{"id":"https://openalex.org/W4406503176","doi":"https://doi.org/10.1093/cybsec/tyae032","title":"Measuring the size and severity of the integrated cyber attack surface across US county governments","display_name":"Measuring the size and severity of the integrated cyber attack surface across US county governments","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4406503176","doi":"https://doi.org/10.1093/cybsec/tyae032"},"language":"en","primary_location":{"id":"doi:10.1093/cybsec/tyae032","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyae032","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/11/1/tyae032/61484215/tyae032.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://academic.oup.com/cybersecurity/article-pdf/11/1/tyae032/61484215/tyae032.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021972325","display_name":"Charles Harry","orcid":null},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Charles Harry","raw_affiliation_strings":["School of Public Policy, University of Maryland , College Park, MD 20740 ,"],"affiliations":[{"raw_affiliation_string":"School of Public Policy, University of Maryland , College Park, MD 20740 ,","institution_ids":["https://openalex.org/I66946132"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050024227","display_name":"Ido Sivan\u2010Sevilla","orcid":null},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ido Sivan-Sevilla","raw_affiliation_strings":["College of Information, University of Maryland , College Park, MD 20740 ,"],"affiliations":[{"raw_affiliation_string":"College of Information, University of Maryland , College Park, MD 20740 ,","institution_ids":["https://openalex.org/I66946132"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060067837","display_name":"M. N. McDermott","orcid":null},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mark McDermott","raw_affiliation_strings":["Center for the Governance of Technology and Systems, University of Maryland , College Park, MD 20740 ,"],"affiliations":[{"raw_affiliation_string":"Center for the Governance of Technology and Systems, University of Maryland , College Park, MD 20740 ,","institution_ids":["https://openalex.org/I66946132"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5021972325"],"corresponding_institution_ids":["https://openalex.org/I66946132"],"apc_list":{"value":1864,"currency":"USD","value_usd":1864},"apc_paid":{"value":1864,"currency":"USD","value_usd":1864},"fwci":15.0881,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.98505641,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"11","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10953","display_name":"E-Government and Public Services","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/attack-surface","display_name":"Attack surface","score":0.4513125717639923},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4360209107398987},{"id":"https://openalex.org/keywords/environmental-health","display_name":"Environmental health","score":0.4221551716327667},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.40009820461273193},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3640475571155548},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.22354689240455627},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.2023085057735443}],"concepts":[{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.4513125717639923},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4360209107398987},{"id":"https://openalex.org/C99454951","wikidata":"https://www.wikidata.org/wiki/Q932068","display_name":"Environmental health","level":1,"score":0.4221551716327667},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.40009820461273193},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3640475571155548},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.22354689240455627},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.2023085057735443}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/cybsec/tyae032","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyae032","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/11/1/tyae032/61484215/tyae032.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1093/cybsec/tyae032","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyae032","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/11/1/tyae032/61484215/tyae032.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4406503176.pdf","grobid_xml":"https://content.openalex.org/works/W4406503176.grobid-xml"},"referenced_works_count":21,"referenced_works":["https://openalex.org/W574428423","https://openalex.org/W1587970460","https://openalex.org/W1839811676","https://openalex.org/W2081721896","https://openalex.org/W2883434603","https://openalex.org/W2892759841","https://openalex.org/W2902832404","https://openalex.org/W2915280428","https://openalex.org/W3045683681","https://openalex.org/W3051480171","https://openalex.org/W3084558590","https://openalex.org/W3098139909","https://openalex.org/W3177915434","https://openalex.org/W4224012382","https://openalex.org/W4300002915","https://openalex.org/W4321238636","https://openalex.org/W4400682695","https://openalex.org/W6859128870","https://openalex.org/W7002107559","https://openalex.org/W7055342564","https://openalex.org/W7061341325"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W4382046111","https://openalex.org/W3009153228","https://openalex.org/W2536179434","https://openalex.org/W1929087753","https://openalex.org/W3152571439","https://openalex.org/W3083937200","https://openalex.org/W3080294124","https://openalex.org/W3041847967","https://openalex.org/W2976636665"],"abstract_inverted_index":{"Abstract":[0],"Limited":[1],"methodologies":[2,43],"to":[3,28,34,44,138,168],"measure,":[4],"enumerate,":[5],"aggregate,":[6],"and":[7,49,53,87,97,100,110,131,135,175,180,192],"evaluate":[8],"the":[9,18,22,46,51,80,123,140,143,190],"cyber":[10,151],"attack":[11,47,93,107,170,194],"surface":[12,48,108,195],"of":[13,21,24,55,74,89,125,129,133,145,157,182],"US":[14,70,198],"county":[15,58,71,91,118,146,166,185,199],"governments":[16,72],"prevent":[17],"full":[19],"estimation":[20],"importance":[23],"local":[25],"government":[26,92,147],"cybersecurity":[27],"national":[29,150],"resilience.":[30,152],"Our":[31],"study":[32],"aims":[33],"address":[35],"this":[36],"gap.":[37],"We":[38,95,120],"further":[39],"develop":[40,96,136],"existing":[41],"OSINT-based":[42],"measure":[45],"assess":[50],"size":[52],"vulnerability":[54,88,148,167],"publicly":[56],"accessible":[57],"infrastructures.":[59],"By":[60],"collecting":[61],"data":[62],"on":[63,149,189],"42":[64],"735":[65],"Internet-facing":[66],"devices":[67],"across":[68,184,197],"3095":[69],"(98%":[73],"all":[75],"counties),":[76],"we":[77],"show,":[78],"for":[79,106],"first":[81],"time,":[82],"variations":[83],"in":[84],"size,":[85],"diversity,":[86],"exposed":[90,196],"surfaces.":[94],"compare":[98],"service-":[99],"Common":[101],"Vulnerability":[102],"Exposure":[103],"(CVE)-based":[104],"measures":[105,137],"diversity":[109],"severity,":[111,179],"each":[112],"showing":[113],"different":[114],"correlation":[115,126],"trends":[116],"with":[117],"population.":[119],"also":[121],"highlight":[122],"lack":[124],"between":[127],"density":[128],"CVEs":[130],"likelihood":[132],"exploitation":[134,183],"quantify":[139],"risk,":[141],"revealing":[142],"impact":[144],"Previously":[153],"studied":[154],"as":[155],"islands":[156],"insecurity,":[158],"our":[159],"novel":[160],"empirical":[161],"approach":[162],"holistically":[163],"estimates":[164],"potential":[165],"common":[169],"vectors":[171],"upon":[172],"service":[173],"misconfiguration":[174],"aggregates":[176],"CVEs,":[177],"their":[178],"probability":[181],"infrastructures,":[186],"shedding":[187],"light":[188],"integrated":[191],"aggregated":[193],"governments.":[200]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":3}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
