{"id":"https://openalex.org/W4406947484","doi":"https://doi.org/10.1109/access.2025.3536011","title":"Cyber Threat Inference Focused on Threat Class Sequence With Threat Class Sequence System","display_name":"Cyber Threat Inference Focused on Threat Class Sequence With Threat Class Sequence System","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4406947484","doi":"https://doi.org/10.1109/access.2025.3536011"},"language":"en","primary_location":{"id":"doi:10.1109/access.2025.3536011","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3536011","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2025.3536011","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059275650","display_name":"H. Kim","orcid":"https://orcid.org/0009-0009-6612-8537"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Hyoungjun Kim","raw_affiliation_strings":["Graduate School of Information Security, Korea University, Seoul, South Korea"],"raw_orcid":"https://orcid.org/0009-0009-6612-8537","affiliations":[{"raw_affiliation_string":"Graduate School of Information Security, Korea University, Seoul, South Korea","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jae-Yeol Kim","orcid":"https://orcid.org/0009-0007-7363-9621"},"institutions":[{"id":"https://openalex.org/I118373667","display_name":"Seoul National University of Science and Technology","ror":"https://ror.org/00chfja07","country_code":"KR","type":"education","lineage":["https://openalex.org/I118373667"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jae-Yeol Kim","raw_affiliation_strings":["Graduate School of Public Policy and Information Technology, Seoul National University of Science and Technology, Seoul, South Korea"],"raw_orcid":"https://orcid.org/0009-0007-7363-9621","affiliations":[{"raw_affiliation_string":"Graduate School of Public Policy and Information Technology, Seoul National University of Science and Technology, Seoul, South Korea","institution_ids":["https://openalex.org/I118373667"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100767530","display_name":"Kyungho Lee","orcid":"https://orcid.org/0000-0002-5183-5927"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Kyung-Ho Lee","raw_affiliation_strings":["Graduate School of Information Security, Korea University, Seoul, South Korea"],"raw_orcid":"https://orcid.org/0000-0002-5183-5927","affiliations":[{"raw_affiliation_string":"Graduate School of Information Security, Korea University, Seoul, South Korea","institution_ids":["https://openalex.org/I197347611"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5059275650"],"corresponding_institution_ids":["https://openalex.org/I197347611"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":5.5599,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.94334195,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":"13","issue":null,"first_page":"21665","last_page":"21677"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T14484","display_name":"Technology and Data Analysis","score":0.9876999855041504,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T14484","display_name":"Technology and Data Analysis","score":0.9876999855041504,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9585000276565552,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13243","display_name":"Innovation in Digital Healthcare Systems","score":0.9524000287055969,"subfield":{"id":"https://openalex.org/subfields/3605","display_name":"Health Information Management"},"field":{"id":"https://openalex.org/fields/36","display_name":"Health Professions"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6985244750976562},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.6854567527770996},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6413139700889587},{"id":"https://openalex.org/keywords/sequence","display_name":"Sequence (biology)","score":0.6383706331253052},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.5305562019348145},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2769700586795807}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6985244750976562},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.6854567527770996},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6413139700889587},{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.6383706331253052},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.5305562019348145},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2769700586795807},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2025.3536011","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3536011","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:c14410121604480a8a88c62b49812849","is_oa":true,"landing_page_url":"https://doaj.org/article/c14410121604480a8a88c62b49812849","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 