{"id":"https://openalex.org/W4390394277","doi":"https://doi.org/10.1109/itnac59571.2023.10368476","title":"Understanding Statistical Correlation of Application Security Vulnerability Data from Detection and Monitoring Tools","display_name":"Understanding Statistical Correlation of Application Security Vulnerability Data from Detection and Monitoring Tools","publication_year":2023,"publication_date":"2023-11-29","ids":{"openalex":"https://openalex.org/W4390394277","doi":"https://doi.org/10.1109/itnac59571.2023.10368476"},"language":"en","primary_location":{"id":"doi:10.1109/itnac59571.2023.10368476","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/itnac59571.2023.10368476","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 33rd International Telecommunication Networks and Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031227580","display_name":"Santanam Kasturi","orcid":"https://orcid.org/0009-0002-7978-8138"},"institutions":[{"id":"https://openalex.org/I86420138","display_name":"Indiana State University","ror":"https://ror.org/00f8man71","country_code":"US","type":"education","lineage":["https://openalex.org/I86420138"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Santanam Kasturi","raw_affiliation_strings":["Indiana State University,Technology Management,Terre Haute,USA","Technology Management, Indiana State University, Terre Haute, USA"],"affiliations":[{"raw_affiliation_string":"Indiana State University,Technology Management,Terre Haute,USA","institution_ids":["https://openalex.org/I86420138"]},{"raw_affiliation_string":"Technology Management, Indiana State University, Terre Haute, USA","institution_ids":["https://openalex.org/I86420138"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100371535","display_name":"Xiaolong Li","orcid":"https://orcid.org/0000-0001-7493-2650"},"institutions":[{"id":"https://openalex.org/I86420138","display_name":"Indiana State University","ror":"https://ror.org/00f8man71","country_code":"US","type":"education","lineage":["https://openalex.org/I86420138"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaolong Li","raw_affiliation_strings":["Indiana State University,Dept. of Electronics and Computer Engineering,Terre Haute,USA","Dept. of Electronics and Computer Engineering, Indiana State University, Terre Haute, USA"],"affiliations":[{"raw_affiliation_string":"Indiana State University,Dept. of Electronics and Computer Engineering,Terre Haute,USA","institution_ids":["https://openalex.org/I86420138"]},{"raw_affiliation_string":"Dept. of Electronics and Computer Engineering, Indiana State University, Terre Haute, USA","institution_ids":["https://openalex.org/I86420138"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113814742","display_name":"John Pickard","orcid":null},"institutions":[{"id":"https://openalex.org/I186335123","display_name":"East Carolina University","ror":"https://ror.org/01vx35703","country_code":"US","type":"education","lineage":["https://openalex.org/I186335123"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"John Pickard","raw_affiliation_strings":["East Carolina University,Dept. of Technology Sys,Greenville,USA","Dept. of Technology Sys, East Carolina University, Greenville, USA"],"affiliations":[{"raw_affiliation_string":"East Carolina University,Dept. of Technology Sys,Greenville,USA","institution_ids":["https://openalex.org/I186335123"]},{"raw_affiliation_string":"Dept. of Technology Sys, East Carolina University, Greenville, USA","institution_ids":["https://openalex.org/I186335123"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5119247302","display_name":"Peng Li","orcid":"https://orcid.org/0000-0002-1289-078X"},"institutions":[{"id":"https://openalex.org/I186335123","display_name":"East Carolina University","ror":"https://ror.org/01vx35703","country_code":"US","type":"education","lineage":["https://openalex.org/I186335123"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Peng Li","raw_affiliation_strings":["East Carolina University,Dept. of Technology Systems,Greenville,USA","Dept. of Technology Systems, East Carolina University, Greenville, USA"],"affiliations":[{"raw_affiliation_string":"East Carolina University,Dept. of Technology Systems,Greenville,USA","institution_ids":["https://openalex.org/I186335123"]},{"raw_affiliation_string":"Dept. of Technology Systems, East Carolina University, Greenville, USA","institution_ids":["https://openalex.org/I186335123"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5031227580"],"corresponding_institution_ids":["https://openalex.org/I86420138"],"apc_list":null,"apc_paid":null,"fwci":0.8036,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.74926731,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":"11","issue":null,"first_page":"289","last_page":"296"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9822999835014343,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9589999914169312,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7771776914596558},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5871774554252625},{"id":"https://openalex.org/keywords/correlation","display_name":"Correlation","score":0.4704510271549225},