{"id":"https://openalex.org/W2144610998","doi":"https://doi.org/10.1109/comsnets.2011.5716431","title":"Defeating the insider threat via autonomic network capabilities","display_name":"Defeating the insider threat via autonomic network capabilities","publication_year":2011,"publication_date":"2011-01-01","ids":{"openalex":"https://openalex.org/W2144610998","doi":"https://doi.org/10.1109/comsnets.2011.5716431","mag":"2144610998"},"language":"en","primary_location":{"id":"doi:10.1109/comsnets.2011.5716431","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comsnets.2011.5716431","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001058389","display_name":"Faisal M. Sibai","orcid":null},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"F M Sibai","raw_affiliation_strings":["Department of Computer Science, George Mason University, Fairfax, VA 22030, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, George Mason University, Fairfax, VA 22030, USA#TAB#","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033786275","display_name":"Daniel A. Menasc\u00e9","orcid":"https://orcid.org/0000-0002-4085-6212"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"D A Menasce","raw_affiliation_strings":["Dept. of Computer Science, MS 4A5, George Mason University, Fairfax, VA 22030, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science, MS 4A5, George Mason University, Fairfax, VA 22030, USA","institution_ids":["https://openalex.org/I162714631"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5001058389"],"corresponding_institution_ids":["https://openalex.org/I162714631"],"apc_list":null,"apc_paid":null,"fwci":2.1005,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.88233309,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/insider-threat","display_name":"Insider threat","score":0.7713196277618408},{"id":"https://openalex.org/keywords/insider","display_name":"Insider","score":0.7049567699432373},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6433004140853882},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5546181797981262},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.09788399934768677}],"concepts":[{"id":"https://openalex.org/C2776633304","wikidata":"https://www.wikidata.org/wiki/Q6038026","display_name":"Insider threat","level":3,"score":0.7713196277618408},{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.7049567699432373},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6433004140853882},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5546181797981262},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.09788399934768677},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/comsnets.2011.5716431","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comsnets.2011.5716431","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7799999713897705,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W27518854","https://openalex.org/W1484841879","https://openalex.org/W1526426381","https://openalex.org/W1881151120","https://openalex.org/W1928847439","https://openalex.org/W1946055512","https://openalex.org/W1982563504","https://openalex.org/W1985699615","https://openalex.org/W1990911977","https://openalex.org/W1999392360","https://openalex.org/W2015646540","https://openalex.org/W2029573548","https://openalex.org/W2049430277","https://openalex.org/W2062228138","https://openalex.org/W2104704648","https://openalex.org/W2109239225","https://openalex.org/W2115162795","https://openalex.org/W2117478963","https://openalex.org/W2139258160","https://openalex.org/W2139864917","https://openalex.org/W2143906483","https://openalex.org/W2154341308","https://openalex.org/W2160239562","https://openalex.org/W2163805671","https://openalex.org/W2164527006","https://openalex.org/W2166059329","https://openalex.org/W2168027391","https://openalex.org/W2168947364","https://openalex.org/W4256155222","https://openalex.org/W6675914153"],"related_works":["https://openalex.org/W2766781562","https://openalex.org/W4205304595","https://openalex.org/W2979782961","https://openalex.org/W308359497","https://openalex.org/W1499596878","https://openalex.org/W3136170567","https://openalex.org/W2947769183","https://openalex.org/W2018332730","https://openalex.org/W4387194049","https://openalex.org/W2075012963"],"abstract_inverted_index":{"There":[0],"has":[1,85],"been":[2],"a":[3,53,57,105,109,122],"constant":[4],"growing":[5],"security":[6,141],"concern":[7],"on":[8,11,138],"insider":[9],"attacks":[10],"network":[12,87],"accessible":[13],"computer":[14],"systems.":[15,72],"Users":[16],"with":[17,26,31,171],"power":[18,42,62],"credentials":[19],"can":[20],"do":[21],"almost":[22],"anything":[23],"they":[24,29],"want":[25],"the":[27,89,99,116],"systems":[28],"own":[30,173],"very":[32],"little":[33],"control":[34],"or":[35,69,148],"oversight.":[36],"Most":[37],"breaches":[38],"occurring":[39],"nowadays":[40],"by":[41],"users":[43,63],"are":[44],"considered":[45],"legitimate":[46],"access":[47,88],"and":[48,82,114,120,162],"not":[49],"necessarily":[50],"intrusions.":[51,150],"Developing":[52],"solution":[54,110],"for":[55,92],"such":[56],"problem":[58,113],"is":[59],"challenging":[60],"because":[61],"need":[64],"flexible":[65],"requirements":[66],"to":[67,111],"administer":[68],"maintain":[70],"their":[71],"The":[73,164],"increased":[74],"usage":[75,84],"of":[76,145,155,160],"virtual":[77,79],"environments,":[78],"systems,":[80],"teleworking,":[81],"remote":[83],"made":[86],"preferred":[90],"method":[91],"system":[93],"administration.":[94],"This":[95],"paper":[96],"presents":[97],"(1)":[98],"Autonomic":[100],"Violation":[101],"Prevention":[102,133],"System":[103],"(AVPS),":[104],"framework":[106],"that":[107,125],"provides":[108],"this":[112],"meet":[115],"above":[117],"mentioned":[118],"challenges,":[119],"(2)":[121],"proof-of-concept":[123,165],"prototype":[124,166],"embeds":[126],"self-protection":[127,139],"capabilities":[128],"into":[129],"traditional":[130],"Network":[131],"Intrusion":[132],"Systems":[134],"(NIPS).":[135],"AVPS":[136,151],"focuses":[137],"against":[140],"policy":[142],"violations":[143],"instead":[144],"malware,":[146],"vulnerability,":[147],"exploit":[149],"heavily":[152],"enforces":[153],"separation":[154],"duties,":[156],"promotes":[157],"scalability,":[158],"ease":[159],"use":[161],"manageability.":[163],"uses":[167],"Snort":[168],"in-line":[169],"NIPS":[170],"our":[172],"customizations.":[174]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
