{"id":"https://openalex.org/W1973192879","doi":"https://doi.org/10.1109/isi.2013.6578784","title":"Dynamic information-theoretic measures for security informatics","display_name":"Dynamic information-theoretic measures for security informatics","publication_year":2013,"publication_date":"2013-06-01","ids":{"openalex":"https://openalex.org/W1973192879","doi":"https://doi.org/10.1109/isi.2013.6578784","mag":"1973192879"},"language":"en","primary_location":{"id":"doi:10.1109/isi.2013.6578784","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2013.6578784","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE International Conference on Intelligence and Security Informatics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109898420","display_name":"R. Colbaugh","orcid":null},"institutions":[{"id":"https://openalex.org/I4210104735","display_name":"Sandia National Laboratories","ror":"https://ror.org/01apwpt12","country_code":"US","type":"facility","lineage":["https://openalex.org/I1330989302","https://openalex.org/I198811213","https://openalex.org/I4210104735"]},{"id":"https://openalex.org/I192454743","display_name":"Sandia National Laboratories California","ror":"https://ror.org/058m7ey48","country_code":"US","type":"facility","lineage":["https://openalex.org/I1330989302","https://openalex.org/I1330989302","https://openalex.org/I192454743","https://openalex.org/I198811213","https://openalex.org/I198811213","https://openalex.org/I4210104735"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Richard Colbaugh","raw_affiliation_strings":["Sandia National Laboratories, Albuquerque, NM, USA","Sandia National Lab, Albuquerque, NM (USA)"],"affiliations":[{"raw_affiliation_string":"Sandia National Laboratories, Albuquerque, NM, USA","institution_ids":["https://openalex.org/I4210104735"]},{"raw_affiliation_string":"Sandia National Lab, Albuquerque, NM (USA)","institution_ids":["https://openalex.org/I192454743"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112674752","display_name":"K. Glass","orcid":null},"institutions":[{"id":"https://openalex.org/I192454743","display_name":"Sandia National Laboratories California","ror":"https://ror.org/058m7ey48","country_code":"US","type":"facility","lineage":["https://openalex.org/I1330989302","https://openalex.org/I1330989302","https://openalex.org/I192454743","https://openalex.org/I198811213","https://openalex.org/I198811213","https://openalex.org/I4210104735"]},{"id":"https://openalex.org/I4210104735","display_name":"Sandia National Laboratories","ror":"https://ror.org/01apwpt12","country_code":"US","type":"facility","lineage":["https://openalex.org/I1330989302","https://openalex.org/I198811213","https://openalex.org/I4210104735"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kristin Glass","raw_affiliation_strings":["Sandia National Laboratories, Albuquerque, NM, USA","Sandia National Lab, Albuquerque, NM (USA)"],"affiliations":[{"raw_affiliation_string":"Sandia National Laboratories, Albuquerque, NM, USA","institution_ids":["https://openalex.org/I4210104735"]},{"raw_affiliation_string":"Sandia National Lab, Albuquerque, NM (USA)","institution_ids":["https://openalex.org/I192454743"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112868927","display_name":"Travis Bauer","orcid":null},"institutions":[{"id":"https://openalex.org/I192454743","display_name":"Sandia National Laboratories California","ror":"https://ror.org/058m7ey48","country_code":"US","type":"facility","lineage":["https://openalex.org/I1330989302","https://openalex.org/I1330989302","https://openalex.org/I192454743","https://openalex.org/I198811213","https://openalex.org/I198811213","https://openalex.org/I4210104735"]},{"id":"https://openalex.org/I4210104735","display_name":"Sandia National Laboratories","ror":"https://ror.org/01apwpt12","country_code":"US","type":"facility","lineage":["https://openalex.org/I1330989302","https://openalex.org/I198811213","https://openalex.org/I4210104735"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Travis Bauer","raw_affiliation_strings":["Sandia National Laboratories, Albuquerque, NM, USA","Sandia National Lab, Albuquerque, NM (USA)"],"affiliations":[{"raw_affiliation_string":"Sandia National Laboratories, Albuquerque, NM, USA","institution_ids":["https://openalex.org/I4210104735"]},{"raw_affiliation_string":"Sandia National Lab, Albuquerque, NM (USA)","institution_ids":["https://openalex.org/I192454743"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5109898420"],"corresponding_institution_ids":["https://openalex.org/I192454743","https://openalex.org/I4210104735"],"apc_list":null,"apc_paid":null,"fwci":0.7483,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.70512135,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"14","issue":null,"first_page":"45","last_page":"49"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12592","display_name":"Opinion Dynamics and Social Influence","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8109076023101807},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7088392972946167},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5409157872200012},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5348008871078491},{"id":"https://openalex.org/keywords/information-theory","display_name":"Information