{"id":"https://openalex.org/W2094654945","doi":"https://doi.org/10.1109/cogsima.2013.6523841","title":"SKRM: Where security techniques talk to each other","display_name":"SKRM: Where security techniques talk to each other","publication_year":2013,"publication_date":"2013-02-01","ids":{"openalex":"https://openalex.org/W2094654945","doi":"https://doi.org/10.1109/cogsima.2013.6523841","mag":"2094654945"},"language":"en","primary_location":{"id":"doi:10.1109/cogsima.2013.6523841","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cogsima.2013.6523841","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100656311","display_name":"Xiaoyan Sun","orcid":"https://orcid.org/0000-0002-0321-2338"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Xiaoyan Sun","raw_affiliation_strings":["College of Information Sciences and Technology, Pennsylvania State University, University Park, USA","College of Information Science and Technology; Pennsylvania State University; University Park PA USA"],"affiliations":[{"raw_affiliation_string":"College of Information Sciences and Technology, Pennsylvania State University, University Park, USA","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"College of Information Science and Technology; Pennsylvania State University; University Park PA USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084217251","display_name":"Jun Dai","orcid":"https://orcid.org/0000-0002-6890-6429"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jun Dai","raw_affiliation_strings":["College of Information Sciences and Technology, Pennsylvania State University, University Park, USA","College of Information Science and Technology; Pennsylvania State University; University Park PA USA"],"affiliations":[{"raw_affiliation_string":"College of Information Sciences and Technology, Pennsylvania State University, University Park, USA","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"College of Information Science and Technology; Pennsylvania State University; University Park PA USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101719623","display_name":"Peng Liu","orcid":"https://orcid.org/0000-0001-8024-4344"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Peng Liu","raw_affiliation_strings":["College of Information Sciences and Technology, Pennsylvania State University, University Park, USA","College of Information Science and Technology; Pennsylvania State University; University Park PA USA"],"affiliations":[{"raw_affiliation_string":"College of Information Sciences and Technology, Pennsylvania State University, University Park, USA","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"College of Information Science and Technology; Pennsylvania State University; University Park PA USA","institution_ids":["https://openalex.org/I130769515"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100656311"],"corresponding_institution_ids":["https://openalex.org/I130769515"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.19104683,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"37","issue":null,"first_page":"163","last_page":"166"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10703","display_name":"Business Process Modeling and Analysis","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.9894999861717224,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7144257426261902},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5887018442153931},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.4458773136138916},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.4435437023639679},{"id":"https://openalex.org/keywords/knowledge-graph","display_name":"Knowledge graph","score":0.4243682026863098},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.41170552372932434},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.32224035263061523},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11318179965019226}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7144257426261902},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5887018442153931},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.4458773136138916},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.4435437023639679},{"id":"https://openalex.org/C2987255567","wikidata":"https://www.wikidata.org/wiki/Q33002955","display_name":"Knowledge graph","level":2,"score":0.4243682026863098},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.41170552372932434},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.32224035263061523},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11318179965019226}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cogsima.2013.6523841","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cogsima.2013.6523841","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7900000214576721}],"awards":[],"funders":[{"id":"https://openalex.org/F4320338281","display_name":"Army Research Office","ror":"https://ror.org/05epdh915"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W25164478","https://openalex.org/W67050709","https://openalex.org/W81224430","https://openalex.org/W1488344794","https://openalex.org/W1563871563","https://openalex.org/W1588651819","https://openalex.org/W1633862057","https://openalex.org/W1884489261","https://openalex.org/W1967112245","https://openalex.org/W2009853596","https://openalex.org/W2098250644","https://openalex.org/W2108073531","https://openalex.org/W2113114306","https://openalex.org/W2134937538","https://openalex.org/W2143659423","https://openalex.org/W2146948159","https://openalex.org/W2293069947","https://openalex.org/W2466512847","https://openalex.org/W3128056588","https://openalex.org/W4205777466","https://openalex.org/W6602755768","https://openalex.org/W6629134691","https://openalex.org/W6635301843","https://openalex.org/W6636671814"],"related_works":["https://openalex.org/W4379210901","https://openalex.org/W3093644965","https://openalex.org/W4309873550","https://openalex.org/W4287774239","https://openalex.org/W3092243156","https://openalex.org/W4286980183","https://openalex.org/W3191833430","https://openalex.org/W4292070284","https://openalex.org/W3128908425","https://openalex.org/W2902858910"],"abstract_inverted_index":{"Achieving":[0],"complete":[1],"and":[2,25,40,57],"accurate":[3],"cyber":[4,19,54],"situation":[5,51,75],"awareness":[6,76],"(SA)":[7],"is":[8],"crucial":[9],"for":[10],"security":[11,22,79],"analysts":[12],"to":[13,34,67,74,77],"make":[14],"right":[15],"decisions.":[16],"To":[17],"facilitate":[18],"SA,":[20],"existing":[21,48],"tools,":[23],"algorithms,":[24],"techniques":[26,73],"like":[27],"attack":[28],"graph,":[29],"should":[30],"be":[31],"integrated":[32],"together":[33],"extract":[35],"the":[36,69],"most":[37],"critical":[38],"information":[39],"synthesize":[41],"knowledge":[42],"from":[43],"different":[44],"areas.":[45],"Based":[46],"on":[47],"theories":[49],"of":[50,71,83],"awareness,":[52],"a":[53],"SA":[55],"model":[56,64],"an":[58],"SKRM":[59],"(Situation":[60],"Knowledge":[61],"Reference":[62],"Model)":[63],"are":[65],"constructed":[66],"enhance":[68],"coupling":[70],"current":[72],"enable":[78],"analysts'":[80],"effective":[81],"analysis":[82],"complex":[84],"cyber-security":[85],"problems.":[86]},"counts_by_year":[{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
