{"id":"https://openalex.org/W4402508963","doi":"https://doi.org/10.1109/access.2024.3460402","title":"OutCenTR: A Method for Predicting Exploits of Cyber Vulnerabilities in High Dimensional Datasets","display_name":"OutCenTR: A Method for Predicting Exploits of Cyber Vulnerabilities in High Dimensional Datasets","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4402508963","doi":"https://doi.org/10.1109/access.2024.3460402"},"language":"en","primary_location":{"id":"doi:10.1109/access.2024.3460402","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3460402","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2024.3460402","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100978923","display_name":"Hadi Eskandari","orcid":"https://orcid.org/0000-0001-5002-7680"},"institutions":[{"id":"https://openalex.org/I153230381","display_name":"Charles Sturt University","ror":"https://ror.org/00wfvh315","country_code":"AU","type":"education","lineage":["https://openalex.org/I153230381"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Hadi Eskandari","raw_affiliation_strings":["School of Computing, Mathematics and Engineering, Charles Sturt University, Port Macquarie, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing, Mathematics and Engineering, Charles Sturt University, Port Macquarie, NSW, Australia","institution_ids":["https://openalex.org/I153230381"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081029180","display_name":"Michael Bewong","orcid":"https://orcid.org/0000-0002-5848-7451"},"institutions":[{"id":"https://openalex.org/I153230381","display_name":"Charles Sturt University","ror":"https://ror.org/00wfvh315","country_code":"AU","type":"education","lineage":["https://openalex.org/I153230381"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Michael Bewong","raw_affiliation_strings":["School of Computing, Mathematics and Engineering, Charles Sturt University, Wagga, Wagga, NSW, Australia","School of Computing, Mathematics and Engineering, Charles Sturt University, Wagga Wagga, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing, Mathematics and Engineering, Charles Sturt University, Wagga, Wagga, NSW, Australia","institution_ids":["https://openalex.org/I153230381"]},{"raw_affiliation_string":"School of Computing, Mathematics and Engineering, Charles Sturt University, Wagga Wagga, NSW, Australia","institution_ids":["https://openalex.org/I153230381"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050513827","display_name":"Md Geaur Rahman","orcid":"https://orcid.org/0000-0002-0710-3753"},"institutions":[{"id":"https://openalex.org/I153230381","display_name":"Charles Sturt University","ror":"https://ror.org/00wfvh315","country_code":"AU","type":"education","lineage":["https://openalex.org/I153230381"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Md Geaur Rahman","raw_affiliation_strings":["School of Computing, Mathematics and Engineering, Charles Sturt University, Port Macquarie, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing, Mathematics and Engineering, Charles Sturt University, Port Macquarie, NSW, Australia","institution_ids":["https://openalex.org/I153230381"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041207254","display_name":"Sabih ur Rehman","orcid":"https://orcid.org/0000-0001-7717-2773"},"institutions":[{"id":"https://openalex.org/I153230381","display_name":"Charles Sturt University","ror":"https://ror.org/00wfvh315","country_code":"AU","type":"education","lineage":["https://openalex.org/I153230381"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Sabih Ur Rehman","raw_affiliation_strings":["School of Computing, Mathematics and Engineering, Charles Sturt University, Port Macquarie, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing, Mathematics and Engineering, Charles Sturt University, Port Macquarie, NSW, Australia","institution_ids":["https://openalex.org/I153230381"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100978923"],"corresponding_institution_ids":["https://openalex.org/I153230381"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":1.8153,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.86339949,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"12","issue":null,"first_page":"133030","last_page":"133044"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9803000092506409,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9803000092506409,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.8857905864715576},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7332692742347717},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43639567494392395},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4215453267097473},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.32832854986190796}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.8857905864715576},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7332692742347717},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43639567494392395},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4215453267097473},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.32832854986190796}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/access.2024.3460402","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3460402","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:pure.atira.dk:publications/c3fa574c-4753-449d-9c9e-281d05bc17eb","is_oa":false,"landing_page_url":"https://researchoutput.csu.edu.au/en/publications/c3fa574c-4753-449d-9c9e-281d05bc17eb","pdf_url":null,"source":{"id":"https://openalex.org/S7407055442","display_name":"Charles