{"id":"https://openalex.org/W4205326532","doi":"https://doi.org/10.1109/bigdata52589.2021.9671703","title":"Securing Smart Future: Cyber Threats and Intelligent Means to Respond","display_name":"Securing Smart Future: Cyber Threats and Intelligent Means to Respond","publication_year":2021,"publication_date":"2021-12-15","ids":{"openalex":"https://openalex.org/W4205326532","doi":"https://doi.org/10.1109/bigdata52589.2021.9671703"},"language":"en","primary_location":{"id":"doi:10.1109/bigdata52589.2021.9671703","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata52589.2021.9671703","pdf_url":null,"source":{"id":"https://openalex.org/S4363607718","display_name":"2021 IEEE International Conference on Big Data (Big Data)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011052188","display_name":"Andrii Shalaginov","orcid":"https://orcid.org/0000-0003-1980-6875"},"institutions":[{"id":"https://openalex.org/I2800207870","display_name":"H\u00f8yskolen Kristiania","ror":"https://ror.org/03gss5916","country_code":"NO","type":"education","lineage":["https://openalex.org/I2800207870"]}],"countries":["NO"],"is_corresponding":true,"raw_author_name":"Andrii Shalaginov","raw_affiliation_strings":["Department of Technology, School of Economics, Innovation and Technology Kristiania University College, Oslo, Norway"],"affiliations":[{"raw_affiliation_string":"Department of Technology, School of Economics, Innovation and Technology Kristiania University College, Oslo, Norway","institution_ids":["https://openalex.org/I2800207870"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037685353","display_name":"Tor\u2010Morten Gr\u00f8nli","orcid":"https://orcid.org/0000-0002-2026-4551"},"institutions":[{"id":"https://openalex.org/I2800207870","display_name":"H\u00f8yskolen Kristiania","ror":"https://ror.org/03gss5916","country_code":"NO","type":"education","lineage":["https://openalex.org/I2800207870"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Tor-Morten Gronli","raw_affiliation_strings":["Department of Technology, School of Economics, Innovation and Technology Kristiania University College, Oslo, Norway"],"affiliations":[{"raw_affiliation_string":"Department of Technology, School of Economics, Innovation and Technology Kristiania University College, Oslo, Norway","institution_ids":["https://openalex.org/I2800207870"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5011052188"],"corresponding_institution_ids":["https://openalex.org/I2800207870"],"apc_list":null,"apc_paid":null,"fwci":0.616,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.56556357,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"2560","last_page":"2564"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7342697381973267},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6773304343223572},{"id":"https://openalex.org/keywords/situation-awareness","display_name":"Situation awareness","score":0.6357799768447876},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4739111661911011},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.4730643033981323},{"id":"https://openalex.org/keywords/smart-objects","display_name":"Smart objects","score":0.4674777686595917},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.45479705929756165},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12527233362197876}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7342697381973267},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6773304343223572},{"id":"https://openalex.org/C145804949","wikidata":"https://www.wikidata.org/wiki/Q478123","display_name":"Situation awareness","level":2,"score":0.6357799768447876},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4739111661911011},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.4730643033981323},{"id":"https://openalex.org/C2780202397","wikidata":"https://www.wikidata.org/wiki/Q2294986","display_name":"Smart objects","level":3,"score":0.4674777686595917},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.45479705929756165},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12527233362197876},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bigdata52589.2021.9671703","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata52589.2021.9671703","pdf_url":null,"source":{"id":"https://openalex.org/S4363607718","display_name":"2021 IEEE International Conference on Big Data (Big Data)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W187697284","https://openalex.org/W1480882349","https://openalex.org/W1492465272","https://openalex.org/W2026744384","https://openalex.org/W2345241012","https://openalex.org/W2546677102","https://openalex.org/W2734809238","https://openalex.org/W2766522072","https://openalex.org/W2794546026","https://openalex.org/W2902106343","https://openalex.org/W2903603888","https://openalex.org/W2907351452","https://openalex.org/W2990218685","https://openalex.org/W3091194297","https://openalex.org/W3091281551","https://openalex.org/W3137399094","https://openalex.org/W3194728218","https://openalex.org/W3208555706","https://openalex.org/W6629557488","https://openalex.org/W6656883986","https://openalex.org/W6756555459"],"related_works":["https://openalex.org/W4390608645","https://openalex.org/W4247566972","https://openalex.org/W2960264696","https://openalex.org/W3090563135","https://openalex.org/W2497432351","https://openalex.org/W4206777497","https://openalex.org/W4233347783","https://openalex.org/W2910064364","https://openalex.org/W4255224757","https://openalex.org/W2558872422"],"abstract_inverted_index":{"Smart":[0,47],"Environments":[1,48],"contribute":[2],"towards":[3],"better,":[4],"user-friendly":[5],"and":[6,34,56,70,90,109,119],"automated":[7],"environments;":[8],"however,":[9],"often":[10],"lacking":[11],"means":[12],"of":[13,15,20,37,62,75,93,98,121,130],"implementation":[14],"necessary":[16,128],"cybersecurity":[17,49,132],"measures":[18],"capable":[19],"handling":[21,55],"adversarial":[22],"actions.":[23],"In":[24],"this":[25],"paper":[26],"we":[27],"will":[28,86,104],"introduce":[29,67],"the":[30,38,46,63,96,117,122,127],"anticipated":[31],"cyber":[32,57],"threats":[33,58],"corresponding":[35],"ambition":[36],"ENViSEC":[39],"project":[40,64],"that":[41],"is":[42,65],"aimed":[43],"at":[44],"enhancing":[45],"by":[50],"introducing":[51],"intelligent":[52],"multi-agent":[53],"data":[54,71,107],"sharing.":[59],"The":[60,101],"potential":[61],"to":[66,78,83,115],"situational":[68],"awareness":[69,89],"streams":[72],"from":[73],"Internet":[74],"Things":[76],"ecosystem":[77],"offer":[79],"a":[80,134],"resilient":[81],"response":[82],"cyber-attacks.":[84],"This":[85],"ensure":[87],"human-oriented":[88],"early":[91],"detection":[92],"cybercrimes":[94],"in":[95,133],"era":[97],"Big":[99],"Data.":[100],"new":[102],"approach":[103],"include":[105],"multi-level":[106],"aggregation":[108],"off-chip":[110],"Machine":[111],"Learning":[112],"model":[113],"training":[114],"reduce":[116],"overhead":[118],"latency":[120],"IoT":[123],"components":[124],"yet":[125],"guarantee":[126],"level":[129],"hardening":[131],"cross-sector":[135],"context.":[136]},"counts_by_year":[{"year":2023,"cited_by_count":2}],"updated_date":"2026-02-22T13:39:03.778224","created_date":"2025-10-10T00:00:00"}
