{"id":"https://openalex.org/W2921895932","doi":"https://doi.org/10.1109/istel.2018.8661030","title":"Security Metrics: Principles and Security Assessment Methods","display_name":"Security Metrics: Principles and Security Assessment Methods","publication_year":2018,"publication_date":"2018-12-01","ids":{"openalex":"https://openalex.org/W2921895932","doi":"https://doi.org/10.1109/istel.2018.8661030","mag":"2921895932"},"language":"en","primary_location":{"id":"doi:10.1109/istel.2018.8661030","is_oa":false,"landing_page_url":"https://doi.org/10.1109/istel.2018.8661030","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 9th International Symposium on Telecommunications (IST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004249245","display_name":"Abouzar Arabsorkhi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210102178","display_name":"ICT Research Institute","ror":"https://ror.org/01a3g2z22","country_code":"IR","type":"facility","lineage":["https://openalex.org/I4210102178"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Abouzar Arabsorkhi","raw_affiliation_strings":["Iran Telecom Research Center, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Iran Telecom Research Center, Tehran, Iran","institution_ids":["https://openalex.org/I4210102178"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5066289822","display_name":"Fariba Ghaffari","orcid":"https://orcid.org/0000-0003-2785-9950"},"institutions":[{"id":"https://openalex.org/I1516879","display_name":"Tarbiat Modares University","ror":"https://ror.org/03mwgfy56","country_code":"IR","type":"education","lineage":["https://openalex.org/I1516879"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Fariba Ghaffari","raw_affiliation_strings":["Tarbiat Modares University, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Tarbiat Modares University, Tehran, Iran","institution_ids":["https://openalex.org/I1516879"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5004249245"],"corresponding_institution_ids":["https://openalex.org/I4210102178"],"apc_list":null,"apc_paid":null,"fwci":0.7854,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.82596521,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"305","last_page":"310"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6862577199935913},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.535575270652771},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.47203198075294495},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.41873544454574585},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.31001633405685425},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.3071209192276001}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6862577199935913},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.535575270652771},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.47203198075294495},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.41873544454574585},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.31001633405685425},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.3071209192276001}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/istel.2018.8661030","is_oa":false,"landing_page_url":"https://doi.org/10.1109/istel.2018.8661030","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 9th International Symposium on Telecommunications (IST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W145528294","https://openalex.org/W1530267349","https://openalex.org/W2033783561","https://openalex.org/W2099775215","https://openalex.org/W2271655342","https://openalex.org/W2478986546","https://openalex.org/W2492012419","https://openalex.org/W2498029175","https://openalex.org/W2564147261","https://openalex.org/W2974720746","https://openalex.org/W4248239127"],"related_works":["https://openalex.org/W2907868081","https://openalex.org/W2784006287","https://openalex.org/W2000428303","https://openalex.org/W2222589037","https://openalex.org/W4252804791","https://openalex.org/W2056275442","https://openalex.org/W2032098076","https://openalex.org/W2037791655","https://openalex.org/W2113932201","https://openalex.org/W2187486724"],"abstract_inverted_index":{"Nowadays,":[0],"Information":[1],"Technology":[2],"is":[3,36,143,156],"one":[4],"of":[5,9,14,50,63,108,116,128],"the":[6,61,72,114,125,132,149],"important":[7,91],"parts":[8],"human":[10],"life":[11],"and":[12,53,103,131,148,171],"also":[13],"organizations.":[15],"Organizations":[16],"face":[17],"problems":[18],"such":[19],"as":[20],"IT":[21],"problems.":[22],"To":[23],"solve":[24],"these":[25,129],"problems,":[26],"they":[27,136],"have":[28],"to":[29,44,78,92,99,120,124,134,158,164,168],"improve":[30,100],"their":[31,169],"security":[32,40,46,51,110,154],"sections.":[33],"Thus":[34,89],"there":[35],"a":[37,162],"need":[38],"for":[39,59,96,153,161],"assessments":[41],"within":[42],"organizations":[43],"ensure":[45],"conditions.":[47,172],"The":[48,106],"use":[49,115],"standards":[52,95],"general":[54,73,81],"metric":[55,74,94,130,166],"can":[56],"be":[57,69,83,159],"useful":[58],"measuring":[60],"safety":[62],"an":[64,117],"organization;":[65],"however,":[66],"it":[67],"should":[68],"noted":[70],"that":[71,142],"which":[75,135],"are":[76,137],"applied":[77],"businesses":[79,98],"in":[80,85,113,139],"cannot":[82],"effective":[84],"this":[86,140],"particular":[87],"situation.":[88],"it's":[90],"select":[93],"different":[97],"both":[101],"cost":[102],"organizational":[104],"security.":[105],"selection":[107],"suitable":[109],"measures":[111,155],"lies":[112],"efficient":[118],"way":[119],"identify":[121],"them.":[122],"Due":[123],"numerous":[126],"complexities":[127],"extent":[133],"defined,":[138],"paper":[141],"based":[144],"on":[145],"comparative":[146],"study":[147],"benchmarking":[150],"method,":[151],"taxonomy":[152],"considered":[157],"helpful":[160],"business":[163],"choose":[165],"tailored":[167],"needs":[170]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
