{"id":"https://openalex.org/W2766990634","doi":"https://doi.org/10.1109/cybersa.2017.8073390","title":"Multi-dimensional structural data integration for proactive cyber-defence","display_name":"Multi-dimensional structural data integration for proactive cyber-defence","publication_year":2017,"publication_date":"2017-06-01","ids":{"openalex":"https://openalex.org/W2766990634","doi":"https://doi.org/10.1109/cybersa.2017.8073390","mag":"2766990634"},"language":"en","primary_location":{"id":"doi:10.1109/cybersa.2017.8073390","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cybersa.2017.8073390","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108647523","display_name":"Ikwu Ruth","orcid":null},"institutions":[{"id":"https://openalex.org/I59433898","display_name":"Brunel University of London","ror":"https://ror.org/00dn4t376","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I59433898"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Ikwu Ruth","raw_affiliation_strings":["Department of Computer Science, Brunel University, London, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Brunel University, London, United Kingdom","institution_ids":["https://openalex.org/I59433898"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5108647523"],"corresponding_institution_ids":["https://openalex.org/I59433898"],"apc_list":null,"apc_paid":null,"fwci":0.5051,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.75943934,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.9841505885124207},{"id":"https://openalex.org/keywords/sophistication","display_name":"Sophistication","score":0.7622900009155273},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6404557824134827},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.6253399848937988},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6049339771270752},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5694411993026733},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.46635663509368896},{"id":"https://openalex.org/keywords/cyberwarfare","display_name":"Cyberwarfare","score":0.43866729736328125},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.43316125869750977},{"id":"https://openalex.org/keywords/information-warfare","display_name":"Information warfare","score":0.41508084535598755},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.29696616530418396},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.11062327027320862},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.08111688494682312},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.06862697005271912}],"concepts":[{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.9841505885124207},{"id":"https://openalex.org/C168725872","wikidata":"https://www.wikidata.org/wiki/Q991663","display_name":"Sophistication","level":2,"score":0.7622900009155273},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6404557824134827},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.6253399848937988},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6049339771270752},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5694411993026733},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.46635663509368896},{"id":"https://openalex.org/C171769113","wikidata":"https://www.wikidata.org/wiki/Q849340","display_name":"Cyberwarfare","level":2,"score":0.43866729736328125},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.43316125869750977},{"id":"https://openalex.org/C2781349506","wikidata":"https://www.wikidata.org/wiki/Q911036","display_name":"Information warfare","level":2,"score":0.41508084535598755},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.29696616530418396},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.11062327027320862},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.08111688494682312},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.06862697005271912},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cybersa.2017.8073390","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cybersa.2017.8073390","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W20141250","https://openalex.org/W61536862","https://openalex.org/W228207274","https://openalex.org/W1157343470","https://openalex.org/W1415990210","https://openalex.org/W1501321335","https://openalex.org/W1552949272","https://openalex.org/W1809951428","https://openalex.org/W1892328580","https://openalex.org/W1969701495","https://openalex.org/W1973083939","https://openalex.org/W2005604419","https://openalex.org/W2007087405","https://openalex.org/W2007708753","https://openalex.org/W2026892459","https://openalex.org/W2065311781","https://openalex.org/W2073357813","https://openalex.org/W2074548145","https://openalex.org/W2082074857","https://openalex.org/W2101196063","https://openalex.org/W2115379950","https://openalex.org/W2116601187","https://openalex.org/W2134738608","https://openalex.org/W2135591260","https://openalex.org/W2142889610","https://openalex.org/W2171468534","https://openalex.org/W2178225550","https://openalex.org/W2182820370","https://openalex.org/W2404532944","https://openalex.org/W2412252067","https://openalex.org/W2557548266","https://openalex.org/W2565131261","https://openalex.org/W3098102491","https://openalex.org/W4233713109","https://openalex.org/W4295309694","https://openalex.org/W4301266338","https://openalex.org/W6600828923","https://openalex.org/W6602494022","https://openalex.org/W6628371068","https://openalex.org/W6630017550","https://openalex.org/W6638635620","https://openalex.org/W6643632460","https://openalex.org/W6679589654","https://openalex.org/W6731065626","https://openalex.org/W6999213386"],"related_works":["https://openalex.org/W3199176789","https://openalex.org/W572753062","https://openalex.org/W4231575471","https://openalex.org/W3216923094","https://openalex.org/W2027102977","https://openalex.org/W2506686211","https://openalex.org/W2293155410","https://openalex.org/W2358245908","https://openalex.org/W2068448350","https://openalex.org/W3021831513"],"abstract_inverted_index":{"The":[0,75,78,133],"current":[1],"cyber":[2,32,36,142],"defences":[3],"at":[4],"technical":[5],"and":[6,21,31,45,51,68,120,126],"operational":[7],"levels":[8],"have":[9],"consistently":[10],"proven":[11],"inefficient":[12],"to":[13],"counter":[14],"the":[15,19,25,41,48,70,93,103],"ever-growing":[16],"sophistication":[17],"of":[18,27,43,54,66,73,77,95,100,110,124,131],"adversary":[20],"modern":[22,28],"cyber-attacks.":[23,74],"Given":[24],"interconnectedness":[26,42],"societies,":[29],"physical":[30],"events,":[33],"building":[34,140],"proactive":[35,141],"defence":[37,143],"models":[38,144],"that":[39,60,91,105],"consider":[40],"events":[44,104],"activities":[46,96],"across":[47],"physical,":[49],"social":[50],"economic":[52],"realities":[53],"cyberspace":[55,80,115],"is":[56,86],"an":[57,117],"important":[58],"task":[59],"helps":[61],"detect":[62],"early":[63],"warning":[64],"signs":[65],"cyber-attacks":[67],"predict":[69],"future":[71],"occurrences":[72],"concept":[76],"Entangled":[79],"as":[81],"introduced":[82],"in":[83],"this":[84],"paper,":[85],"a":[87,136,146],"cyber-defence":[88],"analytical":[89,118],"framework":[90,134],"captures":[92],"effects":[94],"on":[97,102,107],"one":[98],"layer":[99],"cyberspace,":[101],"emerge":[106],"other":[108],"layers":[109,130],"cyberspace.":[111,132,149],"This":[112],"article":[113],"describes":[114],"from":[116,128,145],"perspective":[119],"identifies":[121],"primary":[122],"sources":[123],"data":[125],"information":[127],"various":[129],"provides":[135],"solid":[137],"foundation":[138],"for":[139],"seemingly":[147],"entangled":[148]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
