{"id":"https://openalex.org/W1969518293","doi":"https://doi.org/10.1109/isads.2013.6513420","title":"Cyber security: Threats, reasons, challenges, methodologies and state of the art solutions for industrial applications","display_name":"Cyber security: Threats, reasons, challenges, methodologies and state of the art solutions for industrial applications","publication_year":2013,"publication_date":"2013-03-01","ids":{"openalex":"https://openalex.org/W1969518293","doi":"https://doi.org/10.1109/isads.2013.6513420","mag":"1969518293"},"language":"en","primary_location":{"id":"doi:10.1109/isads.2013.6513420","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isads.2013.6513420","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5107970369","display_name":"Abdul Razzaq","orcid":"https://orcid.org/0000-0001-7089-583X"},"institutions":[{"id":"https://openalex.org/I110357561","display_name":"University of the Sciences","ror":"https://ror.org/048gmay44","country_code":"US","type":"education","lineage":["https://openalex.org/I110357561"]},{"id":"https://openalex.org/I929597975","display_name":"National University of Sciences and Technology","ror":"https://ror.org/03w2j5y17","country_code":"PK","type":"education","lineage":["https://openalex.org/I929597975"]}],"countries":["PK","US"],"is_corresponding":true,"raw_author_name":"Abdul Razzaq","raw_affiliation_strings":["School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology, Islamabad, Pakistan","[School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology, Islamabad, Pakistan]"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology, Islamabad, Pakistan","institution_ids":["https://openalex.org/I929597975"]},{"raw_affiliation_string":"[School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology, Islamabad, Pakistan]","institution_ids":["https://openalex.org/I110357561"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077971690","display_name":"Ali Hur","orcid":"https://orcid.org/0000-0001-9537-2648"},"institutions":[{"id":"https://openalex.org/I110357561","display_name":"University of the Sciences","ror":"https://ror.org/048gmay44","country_code":"US","type":"education","lineage":["https://openalex.org/I110357561"]},{"id":"https://openalex.org/I929597975","display_name":"National University of Sciences and Technology","ror":"https://ror.org/03w2j5y17","country_code":"PK","type":"education","lineage":["https://openalex.org/I929597975"]}],"countries":["PK","US"],"is_corresponding":false,"raw_author_name":"Ali Hur","raw_affiliation_strings":["School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology, Islamabad, Pakistan","[School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology, Islamabad, Pakistan]"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology, Islamabad, Pakistan","institution_ids":["https://openalex.org/I929597975"]},{"raw_affiliation_string":"[School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology, Islamabad, Pakistan]","institution_ids":["https://openalex.org/I110357561"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043544976","display_name":"Hafiz Farooq Ahmad","orcid":"https://orcid.org/0000-0002-8545-9771"},"institutions":[{"id":"https://openalex.org/I110357561","display_name":"University of the Sciences","ror":"https://ror.org/048gmay44","country_code":"US","type":"education","lineage":["https://openalex.org/I110357561"]},{"id":"https://openalex.org/I929597975","display_name":"National University of Sciences and Technology","ror":"https://ror.org/03w2j5y17","country_code":"PK","type":"education","lineage":["https://openalex.org/I929597975"]}],"countries":["PK","US"],"is_corresponding":false,"raw_author_name":"H Farooq Ahmad","raw_affiliation_strings":["School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology, Islamabad, Pakistan","[School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology, Islamabad, Pakistan]"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology, Islamabad, Pakistan","institution_ids":["https://openalex.org/I929597975"]},{"raw_affiliation_string":"[School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology, Islamabad, Pakistan]","institution_ids":["https://openalex.org/I110357561"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089613092","display_name":"Muddassar Masood","orcid":null},"institutions":[{"id":"https://openalex.org/I110357561","display_name":"University of the Sciences","ror":"https://ror.org/048gmay44","country_code":"US","type":"education","lineage":["https://openalex.org/I110357561"]},{"id":"https://openalex.org/I929597975","display_name":"National University of Sciences and Technology","ror":"https://ror.org/03w2j5y17","country_code":"PK","type":"education","lineage":["https://openalex.org/I929597975"]}],"countries":["PK","US"],"is_corresponding":false,"raw_author_name":"Muddassar Masood","raw_affiliation_strings":["School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology, Islamabad, Pakistan","[School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology, Islamabad, Pakistan]"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology, Islamabad, Pakistan","institution_ids":["https://openalex.org/I929597975"]},{"raw_affiliation_string":"[School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology, Islamabad, Pakistan]","institution_ids":["https://openalex.org/I110357561"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5107970369"],"corresponding_institution_ids":["https://openalex.org/I110357561","https://openalex.org/I929597975"],"apc_list":null,"apc_paid":null,"fwci":1.596,"has_fulltext":false,"cited_by_count":74,"citation_normalized_percentile":{"value":0.82417711,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.802432656288147},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.7473563551902771},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6354968547821045},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6071100831031799},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5810254216194153},{"id":"https://openalex.org/keywords/web-engineering","display_name":"Web