{"id":"https://openalex.org/W2293175245","doi":"https://doi.org/10.1109/icoin.2016.7427090","title":"An incident response support system based on seriousness of infection","display_name":"An incident response support system based on seriousness of infection","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W2293175245","doi":"https://doi.org/10.1109/icoin.2016.7427090","mag":"2293175245"},"language":"en","primary_location":{"id":"doi:10.1109/icoin.2016.7427090","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icoin.2016.7427090","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 International Conference on Information Networking (ICOIN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021521170","display_name":"Hirokazu Hasegawa","orcid":"https://orcid.org/0000-0001-6841-5358"},"institutions":[{"id":"https://openalex.org/I60134161","display_name":"Nagoya University","ror":"https://ror.org/04chrp450","country_code":"JP","type":"education","lineage":["https://openalex.org/I60134161"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Hirokazu Hasegawa","raw_affiliation_strings":["Graduate School of Information Science, Nagoya University, Furo-cho, Chikusa-ku, Nagoya, Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Information Science, Nagoya University, Furo-cho, Chikusa-ku, Nagoya, Japan","institution_ids":["https://openalex.org/I60134161"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086392139","display_name":"Yukiko Yamaguchi","orcid":null},"institutions":[{"id":"https://openalex.org/I60134161","display_name":"Nagoya University","ror":"https://ror.org/04chrp450","country_code":"JP","type":"education","lineage":["https://openalex.org/I60134161"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yukiko Yamaguchi","raw_affiliation_strings":["Information Technology Center, Nagoya University, Furo-cho, Chikusa-ku, Nagoya, Japan"],"affiliations":[{"raw_affiliation_string":"Information Technology Center, Nagoya University, Furo-cho, Chikusa-ku, Nagoya, Japan","institution_ids":["https://openalex.org/I60134161"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102265280","display_name":"Hajime Shimada","orcid":null},"institutions":[{"id":"https://openalex.org/I60134161","display_name":"Nagoya University","ror":"https://ror.org/04chrp450","country_code":"JP","type":"education","lineage":["https://openalex.org/I60134161"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hajime Shimada","raw_affiliation_strings":["Information Technology Center, Nagoya University, Furo-cho, Chikusa-ku, Nagoya, Japan"],"affiliations":[{"raw_affiliation_string":"Information Technology Center, Nagoya University, Furo-cho, Chikusa-ku, Nagoya, Japan","institution_ids":["https://openalex.org/I60134161"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103015266","display_name":"Hiroki Takakura","orcid":"https://orcid.org/0000-0003-0238-4506"},"institutions":[{"id":"https://openalex.org/I184597095","display_name":"National Institute of Informatics","ror":"https://ror.org/04ksd4g47","country_code":"JP","type":"facility","lineage":["https://openalex.org/I1319490839","https://openalex.org/I184597095","https://openalex.org/I4210158934"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hiroki Takakura","raw_affiliation_strings":["National Institute of informatics, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"National Institute of informatics, Tokyo, Japan","institution_ids":["https://openalex.org/I184597095"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5021521170"],"corresponding_institution_ids":["https://openalex.org/I60134161"],"apc_list":null,"apc_paid":null,"fwci":0.8686,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.75863461,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"6","issue":null,"first_page":"69","last_page":"74"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/seriousness","display_name":"Seriousness","score":0.9359427690505981},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5734553933143616}],"concepts":[{"id":"https://openalex.org/C2776650110","wikidata":"https://www.wikidata.org/wiki/Q12891156","display_name":"Seriousness","level":2,"score":0.9359427690505981},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5734553933143616},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icoin.2016.7427090","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icoin.2016.7427090","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 International Conference on Information Networking (ICOIN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.4699999988079071,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W373347433","https://openalex.org/W1626362440","https://openalex.org/W1975872349","https://openalex.org/W1994444527","https://openalex.org/W2104898295","https://openalex.org/W2132449179","https://openalex.org/W2156416147","https://openalex.org/W2158844134","https://openalex.org/W2491980965","https://openalex.org/W2579906985","https://openalex.org/W2590774105","https://openalex.org/W2617200927","https://openalex.org/W2972007171","https://openalex.org/W6612751987","https://openalex.org/W6636770106"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2028614536","https://openalex.org/W2356638506","https://openalex.org/W1991763283","https://openalex.org/W2089959096","https://openalex.org/W1971282566","https://openalex.org/W3166651797","https://openalex.org/W2129752208","https://openalex.org/W2276473168","https://openalex.org/W17590606"],"abstract_inverted_index":{"Recently,":[0],"cyber":[1,58],"attacks":[2,59],"become":[3],"so":[4,60],"sophisticated":[5],"that":[6,9,61,143],"conventional":[7],"countermeasures":[8,20],"focus":[10],"on":[11,23,113,169],"preventing":[12],"intrusion":[13,25],"are":[14,21],"becoming":[15],"less":[16],"effective.":[17],"Thus,":[18],"recent":[19],"focusing":[22],"after":[24],"such":[26],"as":[27],"an":[28,107],"incident":[29,43,108],"response.":[30],"We":[31],"previously":[32],"proposed":[33,172],"a":[34,72,102,176],"system":[35,48,84,111,118,159,173],"in":[36],"order":[37],"to":[38,54,154],"support":[39,110],"network":[40,156],"administrators":[41],"performing":[42],"responses.":[44],"However,":[45],"our":[46],"previous":[47,83],"uses":[49],"only":[50],"anomaly":[51],"detection":[52,76,123,131,135,179],"technique":[53],"detect":[55],"signs":[56],"of":[57,74,99,115,122,130,146,178],"we":[62,69,137],"may":[63],"overlook":[64],"some":[65],"signs.":[66],"In":[67],"addition,":[68],"bother":[70],"with":[71,86,96],"lot":[73],"unimportant":[75],"reports":[77],"including":[78],"many":[79],"false":[80,183],"positives.":[81],"Our":[82],"deals":[85],"detected":[87],"malware":[88,149],"one":[89],"by":[90],"one.":[91],"Such":[92],"behavior":[93],"cannot":[94],"cope":[95],"various":[97,120],"situations":[98],"incidents.":[100],"As":[101],"solution,":[103],"this":[104],"paper":[105],"proposes":[106],"response":[109],"based":[112,168],"seriousness":[114],"infection.":[116,150],"The":[117,171],"combines":[119],"types":[121],"techniques":[124],"and":[125,164,186],"raises":[126],"the":[127,158,182],"large":[128],"number":[129,177],"report.":[132],"To":[133],"manage":[134],"reports,":[136,180],"define":[138],"Infection":[139],"Suspicious":[140],"Level":[141],"(ISL)":[142],"represents":[144],"degree":[145],"suspicious":[147],"about":[148],"By":[151],"assigning":[152],"ISL":[153],"all":[155],"segments,":[157],"performs":[160],"appropriate":[161],"monitoring,":[162],"analysis,":[163],"takes":[165],"countermeasure":[166],"semi-automatically":[167],"ISL.":[170],"can":[174],"raise":[175],"reduce":[181],"positive":[184],"problem,":[185],"provide":[187],"several":[188],"strategies":[189],"against":[190],"attack.":[191]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
