{"id":"https://openalex.org/W4407783601","doi":"https://doi.org/10.1109/comsnets63942.2025.10885698","title":"A Cyber-Risk Management Schema for Classifying Literature on Advanced Persistent Threats","display_name":"A Cyber-Risk Management Schema for Classifying Literature on Advanced Persistent Threats","publication_year":2025,"publication_date":"2025-01-06","ids":{"openalex":"https://openalex.org/W4407783601","doi":"https://doi.org/10.1109/comsnets63942.2025.10885698"},"language":"en","primary_location":{"id":"doi:10.1109/comsnets63942.2025.10885698","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comsnets63942.2025.10885698","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 17th International Conference on COMmunication Systems and NETworks (COMSNETS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103040047","display_name":"Rajesh Kumar","orcid":"https://orcid.org/0000-0002-9275-8518"},"institutions":[{"id":"https://openalex.org/I4210148827","display_name":"Birla Institute of Technology and Science, Pilani - Goa Campus","ror":"https://ror.org/046sh6j17","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210148827","https://openalex.org/I74796645"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Rajesh Kumar","raw_affiliation_strings":["Birla Institute of Technology and Science,Department of Computer Science and Information Systems,Goa,India"],"affiliations":[{"raw_affiliation_string":"Birla Institute of Technology and Science,Department of Computer Science and Information Systems,Goa,India","institution_ids":["https://openalex.org/I4210148827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073148544","display_name":"Swapnil Pandey","orcid":"https://orcid.org/0000-0001-5086-709X"},"institutions":[{"id":"https://openalex.org/I4210148827","display_name":"Birla Institute of Technology and Science, Pilani - Goa Campus","ror":"https://ror.org/046sh6j17","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210148827","https://openalex.org/I74796645"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Swapnil Pandey","raw_affiliation_strings":["Birla Institute of Technology and Science,Department of Computer Science and Information Systems,Goa,India"],"affiliations":[{"raw_affiliation_string":"Birla Institute of Technology and Science,Department of Computer Science and Information Systems,Goa,India","institution_ids":["https://openalex.org/I4210148827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5103040047"],"corresponding_institution_ids":["https://openalex.org/I4210148827"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.04043339,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1317","last_page":"1322"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9825999736785889,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9825999736785889,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/schema","display_name":"Schema (genetic algorithms)","score":0.6652156114578247},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6429134011268616},{"id":"https://openalex.org/keywords/risk-management","display_name":"Risk management","score":0.5566309690475464},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39941972494125366},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.34147143363952637},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.33740437030792236},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.2292761206626892},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.20996329188346863}],"concepts":[{"id":"https://openalex.org/C52146309","wikidata":"https://www.wikidata.org/wiki/Q7431116","display_name":"Schema (genetic algorithms)","level":2,"score":0.6652156114578247},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6429134011268616},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.5566309690475464},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39941972494125366},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.34147143363952637},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.33740437030792236},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.2292761206626892},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.20996329188346863},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/comsnets63942.2025.10885698","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comsnets63942.2025.10885698","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 