{"id":"https://openalex.org/W2413912799","doi":"https://doi.org/10.1109/sas.2016.7479838","title":"The application of security adaptive framework for sensor in industrial systems","display_name":"The application of security adaptive framework for sensor in industrial systems","publication_year":2016,"publication_date":"2016-04-01","ids":{"openalex":"https://openalex.org/W2413912799","doi":"https://doi.org/10.1109/sas.2016.7479838","mag":"2413912799"},"language":"en","primary_location":{"id":"doi:10.1109/sas.2016.7479838","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sas.2016.7479838","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE Sensors Applications Symposium (SAS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034506264","display_name":"Bruno A. Mozzaquatro","orcid":"https://orcid.org/0000-0002-3255-1320"},"institutions":[{"id":"https://openalex.org/I83558840","display_name":"Universidade Nova de Lisboa","ror":"https://ror.org/02xankh89","country_code":"PT","type":"education","lineage":["https://openalex.org/I83558840"]}],"countries":["PT"],"is_corresponding":true,"raw_author_name":"Bruno A. Mozzaquatro","raw_affiliation_strings":["DEE/FCT - Universidade Nova de Lisboa, Caparica, Portugal"],"affiliations":[{"raw_affiliation_string":"DEE/FCT - Universidade Nova de Lisboa, Caparica, Portugal","institution_ids":["https://openalex.org/I83558840"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041536184","display_name":"Ricardo Jardim\u2010Gon\u00e7alves","orcid":"https://orcid.org/0000-0002-3703-6854"},"institutions":[{"id":"https://openalex.org/I83558840","display_name":"Universidade Nova de Lisboa","ror":"https://ror.org/02xankh89","country_code":"PT","type":"education","lineage":["https://openalex.org/I83558840"]}],"countries":["PT"],"is_corresponding":false,"raw_author_name":"Ricardo Jardim-Goncalves","raw_affiliation_strings":["DEE/FCT - Universidade Nova de Lisboa, Caparica, Portugal"],"affiliations":[{"raw_affiliation_string":"DEE/FCT - Universidade Nova de Lisboa, Caparica, Portugal","institution_ids":["https://openalex.org/I83558840"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023287726","display_name":"Raquel Melo","orcid":"https://orcid.org/0000-0002-8111-8777"},"institutions":[{"id":"https://openalex.org/I4210127031","display_name":"Uninova","ror":"https://ror.org/0373te416","country_code":"PT","type":"funder","lineage":["https://openalex.org/I4210127031"]}],"countries":["PT"],"is_corresponding":false,"raw_author_name":"Raquel Melo","raw_affiliation_strings":["Centre of Technology and Systems UNINOVA, Caparica, Portugal"],"affiliations":[{"raw_affiliation_string":"Centre of Technology and Systems UNINOVA, Caparica, Portugal","institution_ids":["https://openalex.org/I4210127031"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050322049","display_name":"Carlos Agostinho","orcid":"https://orcid.org/0000-0002-2884-776X"},"institutions":[{"id":"https://openalex.org/I4210127031","display_name":"Uninova","ror":"https://ror.org/0373te416","country_code":"PT","type":"funder","lineage":["https://openalex.org/I4210127031"]}],"countries":["PT"],"is_corresponding":false,"raw_author_name":"Carlos Agostinho","raw_affiliation_strings":["Centre of Technology and Systems UNINOVA, Caparica, Portugal"],"affiliations":[{"raw_affiliation_string":"Centre of Technology and Systems UNINOVA, Caparica, Portugal","institution_ids":["https://openalex.org/I4210127031"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5034506264"],"corresponding_institution_ids":["https://openalex.org/I83558840"],"apc_list":null,"apc_paid":null,"fwci":0.2895,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.61417058,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"2","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.778582751750946},{"id":"https://openalex.org/keywords/ontology","display_name":"Ontology","score":0.6753854155540466},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5237731337547302},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.5172622799873352},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.4978644847869873},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4881618618965149},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4485015273094177},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3490331172943115},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.11641693115234375},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.09602248668670654}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.778582751750946},{"id":"https://openalex.org/C25810664","wikidata":"https://www.wikidata.org/wiki/Q44325","display_name":"Ontology","level":2,"score":0.6753854155540466},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5237731337547302},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.5172622799873352},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.4978644847869873},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4881618618965149},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4485015273094177},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3490331172943115},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.11641693115234375},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.09602248668670654},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/sas.2016.7479838","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sas.2016.7479838","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE Sensors Applications Symposium (SAS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1970429723","https://openalex.org/W1990911977","https://openalex.org/W1998690350","https://openalex.org/W1999392360","https://openalex.org/W2018538061","https://openalex.org/W2051152775","https://openalex.org/W2057776033","https://openalex.org/W2067081853","https://openalex.org/W2074828774","https://openalex.org/W2096974968","https://openalex.org/W2111075016","https://openalex.org/W2114507260","https://openalex.org/W2120552818","https://openalex.org/W2126993465","https://openalex.org/W2129609617","https://openalex.org/W2134295053","https://openalex.org/W2136071609","https://openalex.org/W2139092348","https://openalex.org/W2143591442","https://openalex.org/W2166196498","https://openalex.org/W2178969673","https://openalex.org/W2342751053","https://openalex.org/W2369295637","https://openalex.org/W4232650821","https://openalex.org/W4404847576","https://openalex.org/W6650105910","https://openalex.org/W6677890590"],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W2950174689","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4247463117","https://openalex.org/W4361251261","https://openalex.org/W3031181660"],"abstract_inverted_index":{"Sensor":[0],"networks":[1,37],"is":[2,116],"a":[3,39],"solid":[4],"basis":[5],"for":[6,90],"the":[7,46,54,73,91,102,111,117,144],"Internet":[8],"of":[9,62,72,75,106,119,126,140],"Things":[10],"(IoT)":[11],"to":[12,19,58,80,86,100,129,136,143],"provide":[13],"resources,":[14],"business":[15],"models":[16],"and":[17,35,42,56,65,134],"opportunities":[18],"build":[20],"potential":[21,131],"industrial":[22,92,124],"systems":[23,26],"improving":[24],"manufacturing":[25],"with":[27,104],"efficient":[28],"operations.":[29],"In":[30],"this":[31,69],"context,":[32],"IoT":[33,63],"devices":[34,64],"sensor":[36,66],"have":[38],"dynamic":[40],"behavior":[41],"changes":[43],"often":[44],"modifying":[45],"production":[47],"environment.":[48,112],"Nevertheless,":[49],"severe":[50],"threats":[51],"are":[52],"increasing":[53],"complexity":[55],"difficulty":[57],"protect":[59,137],"existing":[60],"vulnerabilities":[61],"networks.":[67],"However,":[68],"work":[70],"analysis":[71],"application":[74],"an":[76],"ontology-based":[77],"security":[78,84,120,132,141],"framework":[79,142],"decision-making":[81],"using":[82],"adaptive":[83],"model":[85],"improve":[87],"secure":[88],"information":[89,108],"systems.":[93],"A":[94],"knowledge":[95],"base":[96],"(IoTSec":[97],"ontology)":[98],"contributes":[99],"feed":[101],"system":[103],"queries":[105],"contextual":[107],"collected":[109],"in":[110,122],"The":[113],"main":[114],"contribution":[115],"identification":[118],"issues":[121],"specific":[123],"scenarios":[125],"C2NET":[127,145],"project":[128],"address":[130],"mechanisms":[133],"approaches":[135],"critical":[138],"aspects":[139],"platform.":[146]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
