{"id":"https://openalex.org/W2098928026","doi":"https://doi.org/10.1007/978-3-642-16074-5_9","title":"Portunes: Representing Attack Scenarios Spanning through the Physical, Digital and Social Domain","display_name":"Portunes: Representing Attack Scenarios Spanning through the Physical, Digital and Social Domain","publication_year":2010,"publication_date":"2010-01-01","ids":{"openalex":"https://openalex.org/W2098928026","doi":"https://doi.org/10.1007/978-3-642-16074-5_9","mag":"2098928026"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-16074-5_9","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-16074-5_9","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://ris.utwente.nl/ws/files/5486084/fulltext.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029090450","display_name":"Trajce Dimkov","orcid":null},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Trajce Dimkov","raw_affiliation_strings":["Distributed and Embedded Security Group, University of Twente, The Netherlands","Distributed and Embedded Security Group, University of Twente, The Netherlands#TAB#"],"affiliations":[{"raw_affiliation_string":"Distributed and Embedded Security Group, University of Twente, The Netherlands","institution_ids":["https://openalex.org/I94624287"]},{"raw_affiliation_string":"Distributed and Embedded Security Group, University of Twente, The Netherlands#TAB#","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083595076","display_name":"Wolter Pieters","orcid":"https://orcid.org/0000-0003-3985-4452"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Wolter Pieters","raw_affiliation_strings":["Distributed and Embedded Security Group, University of Twente, The Netherlands","Distributed and Embedded Security Group, University of Twente, The Netherlands#TAB#"],"affiliations":[{"raw_affiliation_string":"Distributed and Embedded Security Group, University of Twente, The Netherlands","institution_ids":["https://openalex.org/I94624287"]},{"raw_affiliation_string":"Distributed and Embedded Security Group, University of Twente, The Netherlands#TAB#","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016345474","display_name":"Pieter Hartel","orcid":"https://orcid.org/0000-0002-0411-0421"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Pieter Hartel","raw_affiliation_strings":["Distributed and Embedded Security Group, University of Twente, The Netherlands","Distributed and Embedded Security Group, University of Twente, The Netherlands#TAB#"],"affiliations":[{"raw_affiliation_string":"Distributed and Embedded Security Group, University of Twente, The Netherlands","institution_ids":["https://openalex.org/I94624287"]},{"raw_affiliation_string":"Distributed and Embedded Security Group, University of Twente, The Netherlands#TAB#","institution_ids":["https://openalex.org/I94624287"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5029090450"],"corresponding_institution_ids":["https://openalex.org/I94624287"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":8.8778,"has_fulltext":true,"cited_by_count":48,"citation_normalized_percentile":{"value":0.98470662,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"112","last_page":"129"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8138543367385864},{"id":"https://openalex.org/keywords/insider","display_name":"Insider","score":0.7170774936676025},{"id":"https://openalex.org/keywords/abstraction","display_name":"Abstraction","score":0.7117059230804443},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.707908570766449},{"id":"https://openalex.org/keywords/physical-security","display_name":"Physical security","score":0.6113885641098022},{"id":"https://openalex.org/keywords/insider-threat","display_name":"Insider threat","score":0.6053619384765625},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.6013861894607544},{"id":"https://openalex.org/keywords/security-through-obscurity","display_name":"Security through obscurity","score":0.5185328125953674},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.48554083704948425},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.43305402994155884},{"id":"https://openalex.org/keywords/security-domain","display_name":"Security domain","score":0.41262006759643555},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.3968193829059601}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8138543367385864},{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.7170774936676025},{"id":"https://openalex.org/C124304363","wikidata":"https://www.wikidata.org/wiki/Q673661","display_name":"Abstraction","level":2,"score":0.7117059230804443},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.707908570766449},{"id":"https://openalex.org/C2776157020","wikidata":"https://www.wikidata.org/wiki/Q851598","display_name":"Physical security","level":2,"score":0.6113885641098022},{"id":"https://openalex.org/C2776633304","wikidata":"https://www.wikidata.org/wiki/Q6038026","display_name":"Insider threat","level":3,"score":0.6053619384765625},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.6013861894607544},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.5185328125953674},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.48554083704948425},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.43305402994155884},{"id":"https://openalex.org/C2780264999","wikidata":"https://www.wikidata.org/wiki/Q7445032","display_name":"Security domain","level":2,"score":0.41262006759643555},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.3968193829059601},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-642-16074-5_9","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-16074-5_9","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:ris.utwente.nl:publications/41d2ca17-55f4-41b9-98e3-ea3427ef0472","is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/41d2ca17-55f4-41b9-98e3-ea3427ef0472","pdf_url":"https://ris.utwente.nl/ws/files/5486084/fulltext.pdf","source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Dimkov, T, Pieters, W & Hartel, P H 2010, Portunes: representing attack scenarios spanning through the physical, digital and social domain. in Proceedings of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (ARSPA-WITS'10). Revised Selected Papers. Lecture Notes in Computer Science, no. 6186, vol. 6186, Springer, Berlin, pp. 112-129. https://doi.org/10.1007/978-3-642-16074-5_9","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"pmh:oai:ris.utwente.nl:publications/41d2ca17-55f4-41b9-98e3-ea3427ef0472","is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/41d2ca17-55f4-41b9-98e3-ea3427ef0472","pdf_url":"https://ris.utwente.nl/ws/files/5486084/fulltext.pdf","source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Dimkov, T, Pieters, W & Hartel, P H 2010, Portunes: representing attack scenarios spanning through the physical, digital and social domain. in Proceedings of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (ARSPA-WITS'10). Revised Selected Papers. Lecture Notes in Computer Science, no. 6186, vol. 6186, Springer, Berlin, pp. 112-129. https://doi.org/10.1007/978-3-642-16074-5_9","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.5899999737739563,"display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2098928026.pdf","grobid_xml":"https://content.openalex.org/works/W2098928026.grobid-xml"},"referenced_works_count":12,"referenced_works":["https://openalex.org/W1496815121","https://openalex.org/W1516532723","https://openalex.org/W1589421353","https://openalex.org/W1608813708","https://openalex.org/W1968164101","https://openalex.org/W2096298302","https://openalex.org/W2097216716","https://openalex.org/W2156688573","https://openalex.org/W2161353020","https://openalex.org/W2164486577","https://openalex.org/W2189381334","https://openalex.org/W2600180414"],"related_works":["https://openalex.org/W4298022097","https://openalex.org/W2892860861","https://openalex.org/W2952714827","https://openalex.org/W2418906731","https://openalex.org/W2340270837","https://openalex.org/W2353811196","https://openalex.org/W265693751","https://openalex.org/W1598129144","https://openalex.org/W2467594283","https://openalex.org/W4283820284"],"abstract_inverted_index":null,"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":3},{"year":2016,"cited_by_count":6},{"year":2015,"cited_by_count":7},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":6},{"year":2012,"cited_by_count":6}],"updated_date":"2026-03-17T17:19:04.345684","created_date":"2025-10-10T00:00:00"}