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4533481299877167},{"id":"https://openalex.org/keywords/population","display_name":"Population","score":0.4237544536590576},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.41832512617111206},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2671547532081604}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7771776914596558},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5871774554252625},{"id":"https://openalex.org/C117220453","wikidata":"https://www.wikidata.org/wiki/Q5172842","display_name":"Correlation","level":2,"score":0.4704510271549225},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4533481299877167},{"id":"https://openalex.org/C2908647359","wikidata":"https://www.wikidata.org/wiki/Q2625603","display_name":"Population","level":2,"score":0.4237544536590576},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.41832512617111206},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2671547532081604},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C149923435","wikidata":"https://www.wikidata.org/wiki/Q37732","display_name":"Demography","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/itnac59571.2023.10368476","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/itnac59571.2023.10368476","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 33rd International Telecommunication Networks and Applications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6700000166893005,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2095999892","https://openalex.org/W2018764758","https://openalex.org/W2383689843","https://openalex.org/W1550668881","https://openalex.org/W617913288","https://openalex.org/W2319323865","https://openalex.org/W2951745010","https://openalex.org/W2347958299","https://openalex.org/W2963125730","https://openalex.org/W2753096400"],"abstract_inverted_index":{"Vulnerability":[0],"data":[1,73,151,175,228],"gathered":[2],"from":[3],"multiple":[4],"detection":[5],"and":[6,22,106,126,148,153,245],"monitoring":[7,39],"capabilities":[8],"at":[9],"different":[10],"layers":[11],"of":[12,124,167,185,227,231,235],"an":[13,189],"application":[14],"using":[15,33,251],"a":[16,26,34,117,131,143,161,182,192,220],"time-series":[17],"analysis":[18,95,232],"will":[19],"provide":[20],"value":[21],"insights":[23,263],"by":[24,92,103,242],"doing":[25],"statistical":[27,94],"correlation":[28,221],"with":[29],"attack":[30,239,273],"requests":[31,98,240],"observed":[32,159],"Web":[35],"Application":[36,53,56],"Firewall":[37],"(WAF)":[38],"solution.":[40],"Static":[41],"Analysis":[42,49],"Security":[43,50],"Testing,":[44],"Software":[45],"Composition":[46],"Analysis,":[47],"Dynamic":[48],"Testing":[51],"(DAST),":[52],"Ethical":[54],"Hack,":[55],"Programming":[57],"Interface":[58],"(API)":[59],"testing":[60],"are":[61,100,107,208],"the":[62,93,104,122,168,243],"tests":[63],"/":[64],"scans":[65],"that":[66,99,176,207],"have":[67],"been":[68],"used":[69],"to":[70,112,129,180,218,259],"gather":[71],"vulnerability":[72],"for":[74,96,139,164,170,205,261],"this":[75],"study.":[76],"Correlations":[77],"can":[78,268],"further":[79,269],"help":[80],"track":[81],"abnormal":[82],"transaction":[83],"paths":[84],"if":[85],"we":[86],"follow":[87],"specific":[88,238],"ones":[89],"pointed":[90],"out":[91],"those":[97],"not":[101,209],"blocked":[102],"rules":[105],"allowed":[108],"as":[109,142,217],"valid":[110],"transactions":[111],"pass":[113],"through.":[114],"This":[115,256],"provides":[116,212],"narrowed":[118],"down":[119],"focus":[120],"on":[121,276],"convergence":[123],"observability":[125],"security,":[127],"critical":[128],"realizing":[130],"near-real":[132],"time":[133,144],"rapid":[134],"action.":[135],"Observations":[136],"must":[137,157],"continue":[138],"many":[140],"days":[141],"series":[145],"ensuring":[146,165],"consistency":[147],"reliability":[149],"in":[150,160,195,248],"collections":[152],"analysis.":[154,171],"Multiple":[155],"applications":[156,187],"be":[158],"similar":[162],"manner":[163],"validity":[166],"process":[169],"Also,":[172],"gathering":[173],"sufficient":[174],"is":[177,191,222,257],"large":[178,225],"enough":[179],"represent":[181],"reasonable":[183],"population":[184],"web":[186],"within":[188],"organization":[190],"significant":[193,258],"factor":[194],"achieving":[196],"reliable":[197],"correlation.":[198],"Applying":[199],"Pearson":[200],"Correlation":[201,204],"(or":[202],"Spearman":[203],"distributions":[206],"normal)":[210],"technique":[211],"insight":[213],"into":[214,264,271],"Significance":[215],"(two-tailed)":[216],"whether":[219],"present":[223],"over":[224],"number":[226],"points.":[229],"Results":[230],"show":[233],"evidence":[234],"correlations":[236,267],"among":[237],"monitored":[241],"WAF":[244],"corresponding":[246],"vulnerabilities":[247],"applications,":[249],"detected":[250],"one":[252],"or":[253],"more":[254,262],"methods.":[255],"looking":[260],"how":[265],"these":[266],"explored":[270],"predicting":[272],"patterns":[274],"based":[275],"existing":[277],"vulnerabilities.":[278]},"counts_by_year":[{"year":2024,"cited_by_count":4}],"updated_date":"2025-12-25T23:11:45.687758","created_date":"2025-10-10T00:00:00"}
