{"id":"https://openalex.org/W2763500028","doi":"https://doi.org/10.1109/cybersa.2017.8073384","title":"Security operations centre: Situation awareness, threat intelligence and cybercrime","display_name":"Security operations centre: Situation awareness, threat intelligence and cybercrime","publication_year":2017,"publication_date":"2017-06-01","ids":{"openalex":"https://openalex.org/W2763500028","doi":"https://doi.org/10.1109/cybersa.2017.8073384","mag":"2763500028"},"language":"en","primary_location":{"id":"doi:10.1109/cybersa.2017.8073384","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cybersa.2017.8073384","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023134129","display_name":"Cyril Onwubiko","orcid":"https://orcid.org/0000-0003-0174-8232"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Cyril Onwubiko","raw_affiliation_strings":["Cyber Security Intelligence, Research Series, London, UK"],"affiliations":[{"raw_affiliation_string":"Cyber Security Intelligence, Research Series, London, UK","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5023134129"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.2432,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.82870081,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9883999824523926,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9861000180244446,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.9355608820915222},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.8283351063728333},{"id":"https://openalex.org/keywords/situation-awareness","display_name":"Situation awareness","score":0.6415890455245972},{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.6271219849586487},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5431917309761047},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.5391120910644531},{"id":"https://openalex.org/keywords/pace","display_name":"Pace","score":0.5201190710067749},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.4584393799304962},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.4132125973701477},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3297499418258667},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1672772467136383}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.9355608820915222},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.8283351063728333},{"id":"https://openalex.org/C145804949","wikidata":"https://www.wikidata.org/wiki/Q478123","display_name":"Situation awareness","level":2,"score":0.6415890455245972},{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.6271219849586487},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5431917309761047},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.5391120910644531},{"id":"https://openalex.org/C2777526511","wikidata":"https://www.wikidata.org/wiki/Q691543","display_name":"Pace","level":2,"score":0.5201190710067749},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.4584393799304962},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.4132125973701477},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3297499418258667},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1672772467136383},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cybersa.2017.8073384","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cybersa.2017.8073384","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4399999976158142,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2974346246","https://openalex.org/W4242728933","https://openalex.org/W2493430149","https://openalex.org/W4288049909","https://openalex.org/W2912641888","https://openalex.org/W2491808042","https://openalex.org/W2563739196","https://openalex.org/W2460691332","https://openalex.org/W2943610928","https://openalex.org/W3119634295"],"abstract_inverted_index":{"There":[0],"have":[1,67,98],"been":[2,60,68],"longitudinal":[3],"advances":[4],"in":[5,10,49,90,157,224],"both":[6],"cybersecurity":[7,142],"and":[8,37,47,56,62,70,117,124,146,176,178,195,220,229,232,235],"cyber-threats":[9,147],"recent":[11],"years.":[12,94],"With":[13],"cybersecurity,":[14,105],"for":[15,164],"instance,":[16],"there":[17,26],"are":[18,27,71,173,215],"now":[19,72,174],"mechanisms":[20,109],"to":[21,74,77,131,153,201,217,226],"geographically":[22],"locate":[23],"an":[24,100],"entity;":[25],"those":[28,38],"that":[29,39,106,112,126,129],"can":[30,40],"intercept":[31],"most":[32,42],"forms":[33],"of":[34,44,54,83,193],"electronic":[35,50],"communications,":[36],"recover":[41,118],"types":[43],"hidden":[45],"images":[46],"data":[48],"devices.":[51],"The":[52],"pace":[53],"change":[55],"advancements":[57],"has":[58,88],"equally":[59],"astronomical":[61],"astonishing.":[63],"Technology":[64],"refresh":[65],"cycles":[66],"slashed,":[69],"estimated":[73],"between":[75,104,141],"12":[76],"18":[78],"months,":[79],"while":[80],"the":[81,91,136,149,165,191],"number":[82],"cyber":[84,122,137,204,209],"users":[85],"or":[86,120,134,167],"entities":[87],"quadrupled":[89],"last":[92],"five":[93],"These":[95],"continuous":[96],"changes":[97],"left":[99],"ever":[101],"increasing":[102],"gap":[103,140],"is,":[107,127],"control":[108],"(a.k.a.":[110],"safeguards)":[111],"help":[113],"protect,":[114],"detect,":[115],"respond":[116],"organisational":[119],"national":[121],"investment,":[123],"cyber-threats,":[125],"threats":[128],"aim":[130],"exploit,":[132],"breach":[133],"circumvent":[135],"controls.":[138],"This":[139,185],"on":[143,148],"one":[144],"hand":[145,151],"other":[150],"appears":[152],"widen":[154],"even":[155],"further":[156,188],"areas":[158],"with":[159],"far":[160,180],"greater":[161,182],"financial":[162],"rewards":[163],"criminals,":[166],"nation":[168],"state":[169],"political":[170],"gains.":[171],"Exploits":[172],"common":[175,228],"frequent,":[177],"impacts":[179],"much":[181],"than":[183],"before.":[184],"situation":[186],"is":[187],"exacerbated":[189],"by":[190],"lack":[192],"adequate":[194],"well":[196],"deployed":[197],"security":[198,210],"operations":[199,211],"centres":[200],"monitor":[202],"organizational":[203],"investments.":[205],"In":[206],"this":[207],"research":[208],"centre":[212],"deployment":[213],"models":[214],"proposed":[216],"provide":[218],"better":[219],"enhanced":[221],"situational":[222],"awareness":[223],"order":[225],"detect":[227],"frequent":[230],"exploits,":[231],"also":[233],"sophisticated":[234],"cross-channel":[236],"exploits.":[237]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
