{"id":"https://openalex.org/W2115283141","doi":"https://doi.org/10.1109/discex.2003.1194876","title":"Prophylactic, treatment and containment techniques for ensuring active network security","display_name":"Prophylactic, treatment and containment techniques for ensuring active network security","publication_year":2004,"publication_date":"2004-03-01","ids":{"openalex":"https://openalex.org/W2115283141","doi":"https://doi.org/10.1109/discex.2003.1194876","mag":"2115283141"},"language":"en","primary_location":{"id":"doi:10.1109/discex.2003.1194876","is_oa":false,"landing_page_url":"https://doi.org/10.1109/discex.2003.1194876","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings DARPA Information Survivability Conference and Exposition","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004753901","display_name":"Sandra Murphy","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"S. Murphy","raw_affiliation_strings":["Network Associates Laboratories, USA","[Network Associates Laboratories, USA]"],"affiliations":[{"raw_affiliation_string":"Network Associates Laboratories, USA","institution_ids":[]},{"raw_affiliation_string":"[Network Associates Laboratories, USA]","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070294972","display_name":"A. Hayatnagarkar","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"A. Hayatnagarkar","raw_affiliation_strings":["Network Associates Laboratories, USA","[Network Associates Laboratories, USA]"],"affiliations":[{"raw_affiliation_string":"Network Associates Laboratories, USA","institution_ids":[]},{"raw_affiliation_string":"[Network Associates Laboratories, USA]","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079470760","display_name":"Shonali Krishnaswamy","orcid":"https://orcid.org/0009-0001-4601-3830"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"S. Krishnaswamy","raw_affiliation_strings":["Network Associates Laboratories, USA","[Network Associates Laboratories, USA]"],"affiliations":[{"raw_affiliation_string":"Network Associates Laboratories, USA","institution_ids":[]},{"raw_affiliation_string":"[Network Associates Laboratories, USA]","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003310460","display_name":"W. Morrison","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"W. Morrison","raw_affiliation_strings":["Network Associates Laboratories, USA","[Network Associates Laboratories, USA]"],"affiliations":[{"raw_affiliation_string":"Network Associates Laboratories, USA","institution_ids":[]},{"raw_affiliation_string":"[Network Associates Laboratories, USA]","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025088066","display_name":"Richard Watson","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"R. Watson","raw_affiliation_strings":["Network Associates Laboratories, USA","[Network Associates Laboratories, USA]"],"affiliations":[{"raw_affiliation_string":"Network Associates Laboratories, USA","institution_ids":[]},{"raw_affiliation_string":"[Network Associates Laboratories, USA]","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5004753901"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.6953,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.76849782,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"1","issue":null,"first_page":"97","last_page":"108"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6985507607460022},{"id":"https://openalex.org/keywords/active-networking","display_name":"Active networking","score":0.6383671164512634},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.6364462375640869},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6246811151504517},{"id":"https://openalex.org/keywords/containment","display_name":"Containment (computer programming)","score":0.6132035255432129},{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.6043182015419006},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.544988214969635},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4821593165397644},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.43182963132858276},{"id":"https://openalex.org/keywords/fault-tolerance","display_name":"Fault tolerance","score":0.42710500955581665},{"id":"https://openalex.org/keywords/active-fault","display_name":"Active fault","score":0.4194554090499878},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.34874868392944336},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.22744101285934448},{"id":"https://openalex.org/keywords/fault","display_name":"Fault (geology)","score":0.20715880393981934}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6985507607460022},{"id":"https://openalex.org/C102665078","wikidata":"https://www.wikidata.org/wiki/Q4677571","display_name":"Active networking","level":2,"score":0.6383671164512634},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.6364462375640869},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6246811151504517},{"id":"https://openalex.org/C2777019822","wikidata":"https://www.wikidata.org/wiki/Q390066","display_name":"Containment (computer programming)","level":2,"score":0.6132035255432129},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.6043182015419006},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.544988214969635},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4821593165397644},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.43182963132858276},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.42710500955581665},{"id":"https://openalex.org/C26001220","wikidata":"https://www.wikidata.org/wiki/Q1089248","display_name":"Active fault","level":3,"score":0.4194554090499878},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.34874868392944336},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.22744101285934448},{"id":"https://openalex.org/C175551986","wikidata":"https://www.wikidata.org/wiki/Q47089","display_name":"Fault (geology)","level":2,"score":0.20715880393981934},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C165205528","wikidata":"https://www.wikidata.org/wiki/Q83371","display_name":"Seismology","level":1,"score":0.0},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/discex.2003.1194876","is_oa":false,"landing_page_url":"https://doi.org/10.1109/discex.2003.1194876","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings DARPA Information Survivability Conference and Exposition","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6100000143051147,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1518483596","https://openalex.org/W1593700268","https://openalex.org/W1601376565","https://openalex.org/W1801992356","https://openalex.org/W1958859150","https://openalex.org/W2008063947","https://openalex.org/W2132581831","https://openalex.org/W2133337510","https://openalex.org/W2136400262","https://openalex.org/W2138534707","https://openalex.org/W2138930598","https://openalex.org/W2140471436","https://openalex.org/W2146749986","https://openalex.org/W2154671641","https://openalex.org/W2238620963","https://openalex.org/W4285719527","https://openalex.org/W6608937016","https://openalex.org/W6640844813","https://openalex.org/W6680155214","https://openalex.org/W6681922910","https://openalex.org/W6682983935","https://openalex.org/W6689890266","https://openalex.org/W6814336774"],"related_works":["https://openalex.org/W2600062742","https://openalex.org/W2321709401","https://openalex.org/W2004104370","https://openalex.org/W2898075319","https://openalex.org/W3144137556","https://openalex.org/W2185488310","https://openalex.org/W3148042169","https://openalex.org/W2810680364","https://openalex.org/W4245375943","https://openalex.org/W2378773037"],"abstract_inverted_index":{"The":[0,98],"flexibility":[1],"and":[2,88,94],"power":[3],"achieved":[4],"by":[5,101],"using":[6],"active":[7,19,38,59,71,104,114,118],"networks":[8],"come":[9],"with":[10],"their":[11],"own":[12],"risks":[13],"-":[14],"any":[15],"fault":[16,28],"in":[17,29,42,57,65],"the":[18,22,30,58,66,83,117],"code":[20,39,60,105,115],"or":[21],"security":[23,67,84],"infrastructure":[24,68,85],"now":[25],"represents":[26],"a":[27,33],"network":[31],"as":[32,61,63],"whole.":[34],"Secure":[35],"containment":[36,111],"of":[37,69,82,112],"is":[40,86],"necessary":[41],"order":[43],"to":[44],"ameliorate":[45],"this":[46],"risk.":[47],"This":[48],"paper":[49,99],"describes":[50],"innovative":[51],"approaches":[52],"for":[53],"recovering":[54],"from":[55],"faults":[56,64],"well":[62],"an":[70,103],"network.":[72,119],"Diverse":[73],"authentication":[74,90],"techniques":[75],"that":[76,108],"provide":[77],"fail-over":[78],"when":[79],"some":[80],"component":[81],"unavailable,":[87],"compensatory":[89],"techniques,":[91],"both":[92],"prophylactic":[93],"treatment-based,":[95],"are":[96],"discussed.":[97],"concludes":[100],"outlining":[102],"revocation":[106],"architecture":[107],"facilitates":[109],"secure":[110],"faulty":[113],"within":[116]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