17th International Conference on COMmunication Systems and NETworks (COMSNETS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W4009483","https://openalex.org/W1419517020","https://openalex.org/W1501439223","https://openalex.org/W1533945010","https://openalex.org/W1793101635","https://openalex.org/W1919179112","https://openalex.org/W1936523258","https://openalex.org/W1992705187","https://openalex.org/W1994212840","https://openalex.org/W2005468743","https://openalex.org/W2056451850","https://openalex.org/W2110770770","https://openalex.org/W2117667893","https://openalex.org/W2145071552","https://openalex.org/W2295637543","https://openalex.org/W2308766372","https://openalex.org/W2344429718","https://openalex.org/W2408793237","https://openalex.org/W2501070846","https://openalex.org/W2528806761","https://openalex.org/W2540359925","https://openalex.org/W2545820541","https://openalex.org/W2560211752","https://openalex.org/W2568394246","https://openalex.org/W2578649485","https://openalex.org/W2582259743","https://openalex.org/W2604844934","https://openalex.org/W2622921428","https://openalex.org/W2744552815","https://openalex.org/W2754030209","https://openalex.org/W2766503369","https://openalex.org/W2789825598","https://openalex.org/W2804368608","https://openalex.org/W2818789173","https://openalex.org/W2901979139","https://openalex.org/W2903765663","https://openalex.org/W2910711617","https://openalex.org/W2915601373","https://openalex.org/W2951270751","https://openalex.org/W2959428502","https://openalex.org/W2963492322","https://openalex.org/W3135846497","https://openalex.org/W4206017890","https://openalex.org/W4224914413","https://openalex.org/W4253349053","https://openalex.org/W4285325937","https://openalex.org/W4393238051","https://openalex.org/W4401273105"],"related_works":["https://openalex.org/W2033101018","https://openalex.org/W2099278314","https://openalex.org/W2394886764","https://openalex.org/W2282598741","https://openalex.org/W2361540170","https://openalex.org/W1637796940","https://openalex.org/W40856544","https://openalex.org/W2385719512","https://openalex.org/W2335880842","https://openalex.org/W2994353570"],"abstract_inverted_index":{"Advanced":[0],"Persistent":[1],"Threats":[2],"(APTs)":[3],"are":[4,32],"complex,":[5],"multi-stage":[6],"cyberattacks":[7],"often":[8],"backed":[9],"by":[10],"nation-states,":[11],"targeting":[12],"critical":[13],"infrastructure":[14],"with":[15],"the":[16,59,74,112,120],"potential":[17],"to":[18,24,46,72,100,118],"severely":[19],"impact":[20],"national":[21],"economies.":[22],"Due":[23],"their":[25,81,148],"sophisticated":[26],"tactics":[27],"and":[28,40,55,78,105,145],"high-stake":[29],"implications,":[30],"APTs":[31],"a":[33,62,88,102],"prominent":[34],"focus":[35],"in":[36,125,131,147],"both":[37,143],"academic":[38],"research":[39],"media.":[41],"Multiple":[42],"disciplines":[43],"have":[44],"contributed":[45],"APT":[47,126],"research,":[48,127],"offering":[49],"various":[50],"attack":[51],"models,":[52],"defense":[53],"strategies,":[54],"mitigation":[56],"techniques.":[57],"However,":[58],"field":[60],"lacks":[61],"systematic,":[63],"cohesive":[64],"classification":[65],"framework,":[66],"making":[67],"it":[68,117],"challenging":[69],"for":[70,80,93],"practitioners":[71,146],"identify":[73],"most":[75,121],"relevant":[76],"studies":[77],"methodologies":[79],"needs.":[82],"Addressing":[83],"this":[84,137],"gap,":[85],"we":[86,115],"propose":[87],"novel":[89],"cyber-risk":[90],"management":[91],"schema":[92],"organizing":[94],"scientific":[95],"literature":[96],"on":[97],"APTs,":[98],"structured":[99],"support":[101],"comprehensive":[103],"understanding":[104],"application":[106],"of":[107],"APT-related":[108],"knowledge.":[109],"To":[110],"demonstrate":[111],"schema\u2019s":[113],"utility,":[114],"apply":[116],"categorize":[119],"frequently":[122],"cited":[123],"works":[124],"showcasing":[128],"its":[129],"effectiveness":[130],"systematizing":[132],"diverse":[133],"perspectives.":[134],"We":[135],"believe":[136],"work":[138],"facilitates":[139],"knowledge":[140],"organization,":[141],"empowering":[142],"researchers":[144],"fight":[149],"against":[150],"APTs.":[151]},"counts_by_year":[],"updated_date":"2025-12-19T19:40:27.379048","created_date":"2025-10-10T00:00:00"}
