{"id":"https://openalex.org/W2084212935","doi":"https://doi.org/10.1109/milcom.2012.6415755","title":"Best-effort Data Leakage Prevention in inter-organizational tactical MANETs","display_name":"Best-effort Data Leakage Prevention in inter-organizational tactical MANETs","publication_year":2012,"publication_date":"2012-10-01","ids":{"openalex":"https://openalex.org/W2084212935","doi":"https://doi.org/10.1109/milcom.2012.6415755","mag":"2084212935"},"language":"en","primary_location":{"id":"doi:10.1109/milcom.2012.6415755","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2012.6415755","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-2906","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004675497","display_name":"Johan Sigholm","orcid":"https://orcid.org/0000-0002-4376-9800"},"institutions":[{"id":"https://openalex.org/I101466613","display_name":"Swedish Defence University","ror":"https://ror.org/04mj8af82","country_code":"SE","type":"education","lineage":["https://openalex.org/I101466613"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Johan Sigholm","raw_affiliation_strings":["Department of Military Studies, Swedish National Defense College, Stockholm, Sweden","Dept. of Military Studies, Swedish National Defence College, Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Military Studies, Swedish National Defense College, Stockholm, Sweden","institution_ids":["https://openalex.org/I101466613"]},{"raw_affiliation_string":"Dept. of Military Studies, Swedish National Defence College, Stockholm, Sweden","institution_ids":["https://openalex.org/I101466613"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084472879","display_name":"Massimiliano Raciti","orcid":"https://orcid.org/0000-0001-5098-5408"},"institutions":[{"id":"https://openalex.org/I102134673","display_name":"Link\u00f6ping University","ror":"https://ror.org/05ynxx418","country_code":"SE","type":"education","lineage":["https://openalex.org/I102134673"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Massimiliano Raciti","raw_affiliation_strings":["Department of Computer and Information Science, Link\u00f6ping University, Linkoping, Sweden","Department of Computer and Information Science, Link\u00f6ping University, LINK\u00d6PING, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Science, Link\u00f6ping University, Linkoping, Sweden","institution_ids":["https://openalex.org/I102134673"]},{"raw_affiliation_string":"Department of Computer and Information Science, Link\u00f6ping University, LINK\u00d6PING, Sweden","institution_ids":["https://openalex.org/I102134673"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5004675497"],"corresponding_institution_ids":["https://openalex.org/I101466613"],"apc_list":null,"apc_paid":null,"fwci":1.773,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.86018909,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/interoperability","display_name":"Interoperability","score":0.7085634469985962},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6280363202095032},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5419290065765381},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4499654173851013},{"id":"https://openalex.org/keywords/survivability","display_name":"Survivability","score":0.42453500628471375},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.4181508421897888},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3678193986415863},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.2060888409614563}],"concepts":[{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.7085634469985962},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6280363202095032},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5419290065765381},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4499654173851013},{"id":"https://openalex.org/C2781133158","wikidata":"https://www.wikidata.org/wiki/Q1088669","display_name":"Survivability","level":2,"score":0.42453500628471375},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.4181508421897888},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3678193986415863},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2060888409614563},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/milcom.2012.6415755","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2012.6415755","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:DiVA.org:fhs-2906","is_oa":true,"landing_page_url":"http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-2906","pdf_url":null,"source":{"id":"https://openalex.org/S4306401559","display_name":"KTH