{"id":"https://openalex.org/W2498874063","doi":"https://doi.org/10.1109/icc.2016.7510881","title":"A probabilistic model to preprocess darknet data for cyber threat intelligence generation","display_name":"A probabilistic model to preprocess darknet data for cyber threat intelligence generation","publication_year":2016,"publication_date":"2016-05-01","ids":{"openalex":"https://openalex.org/W2498874063","doi":"https://doi.org/10.1109/icc.2016.7510881","mag":"2498874063"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2016.7510881","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2016.7510881","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039079298","display_name":"Elias Bou\u2010Harb","orcid":"https://orcid.org/0000-0001-8040-4635"},"institutions":[{"id":"https://openalex.org/I63772739","display_name":"Florida Atlantic University","ror":"https://ror.org/05p8w6387","country_code":"US","type":"education","lineage":["https://openalex.org/I63772739"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Elias Bou-Harb","raw_affiliation_strings":["Department of Computer & Electrical Engineering and Computer Science, Florida Atlantic University"],"affiliations":[{"raw_affiliation_string":"Department of Computer & Electrical Engineering and Computer Science, Florida Atlantic University","institution_ids":["https://openalex.org/I63772739"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5039079298"],"corresponding_institution_ids":["https://openalex.org/I63772739"],"apc_list":null,"apc_paid":null,"fwci":0.8686,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.77152429,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"2","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7835496664047241},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.6065194010734558},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4641123414039612},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.4585040211677551},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.333051860332489},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2951168417930603},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.15403282642364502}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7835496664047241},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.6065194010734558},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4641123414039612},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.4585040211677551},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.333051860332489},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2951168417930603},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.15403282642364502}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc.2016.7510881","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2016.7510881","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6200000047683716,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320310801","display_name":"Florida Atlantic University","ror":"https://ror.org/05p8w6387"},{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W148447563","https://openalex.org/W284347760","https://openalex.org/W1748039315","https://openalex.org/W1965334909","https://openalex.org/W1989454965","https://openalex.org/W1989714227","https://openalex.org/W1995823970","https://openalex.org/W2005043824","https://openalex.org/W2015581520","https://openalex.org/W2040146912","https://openalex.org/W2081357650","https://openalex.org/W2112736324","https://openalex.org/W2152436591","https://openalex.org/W2168883902","https://openalex.org/W2169786565","https://openalex.org/W2887926848","https://openalex.org/W4248681815","https://openalex.org/W6610362903"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W4391913857","https://openalex.org/W2350741829","https://openalex.org/W2530322880"],"abstract_inverted_index":{"Internet":[0],"traffic":[1,20,58,119,191],"destined":[2],"to":[3,12,27,100,106,115,142,176],"routable":[4],"yet":[5],"unallocated":[6],"IP":[7],"addresses":[8],"is":[9,21,114,127,151],"commonly":[10],"referred":[11],"as":[13,129],"telescope":[14],"or":[15,62],"darknet":[16,74,102,117,148,183,190],"data.":[17],"Such":[18],"unsolicited":[19],"frequently,":[22],"abundantly":[23],"and":[24,45,120,146,150,192,201,209],"effectively":[25],"exploited":[26],"generate":[28],"various":[29],"cyber":[30],"threat":[31],"intelligence":[32],"related,":[33],"but":[34,88],"not":[35,67,132],"limited":[36],"to,":[37],"scanning":[38],"activities,":[39],"distributed":[40],"denial":[41],"of":[42,56,73,80,156,159,165,181,211],"service":[43],"attacks":[44],"malware":[46],"identification.":[47],"However,":[48],"such":[49,86],"data":[50,103],"typically":[51],"contains":[52],"a":[53,97,172,202],"significant":[54],"amount":[55],"misconfiguration":[57,118],"caused":[59],"by":[60,193],"network/routing":[61],"hardware/software":[63],"faults.":[64],"The":[65,112,125],"latter":[66],"only":[68],"immensely":[69],"affects":[70],"the":[71,78,154,157,160,163,168,179,195,199,207,212],"purity":[72],"data,":[75,87],"which":[76],"hinders":[77],"accuracy":[79,208],"inference":[81],"algorithms":[82],"that":[83],"operate":[84],"on":[85,134],"also":[89],"wastes":[90],"valuable":[91],"storage":[92],"resources.":[93],"This":[94],"paper":[95],"proposes":[96],"probabilistic":[98],"model":[99,126,170,197],"preprocess":[101],"in":[104],"order":[105],"prepare":[107],"it":[108,123,130],"for":[109],"effective":[110],"use.":[111],"aim":[113],"fingerprint":[116],"subsequently":[121],"filter":[122],"out.":[124],"advantageous":[128],"does":[131],"rely":[133],"arbitrary":[135],"cut-off":[136],"thresholds,":[137],"provide":[138],"separate":[139],"likelihood":[140],"models":[141],"distinguish":[143],"between":[144],"miscon-figuration":[145],"other":[147],"traffic,":[149],"independent":[152],"from":[153],"nature":[155],"source":[158],"traffic.":[161,184],"To":[162],"best":[164],"our":[166],"knowledge,":[167],"proposed":[169,196],"renders":[171],"first":[173],"attempt":[174],"ever":[175],"formally":[177],"tackle":[178],"problem":[180],"preprocessing":[182],"Through":[185],"empirical":[186],"evaluations":[187],"using":[188],"real":[189],"comparing":[194],"against":[198],"baseline":[200],"heuristic":[203],"approach,":[204],"we":[205],"demonstrate":[206],"effectiveness":[210],"model.":[213]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