theory","score":0.5270124673843384},{"id":"https://openalex.org/keywords/informatics","display_name":"Informatics","score":0.5094731450080872},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4849393665790558},{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.4724229574203491},{"id":"https://openalex.org/keywords/dynamical-systems-theory","display_name":"Dynamical systems theory","score":0.4413844645023346},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.4177982211112976},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3928462564945221},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3451067805290222},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3066493272781372},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10041707754135132}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8109076023101807},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7088392972946167},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5409157872200012},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5348008871078491},{"id":"https://openalex.org/C52622258","wikidata":"https://www.wikidata.org/wiki/Q131222","display_name":"Information theory","level":2,"score":0.5270124673843384},{"id":"https://openalex.org/C191630685","wikidata":"https://www.wikidata.org/wiki/Q4027615","display_name":"Informatics","level":2,"score":0.5094731450080872},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4849393665790558},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.4724229574203491},{"id":"https://openalex.org/C79379906","wikidata":"https://www.wikidata.org/wiki/Q3174497","display_name":"Dynamical systems theory","level":2,"score":0.4413844645023346},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.4177982211112976},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3928462564945221},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3451067805290222},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3066493272781372},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10041707754135132},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isi.2013.6578784","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2013.6578784","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE International Conference on Intelligence and Security Informatics","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320337547","display_name":"Laboratory Directed Research and Development","ror":"https://ror.org/01e41cf67"},{"id":"https://openalex.org/F4320338291","display_name":"Sandia National Laboratories","ror":"https://ror.org/01apwpt12"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W125969323","https://openalex.org/W1543932593","https://openalex.org/W1574901103","https://openalex.org/W1967579779","https://openalex.org/W1995243499","https://openalex.org/W2005662348","https://openalex.org/W2015235845","https://openalex.org/W2041782669","https://openalex.org/W2079656335","https://openalex.org/W2091290630","https://openalex.org/W2179615269","https://openalex.org/W2180539791","https://openalex.org/W2478708596","https://openalex.org/W2787894218","https://openalex.org/W4206193984","https://openalex.org/W4230925856","https://openalex.org/W4245558686","https://openalex.org/W4250871362","https://openalex.org/W6673423177"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W4284893819","https://openalex.org/W2249809453","https://openalex.org/W3152891574","https://openalex.org/W2793476610"],"abstract_inverted_index":{"Many":[0],"important":[1,92],"security":[2,53,97],"informatics":[3],"problems":[4,93],"require":[5],"consideration":[6],"of":[7,18,49,76,78,106,141],"dynamical":[8,43,80],"phenomena":[9],"for":[10,41,111],"their":[11],"solution;":[12],"examples":[13],"include":[14],"predicting":[15],"the":[16,47,74,107,122,138,142,155],"behavior":[17],"individuals":[19],"in":[20,52,96],"social":[21,127],"networks":[22],"and":[23,26,70,82,114,129],"distinguishing":[24,131],"malicious":[25],"innocent":[27],"computer":[28],"network":[29],"activities":[30],"based":[31,136],"on":[32,57,137],"activity":[33],"traces.":[34],"While":[35],"information":[36,108],"theory":[37,109],"offers":[38],"powerful":[39],"tools":[40],"analyzing":[42],"processes,":[44],"to":[45,72,90],"date":[46],"application":[48],"information-theoretic":[50,68],"methods":[51],"domains":[54],"has":[55],"focused":[56],"static":[58],"analyses":[59],"(e.g.,":[60],"cryptography,":[61],"natural":[62],"language":[63],"processing).":[64],"This":[65],"paper":[66],"leverages":[67],"concepts":[69],"measures":[71],"quantify":[73],"similarity":[75],"pairs":[77],"stochastic":[79],"systems,":[81],"shows":[83],"that":[84,154],"this":[85],"capability":[86],"can":[87],"be":[88],"used":[89],"solve":[91],"which":[94],"arise":[95],"applications.":[98],"We":[99],"begin":[100],"by":[101],"presenting":[102],"a":[103],"concise":[104],"review":[105],"required":[110],"our":[112],"development,":[113],"then":[115],"address":[116],"two":[117],"challenging":[118],"tasks:":[119],"1.)":[120],"characterizing":[121],"way":[123],"influence":[124],"propagates":[125],"through":[126],"networks,":[128],"2.)":[130],"malware":[132],"from":[133],"legitimate":[134],"software":[135],"instruction":[139],"sequences":[140],"disassembled":[143],"programs.":[144],"In":[145],"each":[146],"application,":[147],"case":[148],"studies":[149],"involving":[150],"real-world":[151],"datasets":[152],"demonstrate":[153],"proposed":[156],"techniques":[157],"outperform":[158],"standard":[159],"methods.":[160]},"counts_by_year":[{"year":2016,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
