{"id":"https://openalex.org/W4415256871","doi":"https://doi.org/10.1109/msec.2025.3610295","title":"Cybersecurity in Tactical Edge Networks","display_name":"Cybersecurity in Tactical Edge Networks","publication_year":2025,"publication_date":"2025-10-16","ids":{"openalex":"https://openalex.org/W4415256871","doi":"https://doi.org/10.1109/msec.2025.3610295"},"language":null,"primary_location":{"id":"doi:10.1109/msec.2025.3610295","is_oa":false,"landing_page_url":"https://doi.org/10.1109/msec.2025.3610295","pdf_url":null,"source":{"id":"https://openalex.org/S61906035","display_name":"IEEE Security & Privacy","issn_l":"1540-7993","issn":["1540-7993","1558-4046"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Security &amp; Privacy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057402438","display_name":"Kevin Chan","orcid":"https://orcid.org/0000-0002-6425-5403"},"institutions":[{"id":"https://openalex.org/I166416128","display_name":"DEVCOM Army Research Laboratory","ror":"https://ror.org/011hc8f90","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I166416128","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]},{"id":"https://openalex.org/I2802705668","display_name":"United States Army Combat Capabilities Development Command","ror":"https://ror.org/02rdkx920","country_code":"US","type":"other","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Kevin S. Chan","raw_affiliation_strings":["Networks, Cyber, and Computational Sciences Division, U.S. Army Combat Capabilities Development Command Army Research Laboratory (DEVCOM ARL), Adelphi, MD, USA","Development Command Army Research Laboratory (DEVCOM ARL), Adelphi, MD, USA"],"affiliations":[{"raw_affiliation_string":"Networks, Cyber, and Computational Sciences Division, U.S. Army Combat Capabilities Development Command Army Research Laboratory (DEVCOM ARL), Adelphi, MD, USA","institution_ids":["https://openalex.org/I2802705668","https://openalex.org/I166416128"]},{"raw_affiliation_string":"Development Command Army Research Laboratory (DEVCOM ARL), Adelphi, MD, USA","institution_ids":["https://openalex.org/I166416128","https://openalex.org/I2802705668"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112480419","display_name":"Frank T. Johnsen","orcid":"https://orcid.org/0000-0002-7658-4503"},"institutions":[{"id":"https://openalex.org/I163244428","display_name":"Norwegian Defence Research Establishment","ror":"https://ror.org/0098gnz32","country_code":"NO","type":"facility","lineage":["https://openalex.org/I163244428"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Frank T. Johnsen","raw_affiliation_strings":["Strategic Analyses and Joint Systems Department, Norwegian Defence Research Establishment (FFI), Kjeller, Norway","Norwegian Defence Research Establishmen (FFI), Kjeller, Norway"],"affiliations":[{"raw_affiliation_string":"Strategic Analyses and Joint Systems Department, Norwegian Defence Research Establishment (FFI), Kjeller, Norway","institution_ids":["https://openalex.org/I163244428"]},{"raw_affiliation_string":"Norwegian Defence Research Establishmen (FFI), Kjeller, Norway","institution_ids":["https://openalex.org/I163244428"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5057402438"],"corresponding_institution_ids":["https://openalex.org/I166416128","https://openalex.org/I2802705668"],"apc_list":null,"apc_paid":null,"fwci":1.529,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.88079396,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"23","issue":"6","first_page":"10","last_page":"20"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9581000208854675,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9581000208854675,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9448000192642212,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9282000064849854,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/north-atlantic-treaty","display_name":"North Atlantic Treaty","score":0.6165000200271606},{"id":"https://openalex.org/keywords/treaty","display_name":"Treaty","score":0.5527999997138977},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.49799999594688416},{"id":"https://openalex.org/keywords/adaptation","display_name":"Adaptation (eye)","score":0.4510999917984009},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.37880000472068787},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.3601999878883362}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.670799970626831},{"id":"https://openalex.org/C2776161467","wikidata":"https://www.wikidata.org/wiki/Q877399","display_name":"North Atlantic Treaty","level":3,"score":0.6165000200271606},{"id":"https://openalex.org/C2779010840","wikidata":"https://www.wikidata.org/wiki/Q131569","display_name":"Treaty","level":2,"score":0.5527999997138977},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5271000266075134},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.49799999594688416},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.4510999917984009},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.37880000472068787},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.3601999878883362},{"id":"https://openalex.org/C2780934415","wikidata":"https://www.wikidata.org/wiki/Q20997131","display_name":"Border Security","level":2,"score":0.3546000123023987},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.3463999927043915},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.32350000739097595},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.31690001487731934},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.30660000443458557}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/msec.2025.3610295","is_oa":false,"landing_page_url":"https://doi.org/10.1109/msec.2025.3610295","pdf_url":null,"source":{"id":"https://openalex.org/S61906035","display_name":"IEEE Security & Privacy","issn_l":"1540-7993","issn":["1540-7993","1558-4046"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Security &amp; Privacy","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1724472458","https://openalex.org/W2790810446","https://openalex.org/W3026923845","https://openalex.org/W4313638671","https://openalex.org/W4386883404","https://openalex.org/W4389319236","https://openalex.org/W4390189735","https://openalex.org/W4394729324","https://openalex.org/W4404333799","https://openalex.org/W4405104214"],"related_works":[],"abstract_inverted_index":{"Securing":[0],"computing":[1],"operations":[2],"at":[3],"the":[4],"tactical":[5],"edge":[6],"remains":[7],"a":[8],"crucial":[9],"challenge.":[10],"A":[11],"recent":[12],"North":[13],"Atlantic":[14],"Treaty":[15],"Organization":[16],"Science":[17],"and":[18,21,27],"Technology":[19],"report":[20],"technical":[22],"symposium":[23],"indicates":[24],"that":[25],"context-awareness":[26],"adaptation":[28],"in":[29],"cybersecurity":[30],"posture":[31],"can":[32],"address":[33],"these":[34],"evolving":[35],"challenges.":[36]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-03-26T15:22:09.906841","created_date":"2025-10-17T00:00:00"}
