{"id":"https://openalex.org/W2776662651","doi":"https://doi.org/10.1109/cns.2017.8228659","title":"VulMap: Global information security vulnerabilities IEEE CNS 17 poster","display_name":"VulMap: Global information security vulnerabilities IEEE CNS 17 poster","publication_year":2017,"publication_date":"2017-10-01","ids":{"openalex":"https://openalex.org/W2776662651","doi":"https://doi.org/10.1109/cns.2017.8228659","mag":"2776662651"},"language":"en","primary_location":{"id":"doi:10.1109/cns.2017.8228659","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns.2017.8228659","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050881501","display_name":"Dennis Kergl","orcid":null},"institutions":[{"id":"https://openalex.org/I40527276","display_name":"Universit\u00e4t der Bundeswehr M\u00fcnchen","ror":"https://ror.org/05kkv3f82","country_code":"DE","type":"education","lineage":["https://openalex.org/I1315109972","https://openalex.org/I40527276","https://openalex.org/I4387152969"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Dennis Kergl","raw_affiliation_strings":["Department of Computer Science, Universit\u00e4t der Bundeswehr M\u00fcnchen, Neubiberg, Germany"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Universit\u00e4t der Bundeswehr M\u00fcnchen, Neubiberg, Germany","institution_ids":["https://openalex.org/I40527276"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045078698","display_name":"Robert Roedler","orcid":null},"institutions":[{"id":"https://openalex.org/I40527276","display_name":"Universit\u00e4t der Bundeswehr M\u00fcnchen","ror":"https://ror.org/05kkv3f82","country_code":"DE","type":"education","lineage":["https://openalex.org/I1315109972","https://openalex.org/I40527276","https://openalex.org/I4387152969"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Robert Roedler","raw_affiliation_strings":["Department of Computer Science, Universit\u00e4t der Bundeswehr M\u00fcnchen, Neubiberg, Germany"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Universit\u00e4t der Bundeswehr M\u00fcnchen, Neubiberg, Germany","institution_ids":["https://openalex.org/I40527276"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078551681","display_name":"Gabi Dreo Rodosek","orcid":"https://orcid.org/0000-0002-8702-8553"},"institutions":[{"id":"https://openalex.org/I40527276","display_name":"Universit\u00e4t der Bundeswehr M\u00fcnchen","ror":"https://ror.org/05kkv3f82","country_code":"DE","type":"education","lineage":["https://openalex.org/I1315109972","https://openalex.org/I40527276","https://openalex.org/I4387152969"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Gabi Dreo Rodosek","raw_affiliation_strings":["Department of Computer Science, Universit\u00e4t der Bundeswehr M\u00fcnchen, Neubiberg, Germany"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Universit\u00e4t der Bundeswehr M\u00fcnchen, Neubiberg, Germany","institution_ids":["https://openalex.org/I40527276"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5050881501"],"corresponding_institution_ids":["https://openalex.org/I40527276"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.22273579,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"362","last_page":"363"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8071374893188477},{"id":"https://openalex.org/keywords/geolocation","display_name":"Geolocation","score":0.6974495053291321},{"id":"https://openalex.org/keywords/vendor","display_name":"Vendor","score":0.5988928079605103},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5857645273208618},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5661972761154175},{"id":"https://openalex.org/keywords/publication","display_name":"Publication","score":0.49246272444725037},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43798571825027466},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.43199482560157776},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.41027116775512695},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.37648746371269226},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.34982961416244507},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.33923545479774475},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.33845585584640503},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.08463525772094727}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8071374893188477},{"id":"https://openalex.org/C22041718","wikidata":"https://www.wikidata.org/wiki/Q638949","display_name":"Geolocation","level":2,"score":0.6974495053291321},{"id":"https://openalex.org/C2777338717","wikidata":"https://www.wikidata.org/wiki/Q1762621","display_name":"Vendor","level":2,"score":0.5988928079605103},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5857645273208618},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5661972761154175},{"id":"https://openalex.org/C41458344","wikidata":"https://www.wikidata.org/wiki/Q732577","display_name":"Publication","level":2,"score":0.49246272444725037},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43798571825027466},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.43199482560157776},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.41027116775512695},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.37648746371269226},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.34982961416244507},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.33923545479774475},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.33845585584640503},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08463525772094727},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.0},{"id":"https://openalex.org/C112698675","wikidata":"https://www.wikidata.org/wiki/Q37038","display_name":"Advertising","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cns.2017.8228659","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns.2017.8228659","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7599999904632568,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W2001637908"],"related_works":["https://openalex.org/W2163194970","https://openalex.org/W3105229732","https://openalex.org/W2799094075","https://openalex.org/W2892370851","https://openalex.org/W2187946387","https://openalex.org/W2052024186","https://openalex.org/W2939141610","https://openalex.org/W2380692702","https://openalex.org/W2144015590","https://openalex.org/W68214382"],"abstract_inverted_index":{"On":[0],"this":[1,152],"poster,":[2],"we":[3,12,35],"publish":[4],"a":[5,9,17,87,121],"first":[6],"view":[7],"on":[8,112,135],"novel":[10],"tool":[11],"call":[13],"VulMap.":[14],"VulMap":[15],"is":[16,55,65],"political":[18],"organized":[19],"map,":[20],"that":[21],"color-codes":[22],"overall":[23],"severity":[24],"of":[25,41,70,82,98,124,130,167],"information":[26,131,168],"system":[27,83],"vulnerabilities":[28,59],"to":[29,53,66,119,138],"geographical":[30],"areas.":[31],"To":[32],"attain":[33],"this,":[34],"combine":[36],"publicly":[37],"available":[38],"data":[39,91,101],"sets":[40],"vulnerabilities,":[42],"internet-wide":[43],"port":[44],"scans":[45],"and":[46,60,78,105,127,134,163],"geolocation":[47],"databases.":[48],"The":[49],"most":[50],"difficult":[51],"hurdle":[52],"overcome":[54],"the":[56,71,99,113,125,136,164],"link":[57],"between":[58,89,107],"internet-accessible":[61],"systems.":[62],"Our":[63],"approach":[64],"leverage":[67],"structured":[68],"annotations":[69],"National":[72],"Vulnerability":[73],"Database":[74],"<sup":[75],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[76],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">1</sup>":[77],"analyzing":[79],"response":[80],"headers":[81],"scans,":[84],"thus":[85],"obtaining":[86],"match":[88],"those":[90],"types.":[92],"By":[93],"applying":[94],"filters,":[95],"many":[96],"aspects":[97],"underlying":[100,140],"can":[102,160],"be":[103,161,172],"investigated":[104],"compared":[106],"different":[108],"regions.":[109],"This":[110],"tool,":[111],"one":[114],"hand,":[115],"enables":[116],"decision":[117],"makers":[118],"get":[120],"proper":[122],"overview":[123],"absolute":[126],"relative":[128],"status":[129],"systems":[132,147,169],"security,":[133],"other,":[137],"investigate":[139],"root":[141],"causes":[142],"like":[143],"vendor":[144],"preference,":[145],"operating":[146],"or":[148,157],"update":[149],"behavior.":[150],"In":[151],"way,":[153],"data-driven":[154],"policy":[155],"improvements":[156],"regulatory":[158],"measures":[159],"conducted":[162],"global":[165],"level":[166],"security":[170],"might":[171],"improved.":[173]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
