{"id":"https://openalex.org/W2039529994","doi":"https://doi.org/10.1109/malware.2013.6703682","title":"Measuring the effectiveness of modern security products to detect and contain emerging threats &amp;#x2014; A consensus-based approach","display_name":"Measuring the effectiveness of modern security products to detect and contain emerging threats &amp;#x2014; A consensus-based approach","publication_year":2013,"publication_date":"2013-10-01","ids":{"openalex":"https://openalex.org/W2039529994","doi":"https://doi.org/10.1109/malware.2013.6703682","mag":"2039529994"},"language":"en","primary_location":{"id":"doi:10.1109/malware.2013.6703682","is_oa":false,"landing_page_url":"https://doi.org/10.1109/malware.2013.6703682","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 8th International Conference on Malicious and Unwanted Software: \"The Americas\" (MALWARE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059090211","display_name":"Fernando C. Col\u00f3n Osorio","orcid":null},"institutions":[{"id":"https://openalex.org/I6902469","display_name":"Brandeis University","ror":"https://ror.org/05abbep66","country_code":"US","type":"education","lineage":["https://openalex.org/I6902469"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Fernando C. Colon Osorio","raw_affiliation_strings":["Wireless Systems Security, Research Laboratory and Brandeis University, USA","Res. Lab., Brandeis Univ., Waltham, MA, USA"],"affiliations":[{"raw_affiliation_string":"Wireless Systems Security, Research Laboratory and Brandeis University, USA","institution_ids":["https://openalex.org/I6902469"]},{"raw_affiliation_string":"Res. Lab., Brandeis Univ., Waltham, MA, USA","institution_ids":["https://openalex.org/I6902469"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010616205","display_name":"Ferenc Leitold","orcid":null},"institutions":[{"id":"https://openalex.org/I96221595","display_name":"College of Duna\u00fajv\u00e1ros","ror":"https://ror.org/05x0g9h76","country_code":"HU","type":"education","lineage":["https://openalex.org/I96221595"]}],"countries":["HU"],"is_corresponding":false,"raw_author_name":"Ferenc Leitold","raw_affiliation_strings":["Veszprog Ltd., College of Duna\u00fajv\u00e1ros Hungary","Coll. of Dunaujvaros, Veszprog Ltd., Dunaujvaros, Hungary"],"affiliations":[{"raw_affiliation_string":"Veszprog Ltd., College of Duna\u00fajv\u00e1ros Hungary","institution_ids":["https://openalex.org/I96221595"]},{"raw_affiliation_string":"Coll. of Dunaujvaros, Veszprog Ltd., Dunaujvaros, Hungary","institution_ids":["https://openalex.org/I96221595"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020848234","display_name":"Dorottya Mike","orcid":null},"institutions":[{"id":"https://openalex.org/I96221595","display_name":"College of Duna\u00fajv\u00e1ros","ror":"https://ror.org/05x0g9h76","country_code":"HU","type":"education","lineage":["https://openalex.org/I96221595"]}],"countries":["HU"],"is_corresponding":false,"raw_author_name":"Dorottya Mike","raw_affiliation_strings":["Veszprog Ltd., College of Duna\u00fajv\u00e1ros Hungary","Coll. of Dunaujvaros, Veszprog Ltd., Dunaujvaros, Hungary"],"affiliations":[{"raw_affiliation_string":"Veszprog Ltd., College of Duna\u00fajv\u00e1ros Hungary","institution_ids":["https://openalex.org/I96221595"]},{"raw_affiliation_string":"Coll. of Dunaujvaros, Veszprog Ltd., Dunaujvaros, Hungary","institution_ids":["https://openalex.org/I96221595"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013004499","display_name":"Chris J. Pickard","orcid":"https://orcid.org/0000-0002-9684-5432"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chris Pickard","raw_affiliation_strings":["MRG-Effitas, United Kingdom","MRG-Effitas, UK"],"affiliations":[{"raw_affiliation_string":"MRG-Effitas, United Kingdom","institution_ids":[]},{"raw_affiliation_string":"MRG-Effitas, UK","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076320586","display_name":"Sveta Miladinov","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sveta Miladinov","raw_affiliation_strings":["MRG-Effitas, United Kingdom","MRG-Effitas, UK"],"affiliations":[{"raw_affiliation_string":"MRG-Effitas, United Kingdom","institution_ids":[]},{"raw_affiliation_string":"MRG-Effitas, UK","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035524983","display_name":"Anthony Arrott","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Anthony Arrott","raw_affiliation_strings":["Trend Micro Corp, USA"],"affiliations":[{"raw_affiliation_string":"Trend Micro