{"id":"https://openalex.org/W4297099561","doi":"https://doi.org/10.1109/dsc54232.2022.9888873","title":"A Scary Peek into The Future: Advanced Persistent Threats in Emerging Computing Environments","display_name":"A Scary Peek into The Future: Advanced Persistent Threats in Emerging Computing Environments","publication_year":2022,"publication_date":"2022-06-22","ids":{"openalex":"https://openalex.org/W4297099561","doi":"https://doi.org/10.1109/dsc54232.2022.9888873"},"language":"en","primary_location":{"id":"doi:10.1109/dsc54232.2022.9888873","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsc54232.2022.9888873","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055415812","display_name":"Talal Halabi","orcid":"https://orcid.org/0000-0002-1922-5803"},"institutions":[{"id":"https://openalex.org/I872945872","display_name":"University of Winnipeg","ror":"https://ror.org/02gdzyx04","country_code":"CA","type":"education","lineage":["https://openalex.org/I872945872"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Talal Halabi","raw_affiliation_strings":["The University of Winnipeg,Winnipeg,MB,Canada","The University of Winnipeg, Winnipeg, MB, Canada"],"affiliations":[{"raw_affiliation_string":"The University of Winnipeg,Winnipeg,MB,Canada","institution_ids":["https://openalex.org/I872945872"]},{"raw_affiliation_string":"The University of Winnipeg, Winnipeg, MB, Canada","institution_ids":["https://openalex.org/I872945872"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040455695","display_name":"Aawista Chaudhry","orcid":null},"institutions":[{"id":"https://openalex.org/I204722609","display_name":"Queen's University","ror":"https://ror.org/02y72wh86","country_code":"CA","type":"education","lineage":["https://openalex.org/I204722609"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Aawista Chaudhry","raw_affiliation_strings":["Queen&#x0027;s University,Kingston,ON,Canada"],"affiliations":[{"raw_affiliation_string":"Queen&#x0027;s University,Kingston,ON,Canada","institution_ids":["https://openalex.org/I204722609"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057127359","display_name":"Sarra Alqahtani","orcid":"https://orcid.org/0000-0003-4572-7150"},"institutions":[{"id":"https://openalex.org/I47251452","display_name":"Wake Forest University","ror":"https://ror.org/0207ad724","country_code":"US","type":"education","lineage":["https://openalex.org/I47251452"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sarra Alqahtani","raw_affiliation_strings":["Wake Forest University,Winston-Salem,NC,USA","Wake Forest University, Winston-Salem, NC, USA"],"affiliations":[{"raw_affiliation_string":"Wake Forest University,Winston-Salem,NC,USA","institution_ids":["https://openalex.org/I47251452"]},{"raw_affiliation_string":"Wake Forest University, Winston-Salem, NC, USA","institution_ids":["https://openalex.org/I47251452"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005563986","display_name":"Mohammad Zulkernine","orcid":"https://orcid.org/0000-0003-1697-4101"},"institutions":[{"id":"https://openalex.org/I204722609","display_name":"Queen's University","ror":"https://ror.org/02y72wh86","country_code":"CA","type":"education","lineage":["https://openalex.org/I204722609"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Mohammad Zulkernine","raw_affiliation_strings":["Queen&#x0027;s University,Kingston,ON,Canada"],"affiliations":[{"raw_affiliation_string":"Queen&#x0027;s University,Kingston,ON,Canada","institution_ids":["https://openalex.org/I204722609"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5055415812"],"corresponding_institution_ids":["https://openalex.org/I872945872"],"apc_list":null,"apc_paid":null,"fwci":0.2975,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.50859599,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6845049858093262},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.659890353679657},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6181323528289795},{"id":"https://openalex.org/keywords/ubiquitous-computing","display_name":"Ubiquitous computing","score":0.6170543432235718},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.14678418636322021}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6845049858093262},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.659890353679657},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6181323528289795},{"id":"https://openalex.org/C172195944","wikidata":"https://www.wikidata.org/wiki/Q541265","display_name":"Ubiquitous