{"id":"https://openalex.org/W2120443925","doi":"https://doi.org/10.1109/isi.2012.6284294","title":"Using semantic networks to counter cyber threats","display_name":"Using semantic networks to counter cyber threats","publication_year":2012,"publication_date":"2012-06-01","ids":{"openalex":"https://openalex.org/W2120443925","doi":"https://doi.org/10.1109/isi.2012.6284294","mag":"2120443925"},"language":"en","primary_location":{"id":"doi:10.1109/isi.2012.6284294","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2012.6284294","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Conference on Intelligence and Security Informatics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049856645","display_name":"Peng He","orcid":"https://orcid.org/0000-0002-7176-701X"},"institutions":[{"id":"https://openalex.org/I79272384","display_name":"University of Maryland, Baltimore County","ror":"https://ror.org/02qskvh78","country_code":"US","type":"education","lineage":["https://openalex.org/I79272384"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Peng He","raw_affiliation_strings":["Department of Information Systems, University of Maryland Baltimore County, Baltimore, USA","Department of Information Systems, University of Maryland, Baltimore County (UMBC), USA"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems, University of Maryland Baltimore County, Baltimore, USA","institution_ids":["https://openalex.org/I79272384"]},{"raw_affiliation_string":"Department of Information Systems, University of Maryland, Baltimore County (UMBC), USA","institution_ids":["https://openalex.org/I79272384"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065573453","display_name":"George Karabatis","orcid":"https://orcid.org/0000-0002-2208-0801"},"institutions":[{"id":"https://openalex.org/I79272384","display_name":"University of Maryland, Baltimore County","ror":"https://ror.org/02qskvh78","country_code":"US","type":"education","lineage":["https://openalex.org/I79272384"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"George Karabatis","raw_affiliation_strings":["Department of Information Systems, University of Maryland Baltimore County, Baltimore, USA","Department of Information Systems, University of Maryland, Baltimore County (UMBC), USA"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems, University of Maryland Baltimore County, Baltimore, USA","institution_ids":["https://openalex.org/I79272384"]},{"raw_affiliation_string":"Department of Information Systems, University of Maryland, Baltimore County (UMBC), USA","institution_ids":["https://openalex.org/I79272384"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5049856645"],"corresponding_institution_ids":["https://openalex.org/I79272384"],"apc_list":null,"apc_paid":null,"fwci":1.4211,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.87759097,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"184","last_page":"184"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.871399998664856,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.871399998664856,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.7799999713897705,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7541736960411072},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4784707725048065}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7541736960411072},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4784707725048065}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isi.2012.6284294","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2012.6284294","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Conference on Intelligence and Security Informatics","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W4402327032","https://openalex.org/W2382290278"],"abstract_inverted_index":{"Intrusion":[0],"detection":[1,21],"is":[2,127],"one":[3],"of":[4,10,39,84,116,155,189],"the":[5,14,27,37,62,76,94,152,156,177],"most":[6],"challenging":[7],"tasks":[8],"and":[9,29,48,53,86,170,191],"highest":[11],"priority":[12],"in":[13,50,64,82,93,138,187],"cyber":[15,95],"security":[16,96],"field;":[17],"however,":[18],"traditional":[19,171],"intrusion":[20],"techniques":[22],"often":[23],"fail":[24],"to":[25,89,140],"handle":[26],"complex":[28],"uncertain":[30],"network":[31,46,117,126],"attack":[32],"correlation":[33,91,172],"tasks.":[34],"We":[35,105,150],"propose":[36],"usage":[38],"semantic":[40,125,132,147,157],"networks":[41,158],"that":[42,71,176],"build":[43],"relationships":[44],"among":[45],"attacks":[47,118],"assist":[49],"automatically":[51,106],"identifying":[52],"predicting":[54],"related":[55],"attacks.":[56,67],"Also,":[57],"our":[58,72,99],"method":[59],"can":[60],"increase":[61],"precision":[63,85,190],"detecting":[65],"probable":[66],"Experimental":[68],"results":[69],"show":[70],"Semantic":[73,111],"Network":[74,112],"using":[75,119],"Anderberg":[77],"similarity":[78,163,179,185],"measure":[79],"performs":[80],"better":[81],"terms":[83,188],"recall":[87],"compared":[88],"existing":[90],"approaches":[92],"domain.":[97],"Specifically,":[98],"contributions":[100],"are":[101],"as":[102],"follows:":[103],"(1)":[104],"construct":[107],"a":[108,142],"first":[109,123],"mode":[110,124,146],"from":[113],"characterizing":[114],"features":[115],"similarity.":[120],"(2)":[121],"The":[122],"calibrated":[128],"by":[129,135,159],"adding":[130],"external":[131],"rules":[133],"provided":[134],"domain":[136],"experts,":[137],"order":[139],"generate":[141],"more":[143],"adaptable":[144],"second":[145],"network.":[148],"(3)":[149],"evaluated":[151],"prediction":[153],"capability":[154],"experimenting":[160],"with":[161],"various":[162],"measures":[164,186],"including":[165],"Anderberg,":[166],"Jaccard,":[167],"Simple":[168],"Matching":[169],"coefficients;":[173],"we":[174],"discovered":[175],"\u201cAnderberg\u201d":[178],"coefficients":[180],"outperform":[181],"all":[182],"other":[183],"tested":[184],"recall.":[192]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":4},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