Corp, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5059090211"],"corresponding_institution_ids":["https://openalex.org/I6902469"],"apc_list":null,"apc_paid":null,"fwci":1.8123,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.86751744,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"31","issue":null,"first_page":"27","last_page":"34"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7339551448822021},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7336605787277222},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6735031604766846},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5747565627098083},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.5447103381156921},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1398361325263977}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7339551448822021},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7336605787277222},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6735031604766846},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5747565627098083},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.5447103381156921},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1398361325263977},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/malware.2013.6703682","is_oa":false,"landing_page_url":"https://doi.org/10.1109/malware.2013.6703682","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 8th International Conference on Malicious and Unwanted Software: \"The Americas\" (MALWARE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4300000071525574,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W26675230","https://openalex.org/W1499512641","https://openalex.org/W2120510885","https://openalex.org/W3137092842"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2097492617","https://openalex.org/W2378749186","https://openalex.org/W2364088131","https://openalex.org/W2753240997","https://openalex.org/W2362741838","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2350438938"],"abstract_inverted_index":{"Increasingly":[0],"the":[1,9,12,33,38,76,109,116,126,130,144,155,179,187,197,233,264,278,281,304,307,320],"idea":[2,127],"that":[3,35,53,81,98,128,159],"cyber-attacks":[4],"can":[5,54,83,106],"be":[6,55,102],"stopped":[7],"at":[8],"periphery":[10],"of":[11,40,88,118,132,143,146,181,199,213,277,283,306,319],"network":[13,48],"has":[14,157,225],"become":[15],"a":[16,140,286,316],"fool's":[17],"errand.":[18],"In":[19,122],"today's":[20],"computing":[21,43],"environment":[22],"and":[23,67,74,111,148,167,203,209,242,257,271],"cyber-threat":[24],"landscape,":[25],"individuals":[26],"as":[27,29,267,293,315],"well":[28,321],"corporations":[30],"have":[31,189],"recognized":[32,158],"fact":[34],"(i)":[36],"with":[37],"emergence":[39],"cloud":[41],"based":[42,231],"there":[44],"are":[45,59,174,291],"no":[46,92],"longer":[47,93],"boundaries":[49],"under":[50],"your":[51,99],"control":[52],"protected,":[56],"(ii)":[57],"threats":[58,290],"often":[60],"distributed":[61],"in":[62,65],"nature":[63,305],"both":[64],"time":[66,160,163],"space":[68],"\u2014":[69],"making":[70],"detection":[71],"extremely":[72],"difficult,":[73],"(iii)":[75],"working":[77],"assumption":[78],"is":[79,91,139,280],"not":[80,296],"you":[82,107,114],"prevent":[84],"infections":[85],"(the":[86],"goal":[87],"100%":[89],"prevention":[90],"practical)":[94],"but":[95],"rather,":[96],"given":[97],"\"system\"":[100],"will":[101],"compromised,":[103],"how":[104,112],"quickly":[105],"detect":[108],"breach":[110],"do":[113],"minimize":[115],"impact":[117],"such":[119],"an":[120],"event.":[121],"this":[123,185,229,249],"new":[124,289],"environment,":[125],"measuring":[129],"number":[131],"infected":[133],"files":[134],"detected":[135],"within":[136],"end-point":[137],"devices":[138],"good":[141],"measure":[142],"effectiveness":[145],"Anti-Malware":[147],"Security":[149,236],"related":[150],"products":[151,301],"seems":[152],"foolish.":[153],"Instead,":[154],"industry":[156],"to":[161,164,169,177,191,195,207,244,262],"detect,":[162],"countermeasure":[165],"issuance,":[166],"ability":[168,198,261],"identify":[170,263],"short-lived":[171],"C&C":[172,269],"sites":[173],"more":[175],"relevant":[176],"determining":[178],"\"goodness\"":[180],"security":[182,205,300],"products.":[183],"Within":[184],"context,":[186],"authors":[188],"undertaken":[190],"develop":[192],"benchmark":[193],"metrics":[194],"test":[196,223,240],"commercial":[200],"automated":[201],"gateway":[202,252],"endpoint":[204],"services":[206,254],"classify":[208],"categorize":[210],"different":[211],"types":[212],"web":[214],"traffic":[215,266],"(malicious":[216],"content,":[217],"malicious":[218,294],"activity,":[219],"non-malicious":[220,272],"category).":[221],"A":[222,274],"methodology":[224,279,287,312],"been":[226],"developed":[227,314],"for":[228,259],"purpose,":[230],"on":[232,303],"Wireless":[234],"Systems":[235],"Research":[237],"Laboratory":[238],"(WSSRL)":[239],"methodology,":[241,250],"extensions":[243],"CheckVir":[245],"Battery":[246],"Test.":[247],"Using":[248],"eight":[251],"protection":[253],"were":[255],"tested":[256],"classified":[258,292],"their":[260],"incoming":[265],"malicious,":[268],"communications,":[270],"content.":[273],"key":[275],"component":[276],"concept":[282],"eventual":[284],"consensus,":[285],"whereas":[288],"or":[295],"when":[297],"(n/2+":[298],"1)":[299],"agree":[302],"threat":[308],"over":[309],"time.":[310],"The":[311],"was":[313],"simplified":[317],"extension":[318],"known":[322],"Byzantine":[323],"Agreement":[324],"protocol":[325],"first":[326],"discussed":[327],"by":[328],"Leslie":[329],"Lamport.":[330]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
