],"vulnerabilities":[83],"found.":[85],"Accordingly,":[86],"there":[87],"an":[89],"increasing":[90],"need":[91],"for":[92,117],"managing":[93],"sharing":[95,121],"cyber":[96],"threat":[98],"information":[99,123],"order":[101],"prevent":[103],"threats":[105],"accidents.":[107],"This":[108],"paper":[109],"suggests":[110],"a":[111],"platform":[112],"structure":[113],"application":[115],"method":[116],"collecting,":[118],"analyzing":[119],"vulnerability":[122],"about":[124],"devices.":[126]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":12},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":3}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