engineering","score":0.5006134510040283},{"id":"https://openalex.org/keywords/web-application-security","display_name":"Web application security","score":0.4981801509857178},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4683472514152527},{"id":"https://openalex.org/keywords/web-application","display_name":"Web application","score":0.41532260179519653},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3616703152656555},{"id":"https://openalex.org/keywords/web-development","display_name":"Web development","score":0.3264263868331909}],"concepts":[{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.802432656288147},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.7473563551902771},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6354968547821045},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6071100831031799},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5810254216194153},{"id":"https://openalex.org/C97200028","wikidata":"https://www.wikidata.org/wiki/Q1196135","display_name":"Web engineering","level":5,"score":0.5006134510040283},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.4981801509857178},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4683472514152527},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.41532260179519653},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3616703152656555},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.3264263868331909},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isads.2013.6513420","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isads.2013.6513420","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.800000011920929,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W17136585","https://openalex.org/W126332491","https://openalex.org/W329256910","https://openalex.org/W1598544985","https://openalex.org/W1674877186","https://openalex.org/W1800685900","https://openalex.org/W1817601911","https://openalex.org/W1881860748","https://openalex.org/W1975149427","https://openalex.org/W1997892903","https://openalex.org/W2012644581","https://openalex.org/W2021308105","https://openalex.org/W2039683880","https://openalex.org/W2067361528","https://openalex.org/W2099419334","https://openalex.org/W2101306108","https://openalex.org/W2109540106","https://openalex.org/W2120491362","https://openalex.org/W2125789984","https://openalex.org/W2170377904","https://openalex.org/W2462449478","https://openalex.org/W2483850428","https://openalex.org/W3022131440","https://openalex.org/W6600712061","https://openalex.org/W6605196720","https://openalex.org/W6629381366","https://openalex.org/W6637096788"],"related_works":["https://openalex.org/W1583761149","https://openalex.org/W3005817867","https://openalex.org/W2188399467","https://openalex.org/W2913452075","https://openalex.org/W2293103111","https://openalex.org/W3111842522","https://openalex.org/W3166827888","https://openalex.org/W2207901106","https://openalex.org/W1985294818","https://openalex.org/W1564377853"],"abstract_inverted_index":{"Cyber":[0],"Civilization":[1],"has":[2],"become":[3,147],"an":[4],"important":[5,211],"source":[6],"of":[7,27,43,61,67,85,98,128,158,175,200],"information":[8],"sharing":[9],"and":[10,19,57,151,171,197,203],"professional":[11],"activities":[12],"like":[13],"business,":[14],"banking":[15],"transactions,":[16],"shopping,":[17],"services":[18],"advertisement.":[20],"With":[21,64],"the":[22,41,47,62,65,83,109,122,132,141,148,153,156,162,172,181,193],"exponentially":[23],"increase":[24,33,77],"in":[25,78,114,120,144],"usage":[26],"cyberspace,":[28],"cybercriminal":[29],"actives":[30],"are":[31,180],"also":[32,51,215],"exponentially.":[34],"The":[35],"basic":[36],"reasons":[37],"is":[38],"that":[39],"with":[40,75],"inception":[42],"world":[44],"wide":[45],"web,":[46],"web":[48,69,93,115,133],"applications":[49,70,94,146],"were":[50,71],"getting":[52,72,121],"popularity":[53],"for":[54,185,206],"data":[55,58],"storing":[56],"sharing,":[59],"irrespective":[60],"user.":[63],"passage":[66],"time":[68],"more":[73],"complex":[74],"rapid":[76],"their":[79],"design":[80,99],"faults,":[81],"creating":[82],"surfing":[84],"internet":[86],"totally":[87],"unsafe.":[88],"More":[89],"than":[90],"90":[91],"percent":[92],"have":[95],"some":[96,212],"kind":[97],"or":[100],"development":[101],"fault":[102],"which":[103],"can":[104,117],"be":[105,137],"easily":[106],"exploited":[107],"by":[108],"cyber":[110,186,195],"criminals.":[111,187],"These":[112],"faults":[113],"application":[116,134,154,214],"help":[118],"criminals":[119],"illegal":[123,159],"access":[124],"to":[125,155],"trade":[126],"secrets":[127],"any":[129],"business.":[130],"Sometime":[131],"may":[135],"not":[136],"posing":[138],"threat":[139],"but":[140],"technology":[142],"used":[143,205],"these":[145],"root":[149],"cause":[150],"put":[152],"risk":[157],"access.":[160],"Presently":[161],"social":[163],"networks,":[164],"Internet":[165],"connected":[166],"mobile":[167],"devices,":[168],"individual":[169],"privacy,":[170],"online":[173],"connectivity":[174],"entities":[176],"such":[177],"as":[178],"banks":[179],"most":[182],"enticing":[183],"targets":[184],"In":[188],"this":[189,217],"survey":[190],"we":[191],"highlight":[192],"common":[194],"threats":[196],"detailed":[198],"analysis":[199],"existing":[201],"system":[202],"methodology":[204],"its":[207],"industrial":[208,213],"solutions.":[209],"Some":[210],"analyzed":[216],"paper.":[218]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":12},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":9},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":3},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
