{"id":"https://openalex.org/W2088399558","doi":"https://doi.org/10.1080/15567280600995451","title":"Using XML to Support Robust Information Sharing: An IODEF Automated Approach","display_name":"Using XML to Support Robust Information Sharing: An IODEF Automated Approach","publication_year":2006,"publication_date":"2006-07-01","ids":{"openalex":"https://openalex.org/W2088399558","doi":"https://doi.org/10.1080/15567280600995451","mag":"2088399558"},"language":"en","primary_location":{"id":"doi:10.1080/15567280600995451","is_oa":false,"landing_page_url":"https://doi.org/10.1080/15567280600995451","pdf_url":null,"source":{"id":"https://openalex.org/S127916260","display_name":"Journal of Digital Forensic Practice","issn_l":"1556-7281","issn":["1556-7281","1556-7346"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Digital Forensic Practice","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091900133","display_name":"Patrick Cain","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Patrick Cain","raw_affiliation_strings":["The Cooper-Cain Group, Inc. P.O. Box 400992 , Cambridge, Massachasetts, 02140-0010, USA"],"affiliations":[{"raw_affiliation_string":"The Cooper-Cain Group, Inc. P.O. Box 400992 , Cambridge, Massachasetts, 02140-0010, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5091900133"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.8208,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.83750741,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"1","issue":"2","first_page":"77","last_page":"82"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8375325202941895},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.8128429651260376},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.6649277806282043},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.62759929895401},{"id":"https://openalex.org/keywords/blocking","display_name":"Blocking (statistics)","score":0.607274055480957},{"id":"https://openalex.org/keywords/xml","display_name":"XML","score":0.5520808100700378},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5179011821746826},{"id":"https://openalex.org/keywords/login","display_name":"Login","score":0.5174899101257324},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.46261411905288696},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.42280763387680054},{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.41914844512939453},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.20526760816574097}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8375325202941895},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.8128429651260376},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.6649277806282043},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.62759929895401},{"id":"https://openalex.org/C144745244","wikidata":"https://www.wikidata.org/wiki/Q4927286","display_name":"Blocking (statistics)","level":2,"score":0.607274055480957},{"id":"https://openalex.org/C8797682","wikidata":"https://www.wikidata.org/wiki/Q2115","display_name":"XML","level":2,"score":0.5520808100700378},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5179011821746826},{"id":"https://openalex.org/C113324615","wikidata":"https://www.wikidata.org/wiki/Q472302","display_name":"Login","level":2,"score":0.5174899101257324},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.46261411905288696},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.42280763387680054},{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.41914844512939453},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.20526760816574097},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1080/15567280600995451","is_oa":false,"landing_page_url":"https://doi.org/10.1080/15567280600995451","pdf_url":null,"source":{"id":"https://openalex.org/S127916260","display_name":"Journal of Digital Forensic Practice","issn_l":"1556-7281","issn":["1556-7281","1556-7346"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Digital Forensic Practice","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2789663798","https://openalex.org/W2375896275","https://openalex.org/W2166943775","https://openalex.org/W1903420481","https://openalex.org/W2158007046","https://openalex.org/W2775236000","https://openalex.org/W2071426633","https://openalex.org/W2349754162","https://openalex.org/W3127778980","https://openalex.org/W2891168291"],"abstract_inverted_index":{"ABSTRACT":[0],"A":[1],"disturbing":[2],"trend":[3],"on":[4],"the":[5,8,88,106],"Internet":[6],"is":[7],"capture":[9],"of":[10,142],"electronic":[11,22],"banking":[12],"information":[13,97],"and":[14,102,115,146],"login":[15],"credentials":[16],"through":[17],"social":[18],"engineering":[19],"attacks":[20,29,52],"using":[21,91],"mail":[23],"or":[24],"instant":[25],"messaging.":[26],"Such":[27,96],"\u201cphishing\u201d":[28],"use":[30],"spoofing":[31],"techniques,":[32],"fraudulent":[33],"domain":[34],"names,":[35],"etc.,":[36],"to":[37,76,86,112,122],"trick":[38],"consumers":[39],"into":[40],"believing":[41],"they":[42],"are":[43],"dealing":[44],"with":[45],"a":[46,67,77,100,117,143],"legitimate":[47],"website.":[48],"Although":[49],"newly":[50],"emerging":[51],"can":[53],"be":[54],"blocked,":[55],"attackers":[56],"defeat":[57],"this":[58],"blocking":[59,113],"approach":[60,85],"by":[61],"slightly":[62],"modifying":[63],"each":[64],"attack.":[65],"As":[66],"result,":[68],"network":[69],"operators":[70],"must":[71],"continually":[72],"add":[73],"attack":[74,111,124],"variations":[75],"block":[78,89],"list.":[79],"This":[80,138],"article":[81,139],"describes":[82],"an":[83,92,127],"automated":[84],"updating":[87],"lists":[90],"XML":[93,129],"IODEF":[94],"document.":[95],"sharing":[98],"in":[99],"structured":[101],"automatic":[103],"way":[104],"reduces":[105],"time":[107],"delay":[108],"from":[109],"phishing":[110],"efforts":[114],"provides":[116,132],"rapid-response":[118],"forensic":[119],"research":[120],"tool":[121],"track":[123],"vectors.":[125],"Using":[126],"IETF-defined":[128],"reporting":[130],"format":[131],"live":[133],"data":[134],"for":[135,149],"ongoing":[136],"investigations.":[137],"introduces":[140],"results":[141],"prototyping":[144],"activity":[145],"explores":[147],"areas":[148],"further":[150],"enhancements.":[151]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
