{"id":"https://openalex.org/W1506486485","doi":"https://doi.org/10.1007/978-3-540-72163-5_1","title":"Application Security \u2013 Myth Or Reality?","display_name":"Application Security \u2013 Myth Or Reality?","publication_year":2007,"publication_date":"2007-06-05","ids":{"openalex":"https://openalex.org/W1506486485","doi":"https://doi.org/10.1007/978-3-540-72163-5_1","mag":"1506486485"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-540-72163-5_1","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-72163-5_1","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078801480","display_name":"William Caelli","orcid":null},"institutions":[{"id":"https://openalex.org/I4210125325","display_name":"International Consultants (Egypt)","ror":"https://ror.org/025xwwx95","country_code":"EG","type":"company","lineage":["https://openalex.org/I4210125325"]},{"id":"https://openalex.org/I160993911","display_name":"Queensland University of Technology","ror":"https://ror.org/03pnv4752","country_code":"AU","type":"education","lineage":["https://openalex.org/I160993911"]}],"countries":["AU","EG"],"is_corresponding":true,"raw_author_name":"William J. Caelli","raw_affiliation_strings":["Information Security Institute, Queensland University of Technology, GPO Box 2434, Brisbane. Qld. 4001., Australia","Senior Consultant\u2013Information Assurance and Director, International Information Security Consultants (IISEC) Pty Ltd, 21 Castle Hill Drive South, Gaven. Qld. 4211., Australia"],"affiliations":[{"raw_affiliation_string":"Information Security Institute, Queensland University of Technology, GPO Box 2434, Brisbane. Qld. 4001., Australia","institution_ids":["https://openalex.org/I160993911"]},{"raw_affiliation_string":"Senior Consultant\u2013Information Assurance and Director, International Information Security Consultants (IISEC) Pty Ltd, 21 Castle Hill Drive South, Gaven. Qld. 4211., Australia","institution_ids":["https://openalex.org/I4210125325"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5078801480"],"corresponding_institution_ids":["https://openalex.org/I160993911","https://openalex.org/I4210125325"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.08770917,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9778000116348267,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9743000268936157,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6887902617454529},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6371793746948242},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.4781304895877838},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4766850471496582},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.47133612632751465},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.46526387333869934},{"id":"https://openalex.org/keywords/information-and-communications-technology","display_name":"Information and Communications Technology","score":0.4366896152496338},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4339458644390106},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.4315238296985626},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.40285319089889526},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.10275182127952576}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6887902617454529},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6371793746948242},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.4781304895877838},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4766850471496582},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.47133612632751465},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.46526387333869934},{"id":"https://openalex.org/C67363961","wikidata":"https://www.wikidata.org/wiki/Q5268834","display_name":"Information and Communications Technology","level":2,"score":0.4366896152496338},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4339458644390106},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.4315238296985626},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.40285319089889526},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.10275182127952576},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-540-72163-5_1","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-72163-5_1","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2033357182","https://openalex.org/W2065250680","https://openalex.org/W2030343105","https://openalex.org/W8370799","https://openalex.org/W4361855476","https://openalex.org/W2372674753","https://openalex.org/W2336014427","https://openalex.org/W2165898552","https://openalex.org/W2008985775","https://openalex.org/W2353177111"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
