{"id":"https://openalex.org/W4404031818","doi":"https://doi.org/10.1109/icccnt61001.2024.10725069","title":"Examining the Role of Guardian Communications Software Design for Network Security","display_name":"Examining the Role of Guardian Communications Software Design for Network Security","publication_year":2024,"publication_date":"2024-06-24","ids":{"openalex":"https://openalex.org/W4404031818","doi":"https://doi.org/10.1109/icccnt61001.2024.10725069"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt61001.2024.10725069","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icccnt61001.2024.10725069","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082329278","display_name":"Rakesh Kumar Giri","orcid":"https://orcid.org/0000-0003-1208-5622"},"institutions":[{"id":"https://openalex.org/I2800472358","display_name":"Sunrise University","ror":"https://ror.org/03av5bg62","country_code":"IN","type":"education","lineage":["https://openalex.org/I2800472358"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Rakesh Kumar Giri","raw_affiliation_strings":["Sunrise University,DepartmenT of Computer Science &#x0026; Engineering,Alwar,India,301028"],"affiliations":[{"raw_affiliation_string":"Sunrise University,DepartmenT of Computer Science &#x0026; Engineering,Alwar,India,301028","institution_ids":["https://openalex.org/I2800472358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114511777","display_name":"Madhuri Harshal Chaudhari","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Madhuri Harshal Chaudhari","raw_affiliation_strings":["Dr.D.Y.Patil Science and Computer Science college,Department of Computer Science,Akurdi pune"],"affiliations":[{"raw_affiliation_string":"Dr.D.Y.Patil Science and Computer Science college,Department of Computer Science,Akurdi pune","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043297577","display_name":"Ashish Verma","orcid":"https://orcid.org/0000-0002-2350-9681"},"institutions":[{"id":"https://openalex.org/I74319210","display_name":"Chitkara University","ror":"https://ror.org/057d6z539","country_code":"IN","type":"education","lineage":["https://openalex.org/I74319210"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ashish Verma","raw_affiliation_strings":["Chitkara University,Centre of Research Impact and Outcome,Rajpura,Punjab,India,140417"],"affiliations":[{"raw_affiliation_string":"Chitkara University,Centre of Research Impact and Outcome,Rajpura,Punjab,India,140417","institution_ids":["https://openalex.org/I74319210"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049362742","display_name":"Dharmesh Dhabliya","orcid":"https://orcid.org/0000-0002-6340-2993"},"institutions":[{"id":"https://openalex.org/I188963388","display_name":"International Institute of Information Technology","ror":"https://ror.org/02dernx73","country_code":"IN","type":"education","lineage":["https://openalex.org/I188963388"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Dharmesh Dhabliya","raw_affiliation_strings":["Vishwakarma Institute of Information Technology,Department of Information Technology,Pune,Maharashtra,India"],"affiliations":[{"raw_affiliation_string":"Vishwakarma Institute of Information Technology,Department of Information Technology,Pune,Maharashtra,India","institution_ids":["https://openalex.org/I188963388"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005921539","display_name":"Lokesh Kumar","orcid":"https://orcid.org/0000-0001-6167-9625"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"L.Vinoth Kumar","raw_affiliation_strings":["Technology University,Department of Information,Chennai,India"],"affiliations":[{"raw_affiliation_string":"Technology University,Department of Information,Chennai,India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052511301","display_name":"B. Jaison","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"B. Jaison","raw_affiliation_strings":["R.M.K.Engineering College,Department of Computer Science and Engineering,Kavarapettai,601206"],"affiliations":[{"raw_affiliation_string":"R.M.K.Engineering College,Department of Computer Science and Engineering,Kavarapettai,601206","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5082329278"],"corresponding_institution_ids":["https://openalex.org/I2800472358"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.30613662,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.979200005531311,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.979200005531311,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9146000146865845,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6868895888328552},{"id":"https://openalex.org/keywords/guardian","display_name":"Guardian","score":0.6764644384384155},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.5829485654830933},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4415062665939331},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44106894731