computing","level":2,"score":0.6170543432235718},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.14678418636322021},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dsc54232.2022.9888873","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsc54232.2022.9888873","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.5799999833106995}],"awards":[{"id":"https://openalex.org/G4711214724","display_name":null,"funder_award_id":"2105007","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G5972211827","display_name":null,"funder_award_id":"RGPIN-2021-04342","funder_id":"https://openalex.org/F4320334593","funder_display_name":"Natural Sciences and Engineering Research Council of Canada"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W1109422923","https://openalex.org/W1533945010","https://openalex.org/W1979038365","https://openalex.org/W2012477354","https://openalex.org/W2039427951","https://openalex.org/W2275713809","https://openalex.org/W2317748259","https://openalex.org/W2406619912","https://openalex.org/W2537328283","https://openalex.org/W2603766943","https://openalex.org/W2607077291","https://openalex.org/W2617334298","https://openalex.org/W2748868501","https://openalex.org/W2885684053","https://openalex.org/W2894800974","https://openalex.org/W2910711617","https://openalex.org/W2947832965","https://openalex.org/W2951270751","https://openalex.org/W3014985682","https://openalex.org/W3024313662","https://openalex.org/W3035743269","https://openalex.org/W3042764450","https://openalex.org/W3082273522","https://openalex.org/W3091248212","https://openalex.org/W3115687132","https://openalex.org/W3116666954","https://openalex.org/W3119657649","https://openalex.org/W3129082341","https://openalex.org/W3130705826","https://openalex.org/W3136620885","https://openalex.org/W3150711932","https://openalex.org/W3162111110","https://openalex.org/W3167712570","https://openalex.org/W3169607806","https://openalex.org/W3171620138","https://openalex.org/W3196872125","https://openalex.org/W3198511875","https://openalex.org/W6743493502","https://openalex.org/W6781007342","https://openalex.org/W6790799842"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4244478748","https://openalex.org/W4223488648","https://openalex.org/W2134969820","https://openalex.org/W2251605416","https://openalex.org/W1997222214","https://openalex.org/W2560439919","https://openalex.org/W4389340727"],"abstract_inverted_index":{"The":[0,166],"last":[1],"decade":[2],"witnessed":[3],"a":[4,17,48,83,149],"gradual":[5],"shift":[6],"from":[7],"cloud-based":[8],"computing":[9,25,37,74,145],"towards":[10,158],"ubiquitous":[11],"computing,":[12],"which":[13],"has":[14],"put":[15],"at":[16],"greater":[18],"security":[19,45,87,172],"risk":[20],"every":[21],"element":[22],"of":[23,44,99,135],"the":[24,57,65,96],"ecosystem":[26],"including":[27],"devices,":[28],"data,":[29],"network,":[30],"and":[31,47,64,69,109,118,124,147,174],"decision":[32],"making.":[33],"Indeed,":[34],"emerging":[35,144],"pervasive":[36,179],"paradigms":[38],"have":[39],"introduced":[40],"an":[41],"un-charted":[42],"territory":[43],"vulnerabilities":[46],"wider":[49],"attack":[50],"surface,":[51],"mainly":[52],"due":[53],"to":[54,111,127,130,152,162],"network":[55,125],"openness,":[56],"underlying":[58],"mechanics":[59],"that":[60,81,105,154],"enable":[61,122],"intelligent":[62,119],"functions,":[63],"deeply":[66],"integrated":[67],"physical":[68],"cyber":[70],"spaces.":[71],"Furthermore,":[72],"interconnected":[73],"environments":[75],"now":[76],"enjoy":[77],"many":[78],"unconventional":[79],"characteristics":[80],"mandate":[82],"radical":[84],"change":[85],"in":[86,116,143,177],"engineering":[88],"tools.":[89],"This":[90],"need":[91],"is":[92,155],"further":[93],"exacerbated":[94],"by":[95],"rapid":[97],"emergence":[98],"new":[100,133,150],"Advanced":[101],"Persistent":[102],"Threats":[103],"(APTs)":[104],"target":[106],"critical":[107],"infrastructures":[108],"aim":[110],"stealthily":[112],"undermine":[113],"their":[114],"operations":[115],"innovative":[117],"ways.":[120],"To":[121],"system":[123],"designers":[126],"be":[128],"prepared":[129],"face":[131],"this":[132,138],"wave":[134],"dangerous":[136],"threats,":[137],"paper":[139],"overviews":[140],"recent":[141],"APTs":[142,153],"systems":[146,160],"proposes":[148],"approach":[151],"more":[156],"tailored":[157],"such":[159],"compared":[161],"traditional":[163],"IT":[164],"infrastructures.":[165],"proposed":[167],"APT":[168],"lifecycle":[169],"will":[170],"inform":[171],"decisions":[173],"implementation":[175],"choices":[176],"future":[178],"networked":[180],"systems.":[181]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