Sturt University Research Output (CRO)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Eskandari, H, Bewong, M, Rahman, M G & Rehman, S U 2024, 'OutCenTR : A method for predicting exploits of cyber vulnerabilities in high dimensional datasets', IEEE Access, vol. 12, pp. 133030-133044. https://doi.org/10.1109/ACCESS.2024.3460402","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:doaj.org/article:5cf05ba6f7c2499a99f8c00aa9eef148","is_oa":true,"landing_page_url":"https://doaj.org/article/5cf05ba6f7c2499a99f8c00aa9eef148","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 12, Pp 133030-133044 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2024.3460402","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3460402","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W110007310","https://openalex.org/W1971733255","https://openalex.org/W1995443851","https://openalex.org/W2063876071","https://openalex.org/W2090898720","https://openalex.org/W2105497548","https://openalex.org/W2122111042","https://openalex.org/W2603292144","https://openalex.org/W2729537186","https://openalex.org/W2759256403","https://openalex.org/W2774398706","https://openalex.org/W2791638876","https://openalex.org/W2920420505","https://openalex.org/W2962892082","https://openalex.org/W2965876165","https://openalex.org/W2979473749","https://openalex.org/W2983029853","https://openalex.org/W2997591727","https://openalex.org/W3040266635","https://openalex.org/W3092638557","https://openalex.org/W3093266389","https://openalex.org/W3175201754","https://openalex.org/W3176464036","https://openalex.org/W3185103244","https://openalex.org/W3210162706","https://openalex.org/W4239510810","https://openalex.org/W4254182148","https://openalex.org/W4298082496","https://openalex.org/W4386760000","https://openalex.org/W4391248693","https://openalex.org/W4391640569","https://openalex.org/W4391935777","https://openalex.org/W4400762160","https://openalex.org/W6623540660","https://openalex.org/W6637554470"],"related_works":["https://openalex.org/W2906845177","https://openalex.org/W4200107511","https://openalex.org/W2891427086","https://openalex.org/W3048799479","https://openalex.org/W1968625315","https://openalex.org/W3006507989","https://openalex.org/W2779961139","https://openalex.org/W2763500028","https://openalex.org/W4240288358","https://openalex.org/W4240241597"],"abstract_inverted_index":{"While":[0],"an":[1,184],"ever-growing":[2],"number":[3],"of":[4,30,64,77,113,128,183,206,219,228,247],"vulnerabilities":[5,13,78,207],"are":[6,14,21,243],"reported":[7,12],"every":[8],"day,":[9],"all":[10,16,120],"the":[11,17,28,54,75,88,111,121,126,146,159,194,217,226,266],"not":[15,200],"same,":[18],"as":[19,46,87],"some":[20],"more":[22],"targeted":[23],"than":[24],"others.":[25],"Correctly":[26],"estimating":[27],"likelihood":[29,112],"a":[31,36,81,97,104,114,136,142,189],"vulnerability":[32,115],"being":[33,116],"exploited":[34,117],"is":[35,132,150,163,199],"critical":[37],"task":[38],"for":[39,203,211],"system":[40],"administrators":[41],"in":[42,73,84,177,245],"cyber":[43],"security":[44],"management":[45],"it":[47],"can":[48,79,109],"help":[49],"them":[50],"prioritise":[51,93],"and":[52,70,154,158,179,237,256],"patch":[53],"right":[55],"vulnerabilities.":[56],"However,":[57],"due":[58],"to":[59,187],"three":[60],"key":[61],"issues:":[62],"unavailability":[63,127],"labeled":[65,129,144],"training":[66,130],"data,":[67,145],"high":[68,147],"dimensionality,":[69],"class":[71,160],"imbalance":[72,161],"datasets,":[74],"prediction":[76],"be":[80],"challenging":[82],"problem":[83],"practice,":[85],"especially":[86],"existing":[89,185,271],"methods":[90,231,242],"often":[91],"only":[92,141,193,201],"one":[94],"issue":[95,149,162],"at":[96],"time.":[98,258],"In":[99,124],"this":[100],"paper,":[101],"we":[102],"propose":[103],"method":[105],"called":[106],"OutCenTR":[107,172,220,269],"that":[108,265],"predict":[110],"by":[118,134,152,165,191,221],"addressing":[119],"issues":[122],"concurrently.":[123],"OutCenTR,":[125],"data":[131],"addressed":[133,151,164],"considering":[135,192],"semi-supervised":[137],"approach":[138],"which":[139],"requires":[140],"few":[143],"dimensionality":[148],"identifying":[153],"removing":[155],"insignificant":[156],"features,":[157],"introducing":[166],"context-based":[167],"distinguishability":[168],"scores":[169],"between":[170],"records.":[171],"first":[173],"determines":[174],"important":[175,195],"features":[176],"datasets":[178,236],"then":[180],"makes":[181],"use":[182],"algorithm":[186],"build":[188],"classifier":[190,198],"features.":[196],"The":[197,241],"effective":[202],"predicting":[204],"exploit":[205],"but":[208],"also":[209],"valuable":[210],"general-purpose":[212],"outlier":[213],"detection.":[214],"We":[215],"evaluate":[216],"effectiveness":[218],"comparing":[222],"its":[223],"performance":[224,227],"with":[225],"five":[229,248],"state-of-the-art":[230],"on":[232],"four":[233],"publicly":[234],"available":[235],"twelve":[238],"synthetic":[239],"datasets.":[240],"evaluated":[244],"terms":[246],"criteria,":[249],"namely:":[250],"Precision,":[251],"Recall,":[252],"F1":[253],"Score,":[254],"ROC,":[255],"Execution":[257],"Our":[259],"initial":[260],"experimental":[261],"results":[262],"clearly":[263],"indicate":[264],"proposed":[267],"method,":[268],"outperforms":[270],"methods.":[272]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-02T08:37:19.008085","created_date":"2025-10-10T00:00:00"}