Publication Database DiVA (KTH Royal Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:DiVA.org:fhs-2906","is_oa":true,"landing_page_url":"http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-2906","pdf_url":null,"source":{"id":"https://openalex.org/S4306401559","display_name":"KTH Publication Database DiVA (KTH Royal Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"score":0.6399999856948853,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W158866754","https://openalex.org/W633763160","https://openalex.org/W659220967","https://openalex.org/W1529028887","https://openalex.org/W1593927353","https://openalex.org/W1996693347","https://openalex.org/W2006289503","https://openalex.org/W2011094081","https://openalex.org/W2024510432","https://openalex.org/W2046745919","https://openalex.org/W2047038549","https://openalex.org/W2095897464","https://openalex.org/W2113570213","https://openalex.org/W2131980718","https://openalex.org/W2136441057","https://openalex.org/W2494170046","https://openalex.org/W2724932147","https://openalex.org/W3145286199","https://openalex.org/W4231029117","https://openalex.org/W4249164973","https://openalex.org/W6620485829","https://openalex.org/W6631552668","https://openalex.org/W6680221741","https://openalex.org/W6983514024"],"related_works":["https://openalex.org/W2061267804","https://openalex.org/W4316042121","https://openalex.org/W2314289140","https://openalex.org/W2357732063","https://openalex.org/W2799748498","https://openalex.org/W2809279299","https://openalex.org/W2158470186","https://openalex.org/W2204090720","https://openalex.org/W196233910","https://openalex.org/W2504049890"],"abstract_inverted_index":{"Reconfigurable":[0],"Radio":[1,8,33],"Systems":[2],"(RRS),":[3],"based":[4],"on":[5],"Software":[6],"Defined":[7],"(SDR)":[9],"and":[10,27,52,70,118,151],"Mobile":[11],"Ad-hoc":[12],"Network":[13],"(MANET)":[14],"technologies,":[15],"offer":[16],"considerable":[17],"advantages":[18],"for":[19,46,53,105,130],"military":[20],"operations,":[21],"such":[22],"as":[23,143],"increased":[24],"network":[25],"survivability":[26],"interoperability.":[28],"The":[29,109,138],"RRS-based":[30,107],"Common":[31],"Tactical":[32],"System":[34],"(GTRS),":[35],"currently":[36],"in":[37,48,83,134,153],"development":[38],"by":[39,167],"the":[40,72,147,168,173],"Swedish":[41],"Armed":[42],"Forces,":[43],"is":[44,77,141],"designed":[45],"use":[47,113],"diverse":[49],"geographical":[50],"settings":[51],"purposes":[54],"varying":[55],"from":[56,68],"international":[57],"combat":[58],"missions":[59],"to":[60,100,146],"national":[61],"contingency":[62],"operations.":[63],"However,":[64],"protecting":[65],"these":[66],"networks":[67],"attacks":[69],"safeguarding":[71],"carried":[73],"information":[74],"against":[75],"leaks":[76,162],"an":[78,119,144],"ongoing":[79],"research":[80],"challenge,":[81],"especially":[82],"combined":[84],"scenarios":[85],"where":[86],"tactical":[87],"data":[88,115,161],"may":[89],"flow":[90],"across":[91],"organizational":[92],"boundaries.":[93],"This":[94],"paper":[95],"presents":[96],"a":[97,179],"best-effort":[98],"approach":[99],"Data":[101],"Leakage":[102],"Prevention":[103],"(DLP)":[104],"inter-organizational":[106],"networks.":[108],"proposed":[110,169],"architecture":[111,140],"makes":[112],"of":[114],"mining":[116],"techniques":[117],"efficient":[120],"n-dimensional":[121],"clustering":[122],"algorithm":[123],"which":[124],"has":[125],"previously":[126],"been":[127],"successfully":[128],"used":[129],"real-time":[131],"anomaly":[132],"detection":[133],"critical":[135],"infrastructure":[136],"protection.":[137],"DLP":[139],"developed":[142],"extension":[145],"GTRS":[148],"system,":[149],"modeled":[150],"simulated":[152],"OPNET\u2122":[154],"Modeler.":[155],"Our":[156],"results":[157],"show":[158],"that":[159],"common":[160],"can":[163],"be":[164],"efficiently":[165],"identified":[166],"scheme,":[170],"while":[171],"keeping":[172],"important":[174],"false":[175],"positive":[176],"rate":[177],"at":[178],"very":[180],"low":[181],"level.":[182]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
