{"id":"https://openalex.org/W2036911885","doi":"https://doi.org/10.1016/s1353-4858(15)30007-6","title":"Staying ahead of cyber-attacks","display_name":"Staying ahead of cyber-attacks","publication_year":2015,"publication_date":"2015-02-01","ids":{"openalex":"https://openalex.org/W2036911885","doi":"https://doi.org/10.1016/s1353-4858(15)30007-6","mag":"2036911885"},"language":"en","primary_location":{"id":"doi:10.1016/s1353-4858(15)30007-6","is_oa":false,"landing_page_url":"https://doi.org/10.1016/s1353-4858(15)30007-6","pdf_url":null,"source":{"id":"https://openalex.org/S2764863393","display_name":"Network Security","issn_l":"1353-4858","issn":["1353-4858","1872-9371"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Network Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060716064","display_name":"John Green","orcid":"https://orcid.org/0000-0002-2315-5326"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"John Green","raw_affiliation_strings":["Accumuli","Accumuli#TAB#"],"affiliations":[{"raw_affiliation_string":"Accumuli","institution_ids":[]},{"raw_affiliation_string":"Accumuli#TAB#","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5060716064"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.09089576,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"2015","issue":"2","first_page":"13","last_page":"16"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/enabling","display_name":"Enabling","score":0.8597421050071716},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.6436878442764282},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.6126691102981567},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5959333181381226},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5337017178535461},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5041824579238892},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.49711254239082336},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.46155428886413574},{"id":"https://openalex.org/keywords/competitive-advantage","display_name":"Competitive advantage","score":0.45674389600753784},{"id":"https://openalex.org/keywords/craft","display_name":"Craft","score":0.43823644518852234},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.43267545104026794},{"id":"https://openalex.org/keywords/information-technology","display_name":"Information technology","score":0.4323248267173767},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3522581458091736},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.29405736923217773},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.23240402340888977}],"concepts":[{"id":"https://openalex.org/C22607594","wikidata":"https://www.wikidata.org/wiki/Q5375150","display_name":"Enabling","level":2,"score":0.8597421050071716},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.6436878442764282},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.6126691102981567},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5959333181381226},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5337017178535461},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5041824579238892},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.49711254239082336},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.46155428886413574},{"id":"https://openalex.org/C58546491","wikidata":"https://www.wikidata.org/wiki/Q1150207","display_name":"Competitive advantage","level":2,"score":0.45674389600753784},{"id":"https://openalex.org/C2779732396","wikidata":"https://www.wikidata.org/wiki/Q2207288","display_name":"Craft","level":2,"score":0.43823644518852234},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.43267545104026794},{"id":"https://openalex.org/C121017731","wikidata":"https://www.wikidata.org/wiki/Q11661","display_name":"Information technology","level":2,"score":0.4323248267173767},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3522581458091736},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.29405736923217773},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.23240402340888977},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1016/s1353-4858(15)30007-6","is_oa":false,"landing_page_url":"https://doi.org/10.1016/s1353-4858(15)30007-6","pdf_url":null,"source":{"id":"https://openalex.org/S2764863393","display_name":"Network Security","issn_l":"1353-4858","issn":["1353-4858","1872-9371"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Network Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5099999904632568,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2414793018","https://openalex.org/W4239903230","https://openalex.org/W2389103123","https://openalex.org/W2094340711","https://openalex.org/W2181649187","https://openalex.org/W2736591912","https://openalex.org/W377587031","https://openalex.org/W2804010965","https://openalex.org/W3107815644","https://openalex.org/W4309969504"],"abstract_inverted_index":{"As":[0],"organisations":[1,113],"become":[2],"more":[3],"dependent":[4],"on":[5,26,101],"technology":[6],"as":[7],"a":[8],"business":[9,110],"enabler,":[10],"the":[11,27,48,78,81,130,139,144],"security":[12],"and":[13,29,37,68,73,85,88,94,97,112,119,147],"reliability":[14],"of":[15,35,71,80,109,153],"their":[16],"connectivity":[17,45],"is":[18,105,124,141],"growing":[19],"in":[20,116,128],"importance.":[21],"Connected":[22],"businesses":[23],"are":[24],"reliant":[25],"Internet":[28],"networks":[30],"to":[31,50,59,62,137,142],"function,":[32],"take":[33,69],"advantage":[34,70],"opportunities":[36],"empower":[38],"an":[39,106],"increasingly":[40],"mobile":[41],"workforce.":[42],"However,":[43],"this":[44,56],"also":[46],"opens":[47],"door":[49],"threats":[51],"from":[52],"cyber-criminals":[53],"who":[54],"use":[55],"same":[57],"enabler":[58],"gain":[60],"access":[61],"organisational":[63],"networks,":[64],"exfiltrate":[65],"confidential":[66],"information":[67,86],"any":[72],"all":[74,129],"vulnerabilities.":[75],"By":[76],"understanding":[77],"breadth":[79],"threats,":[82],"critical":[83],"infrastructure":[84],"owners":[87],"operators":[89],"can":[90],"craft":[91],"mitigation":[92],"plans":[93],"develop":[95],"policies":[96],"programmes":[98],"that":[99],"focus":[100],"high-impact":[102],"attacks.":[103],"Cyber-security":[104],"accepted":[107],"part":[108],"life":[111],"invest":[114],"heavily":[115],"people,":[117],"resources":[118],"budget.":[120],"The":[121],"question":[122],"is,":[123],"it":[125],"being":[126],"spent":[127],"right":[131,145],"areas?":[132],"With":[133],"so":[134],"many":[135],"things":[136],"consider,":[138],"key":[140],"implement":[143],"procedures":[146],"response":[148],"strategy,":[149],"explains":[150],"John":[151],"Green":[152],"Accumuli.":[154]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
