{"id":"https://openalex.org/W4400728513","doi":"https://doi.org/10.1109/iwcmc61514.2024.10592406","title":"CTIoT: A Cyber Threat Intelligence Tool for IoT","display_name":"CTIoT: A Cyber Threat Intelligence Tool for IoT","publication_year":2024,"publication_date":"2024-05-27","ids":{"openalex":"https://openalex.org/W4400728513","doi":"https://doi.org/10.1109/iwcmc61514.2024.10592406"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc61514.2024.10592406","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc61514.2024.10592406","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://hal.science/hal-05055913/document","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070595978","display_name":"Saad El Jaouhari","orcid":"https://orcid.org/0000-0002-1938-9963"},"institutions":[{"id":"https://openalex.org/I122941322","display_name":"Institut Sup\u00e9rieur d'\u00c9lectronique de Paris","ror":"https://ror.org/00yw34h52","country_code":"FR","type":"education","lineage":["https://openalex.org/I122941322"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Saad El Jaouhari","raw_affiliation_strings":["Institut Sup&#x00E9;rieur d&#x2019;Electronique de Paris (Isep),Issy-les-Moulinaux,France"],"affiliations":[{"raw_affiliation_string":"Institut Sup&#x00E9;rieur d&#x2019;Electronique de Paris (Isep),Issy-les-Moulinaux,France","institution_ids":["https://openalex.org/I122941322"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109748253","display_name":"S. Muqtyar Ahmed","orcid":null},"institutions":[{"id":"https://openalex.org/I122941322","display_name":"Institut Sup\u00e9rieur d'\u00c9lectronique de Paris","ror":"https://ror.org/00yw34h52","country_code":"FR","type":"education","lineage":["https://openalex.org/I122941322"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Shaikh Ahmed","raw_affiliation_strings":["Institut Sup&#x00E9;rieur d&#x2019;Electronique de Paris (Isep),Issy-les-Moulinaux,France"],"affiliations":[{"raw_affiliation_string":"Institut Sup&#x00E9;rieur d&#x2019;Electronique de Paris (Isep),Issy-les-Moulinaux,France","institution_ids":["https://openalex.org/I122941322"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5070595978"],"corresponding_institution_ids":["https://openalex.org/I122941322"],"apc_list":null,"apc_paid":null,"fwci":0.7311,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.71550568,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1483","last_page":"1489"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.8913000226020813,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.8913000226020813,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.8504999876022339,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.7158466577529907},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6749575138092041},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6505604982376099},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.5011799335479736},{"id":"https://openalex.org/keywords/intelligence-analysis","display_name":"Intelligence analysis","score":0.4401813745498657},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3977675139904022}],"concepts":[{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.7158466577529907},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6749575138092041},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6505604982376099},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.5011799335479736},{"id":"https://openalex.org/C517642484","wikidata":"https://www.wikidata.org/wiki/Q2388514","display_name":"Intelligence analysis","level":2,"score":0.4401813745498657},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3977675139904022}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/iwcmc61514.2024.10592406","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc61514.2024.10592406","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"},{"id":"pmh:oai:HAL:hal-05055913v1","is_oa":true,"landing_page_url":"https://hal.science/hal-05055913","pdf_url":"https://hal.science/hal-05055913/document","source":{"id":"https://openalex.org/S4406922466","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"International Wireless Communications and Mobile Computing Conference (IWCMC), 2024, pp.1483-1489. &#x27E8;10.1109/IWCMC61514.2024.10592406&#x27E9;","raw_type":"Journal