13, Pp 21665-21677 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2025.3536011","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3536011","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321373","display_name":"Korea University","ror":"https://ror.org/047dqcg40"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1109422923","https://openalex.org/W2408793237","https://openalex.org/W2501070846","https://openalex.org/W2605817989","https://openalex.org/W2806386754","https://openalex.org/W2818789173","https://openalex.org/W2913909795","https://openalex.org/W2915601373","https://openalex.org/W2962703433","https://openalex.org/W2987485128","https://openalex.org/W3014091682","https://openalex.org/W3033942265","https://openalex.org/W3083012366","https://openalex.org/W3093410479","https://openalex.org/W3107245277","https://openalex.org/W3159621513","https://openalex.org/W3172875390","https://openalex.org/W3183934280","https://openalex.org/W3203375606","https://openalex.org/W4205799699","https://openalex.org/W4206906953","https://openalex.org/W4224932126","https://openalex.org/W4281727634","https://openalex.org/W4321787264","https://openalex.org/W4328050521","https://openalex.org/W4386814691","https://openalex.org/W4387713329","https://openalex.org/W4391655576","https://openalex.org/W6742694202"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Cyber":[0],"threats":[1],"are":[2,23,76,81],"becoming":[3],"increasingly":[4],"diverse,":[5],"sophisticated,":[6],"and":[7,29,78,91,108],"intelligent,":[8],"posing":[9],"significant":[10],"challenges":[11],"in":[12,96,142,201,221,238],"various":[13],"domains.":[14],"Among":[15],"these":[16,97],"threats,":[17,216],"advanced":[18],"persistent":[19,214],"threat":[20,89,115,148],"(APT)":[21],"attacks":[22,34,71,112],"particularly":[24],"concerning":[25],"because":[26],"of":[27,43,69,87,110,140,166,173,183,203,234],"sustained":[28],"intelligent":[30],"assault":[31],"tactics.":[32],"These":[33],"have":[35],"a":[36,114,146],"tendency":[37],"to":[38,209],"continuously":[39],"expand":[40],"the":[41,44,47,67,84,92,138,164,181],"scale":[42],"damage":[45,104],"during":[46],"attack":[48,79,175,193],"stage.":[49],"This":[50],"study":[51],"developed":[52],"novel":[53],"attack-inference":[54],"techniques":[55],"for":[56,231],"significantly":[57],"minimizing":[58,222],"cyberattack":[59,223],"damage.":[60,224],"By":[61,211],"proactively":[62],"identifying":[63],"potential":[64,230],"additional":[65],"attacks,":[66,145],"impact":[68],"APT":[70,237],"is":[72,218],"mitigated.":[73],"Cyberattack":[74],"points":[75],"anticipated,":[77],"types":[80],"discerned":[82],"using":[83,113,123],"compositional":[85],"patterns":[86],"pretrained":[88],"payloads":[90],"continuous":[93],"correlations":[94],"inherent":[95],"attacks.":[98],"The":[99,161],"cyber-threat":[100],"inference":[101],"method":[102],"minimizes":[103],"through":[105],"early":[106],"detection":[107,194],"blocking":[109,213],"successive":[111,174],"class":[116],"sequence":[117],"system":[118],"(TCSS).":[119],"Experiments":[120],"were":[121],"conducted":[122],"12,054,842,738,181":[124],"extensive":[125],"real-world":[126,156],"security":[127,157,239],"device":[128],"events":[129],"collected":[130],"by":[131,155,207],"more":[132],"than":[133],"420":[134],"companies.":[135],"To":[136],"assess":[137],"efficacy":[139],"TCSS":[141,184,196,217,227],"detecting":[143],"connected":[144],"39-month":[147],"dataset":[149],"comprising":[150],"27,832,130":[151],"instances":[152],"manually":[153],"analyzed":[154],"analysts":[158],"was":[159],"utilized.":[160],"analysis":[162],"confirmed":[163],"necessity":[165],"TCSS,":[167],"revealing":[168],"it":[169],"could":[170],"identify":[171],"63.99%":[172],"patterns.":[176],"Various":[177],"experimental":[178],"results":[179],"demonstrate":[180],"superiority":[182],"over":[185],"comparable":[186],"methods,":[187],"achieving":[188],"an":[189],"impressive":[190],"98.73%":[191],"post-connection":[192],"rate.":[195],"outperformed":[197],"other":[198],"similar":[199],"methods":[200],"terms":[202],"true":[204],"positive":[205],"rate":[206],"15.62%":[208],"3.37%.":[210],"preemptively":[212],"cyber":[215],"highly":[219],"effective":[220],"In":[225],"particular,":[226],"shows":[228],"promising":[229],"proactive":[232],"defense":[233],"cyberattacks,":[235],"including":[236],"operations":[240],"center":[241],"goals.":[242]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