521606},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3213272988796234},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.2501526474952698},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.18327537178993225},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.1648540198802948},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.13856306672096252}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6868895888328552},{"id":"https://openalex.org/C2776680780","wikidata":"https://www.wikidata.org/wiki/Q15964604","display_name":"Guardian","level":2,"score":0.6764644384384155},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.5829485654830933},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4415062665939331},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44106894731521606},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3213272988796234},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2501526474952698},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.18327537178993225},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.1648540198802948},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.13856306672096252},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt61001.2024.10725069","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icccnt61001.2024.10725069","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W3011240986","https://openalex.org/W4210753383","https://openalex.org/W4223999938","https://openalex.org/W4251905560","https://openalex.org/W4312245926","https://openalex.org/W4360994223","https://openalex.org/W4366377548","https://openalex.org/W4379163602","https://openalex.org/W4383264908","https://openalex.org/W4387000350","https://openalex.org/W4387712659","https://openalex.org/W4387712947","https://openalex.org/W4388039407","https://openalex.org/W4388039408","https://openalex.org/W4388039486","https://openalex.org/W4388039501","https://openalex.org/W4389445886"],"related_works":["https://openalex.org/W2495989387","https://openalex.org/W1964935100","https://openalex.org/W3183704944","https://openalex.org/W1671742159","https://openalex.org/W4231486762","https://openalex.org/W646220697","https://openalex.org/W2360859308","https://openalex.org/W2943504545","https://openalex.org/W3104711963","https://openalex.org/W2738390234"],"abstract_inverted_index":{"Network":[0,193],"protection":[1,93],"is":[2,30,114,160,196],"a":[3,31,56,120,197],"crucial":[4],"region":[5],"of":[6,55,186],"generation":[7],"and":[8,11,14,20,53,69,87,100,130,133,144,155,169,181],"PC":[9],"technology,":[10],"numerous":[12],"equipment":[13],"techniques":[15],"help":[16],"ensure":[17],"comfy":[18],"conversation":[19],"records":[21],"switch.":[22],"Mum":[23],"or":[24,77,90],"Dad":[25],"Communications":[26],"software":[27],"program":[28],"(GCS)":[29],"product":[32],"suite":[33,61],"that":[34,118,166,200],"gives":[35],"customers":[36],"an":[37,45,67,115,161],"answer":[38],"for":[39],"securing":[40],"their":[41],"networks.":[42],"GCS":[43],"offers":[44],"interactive":[46],"person":[47],"interface":[48],"to":[49,106,123,142,151,171],"facilitate":[50],"configuration,":[51],"analysis,":[52],"optimization":[54],"community\u2019s":[57],"safety":[58],"architecture.":[59],"The":[60,111,157],"carries":[62],"three":[63],"core":[64],"components,":[65],"supplying":[66],"excellent":[68],"specialized":[70],"feature.":[71],"These":[72],"additives":[73],"are":[74],"the":[75,80,88,124,176,184,191],"mum":[76],"dad":[78],"Firewall,":[79],"guardian":[81],"Host":[82],"Intrusion":[83],"Prevention":[84],"System":[85],"(HIPS),":[86],"father":[89],"mother":[91],"community":[92],"appliance":[94,199],"(NSA).":[95],"Each":[96],"component":[97],"works":[98],"independently":[99],"in":[101],"concert":[102],"with":[103,178,204],"each":[104],"other":[105],"provide":[107],"comprehensive":[108],"network":[109,125,163],"security.":[110],"Guardian":[112,158,192],"Firewall":[113],"application-level":[116],"firewall":[117],"provides":[119],"secure":[121,153],"edge":[122],"by":[126],"controlling":[127],"all":[128],"incoming":[129],"outgoing":[131],"traffic":[132,147],"packet":[134],"communications.":[135],"It":[136],"dynamically":[137],"updates":[138],"its":[139],"rules":[140],"database":[141],"recognize":[143],"block":[145],"malicious":[146,188],"while":[148,174],"allowing":[149],"access":[150],"known":[152],"applications":[154],"services.":[156],"HIPS":[159],"internal":[162],"monitoring":[164],"system":[165],"can":[167,201],"detect":[168],"respond":[170],"unauthorized":[172],"intrusions":[173],"providing":[175],"administrator":[177],"real-time":[179],"alerts":[180],"intelligence":[182],"about":[183],"nature":[185],"any":[187],"activity.":[189],"Finally,":[190],"Security":[194],"Appliance":[195],"hardware-based":[198],"be":[202],"configured":[203],"firewalls":[205],"and.":[206]},"counts_by_year":[],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