articles"}],"best_oa_location":{"id":"pmh:oai:HAL:hal-05055913v1","is_oa":true,"landing_page_url":"https://hal.science/hal-05055913","pdf_url":"https://hal.science/hal-05055913/document","source":{"id":"https://openalex.org/S4406922466","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"International Wireless Communications and Mobile Computing Conference (IWCMC), 2024, pp.1483-1489. &#x27E8;10.1109/IWCMC61514.2024.10592406&#x27E9;","raw_type":"Journal articles"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4400728513.pdf"},"referenced_works_count":20,"referenced_works":["https://openalex.org/W2088278490","https://openalex.org/W2603341402","https://openalex.org/W2771963642","https://openalex.org/W2904171699","https://openalex.org/W2937017738","https://openalex.org/W3006161904","https://openalex.org/W3034175800","https://openalex.org/W3089855309","https://openalex.org/W3103040694","https://openalex.org/W3141363959","https://openalex.org/W3190203363","https://openalex.org/W3191564770","https://openalex.org/W3211661740","https://openalex.org/W3213149181","https://openalex.org/W4210797123","https://openalex.org/W4220893631","https://openalex.org/W4224903171","https://openalex.org/W4317382133","https://openalex.org/W4321843872","https://openalex.org/W4367593346"],"related_works":["https://openalex.org/W4396897946","https://openalex.org/W3110311961","https://openalex.org/W3040950835","https://openalex.org/W4386107585","https://openalex.org/W2552246019","https://openalex.org/W2508779374","https://openalex.org/W2972971880","https://openalex.org/W4399917864","https://openalex.org/W4385452110","https://openalex.org/W1153919619"],"abstract_inverted_index":{"The":[0,46,170,191],"Internet":[1],"of":[2,30,33,43,49,101,103,193,198],"Things":[3],"(IoT)":[4],"has":[5,24],"enabled":[6],"intelligent":[7],"services":[8],"and":[9,17,41,62,89,106,118,147,150,165,188],"revolutionized":[10],"industries":[11],"due":[12],"to":[13,27,38,86,91,113,141,162,168,186,201,206],"its":[14],"sensing,":[15],"actuating,":[16],"connectivity":[18],"capabilities.":[19],"However,":[20],"this":[21,72],"rapid":[22],"expansion":[23],"also":[25],"led":[26],"a":[28,79,134],"surge":[29],"various":[31],"types":[32],"vulnerabilities,":[34],"posing":[35],"significant":[36],"challenges":[37],"the":[39,196],"security":[40],"integrity":[42],"IoT":[44,52,94,132,143,208,213],"ecosystems.":[45],"increasing":[47],"number":[48],"vulnerabilities":[50,164],"in":[51,82,175],"is":[53,172],"explained":[54],"by":[55,182],"factors":[56],"such":[57],"as":[58],"limited":[59],"processing":[60],"power":[61],"constrained":[63],"resources,":[64],"making":[65],"them":[66],"easy":[67],"targets":[68],"for":[69,131],"cyberattacks.":[70,190],"In":[71],"context,":[73],"Cyber":[74,128],"Threat":[75,129],"Intelligence":[76,130],"(CTI)":[77],"plays":[78],"crucial":[80],"role":[81],"providing":[83],"actionable":[84],"intelligence":[85,98],"identify,":[87],"detect,":[88],"respond":[90],"threats":[92,166],"targeting":[93],"infrastructure.":[95],"Through":[96],"threat":[97,108],"feeds,":[99],"analysis":[100],"indicators":[102],"compromise":[104],"(IoCs),":[105],"proactive":[107],"hunting,":[109],"CTI":[110,139,152,203],"enables":[111],"organizations":[112],"enhance":[114,142],"their":[115,120],"situational":[116],"awareness":[117],"strengthen":[119],"defenses":[121],"against":[122],"IoT-related":[123],"threats.":[124],"This":[125],"paper":[126],"proposes":[127],"(CTIoT),":[133],"solution":[135,200],"that":[136,178],"effectively":[137],"leverages":[138],"information":[140,171],"security.":[144],"It":[145],"actively":[146],"automatically":[148],"collects":[149],"processes":[151],"data":[153,204],"from":[154],"heterogeneous":[155],"sources,":[156],"using":[157],"Natural":[158],"Language":[159],"Processing":[160],"(NLP)":[161],"identify":[163],"related":[167,205],"IoT.":[169],"then":[173],"presented":[174],"graph":[176],"format":[177],"can":[179],"be":[180],"used":[181],"Graph":[183],"Machine":[184],"Learning":[185],"predict":[187],"detect":[189],"proof":[192],"concept":[194],"demonstrates":[195],"ability":[197],"our":[199],"monitor":[202],"multiple":[207,212],"smart":[209],"spaces":[210],"with":[211],"devices.":[214]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-11T14:59:36.786465","created_date":"2024-07-18T00:00:00"}
