{"id":"https://openalex.org/W4399731297","doi":"https://doi.org/10.1109/syscon61195.2024.10553474","title":"A CIS Controls V8.0 Scoring System using Combined Ranking-Weight Methods","display_name":"A CIS Controls V8.0 Scoring System using Combined Ranking-Weight Methods","publication_year":2024,"publication_date":"2024-04-15","ids":{"openalex":"https://openalex.org/W4399731297","doi":"https://doi.org/10.1109/syscon61195.2024.10553474"},"language":"en","primary_location":{"id":"doi:10.1109/syscon61195.2024.10553474","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/syscon61195.2024.10553474","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Systems Conference (SysCon)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5099162464","display_name":"Hayat Abdulla Asad Cue","orcid":null},"institutions":[{"id":"https://openalex.org/I165733156","display_name":"University of Georgia","ror":"https://ror.org/00te3t702","country_code":"US","type":"education","lineage":["https://openalex.org/I165733156"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Hayat Abdulla Asad Cue","raw_affiliation_strings":["University of Georgia,School of Electrical and Computer Engineering,Athens,GA,USA","School of Electrical and Computer Engineering, University of Georgia, Athens, GA, USA"],"affiliations":[{"raw_affiliation_string":"University of Georgia,School of Electrical and Computer Engineering,Athens,GA,USA","institution_ids":["https://openalex.org/I165733156"]},{"raw_affiliation_string":"School of Electrical and Computer Engineering, University of Georgia, Athens, GA, USA","institution_ids":["https://openalex.org/I165733156"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056462004","display_name":"Thirimachos Bourlai","orcid":"https://orcid.org/0000-0001-8751-0836"},"institutions":[{"id":"https://openalex.org/I165733156","display_name":"University of Georgia","ror":"https://ror.org/00te3t702","country_code":"US","type":"education","lineage":["https://openalex.org/I165733156"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Thirimachos Bourlai","raw_affiliation_strings":["University of Georgia,Multispectral Imagery Lab School of Electrical and Computer Engineering,Athens,GA,USA","Multispectral Imagery Lab School of Electrical and Computer Engineering, University of Georgia, Athens, GA, USA"],"affiliations":[{"raw_affiliation_string":"University of Georgia,Multispectral Imagery Lab School of Electrical and Computer Engineering,Athens,GA,USA","institution_ids":["https://openalex.org/I165733156"]},{"raw_affiliation_string":"Multispectral Imagery Lab School of Electrical and Computer Engineering, University of Georgia, Athens, GA, USA","institution_ids":["https://openalex.org/I165733156"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110872173","display_name":"Mark Lupo","orcid":null},"institutions":[{"id":"https://openalex.org/I165733156","display_name":"University of Georgia","ror":"https://ror.org/00te3t702","country_code":"US","type":"education","lineage":["https://openalex.org/I165733156"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mark Lupo","raw_affiliation_strings":["University of Georgia,Carl Vinson Institute of Government,Athens,GA,USA","Carl Vinson Institute of Government, University of Georgia, Athens, GA, USA"],"affiliations":[{"raw_affiliation_string":"University of Georgia,Carl Vinson Institute of Government,Athens,GA,USA","institution_ids":["https://openalex.org/I165733156"]},{"raw_affiliation_string":"Carl Vinson Institute of Government, University of Georgia, Athens, GA, USA","institution_ids":["https://openalex.org/I165733156"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5099162464"],"corresponding_institution_ids":["https://openalex.org/I165733156"],"apc_list":null,"apc_paid":null,"fwci":0.3663,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.57730258,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9821000099182129,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9821000099182129,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10317","display_name":"Advanced Database Systems and Queries","score":0.9269000291824341,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12761","display_name":"Data Stream Mining Techniques","score":0.9129999876022339,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ranking","display_name":"Ranking (information retrieval)","score":0.7288945317268372},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6152777075767517},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3629724979400635},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3248538374900818}],"concepts":[{"id":"https://openalex.org/C189430467","wikidata":"https://www.wikidata.org/wiki/Q7293293","display_name":"Ranking (information retrieval)","level":2,"score":0.7288945317268372},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6152777075767517},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3629724979400635},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3248538374900818}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/syscon61195.2024.10553474","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/syscon61195.2024.10553474","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Systems Conference (SysCon)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2744879410","https://openalex.org/W2921882133","https://openalex.org/W2969258218","https://openalex.org/W2969335200","https://openalex.org/W2971207148","https://openalex.org/W2995746035","https://openalex.org/W3108395526","https://openalex.org/W3147876808","https://openalex.org/W3173714054","https://openalex.org/W3186819284","https://openalex.org/W3201326868","https://openalex.org/W3211845581","https://openalex.org/W4312338735","https://openalex.org/W4313327949","https://openalex.org/W4316021484","https://openalex.org/W4360585199","https://openalex.org/W4368232268","https://openalex.org/W4385834203"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W2382290278","https://openalex.org/W4395014643"],"abstract_inverted_index":{"Cybersecurity":[0],"compliance":[1,17],"assessments":[2],"are":[3,19,28,48,202],"crucial":[4],"for":[5,40,118,193],"many":[6],"organizations\u2019":[7],"cybersecurity":[8,77,163],"risk":[9],"management":[10],"and":[11,63,136,150,185],"cyber":[12,196,242],"resilience":[13],"development.":[14],"While":[15],"qualitative":[16,236],"aspects":[18],"always":[20],"present":[21],"in":[22,83,147,165],"the":[23,76,90,112,116,129,151,162,186,205,217,232],"assessment":[24],"process,":[25],"quantitative":[26,169],"ones":[27],"not":[29,49,238],"primarily":[30],"being":[31],"used.":[32],"In":[33],"addition,":[34],"multiple":[35],"studies":[36],"have":[37,71,209],"proposed":[38,152,173],"methods":[39,70,135,145],"quantifying":[41],"these":[42],"assessments.":[43],"Still,":[44],"most":[45,218],"of":[46,85,92,115,133,144,171,181,221,234],"them":[47],"directly":[50,239],"applicable":[51],"to":[52,74,87,160,176,212,227,241],"target-rich,":[53],"resource-poor":[54],"organizations":[55],"like":[56],"public":[57],"school":[58],"systems,":[59],"hospitals,":[60],"small":[61],"businesses,":[62],"government":[64],"offices.":[65],"On":[66],"limited":[67],"occasions,":[68],"Rank-Weight":[69,134],"been":[72,210],"applied":[73],"solve":[75],"criteria":[78,97,188],"weighting":[79],"problem,":[80],"with":[81,96],"limitations":[82],"terms":[84],"having":[86],"decide":[88],"between":[89],"variants":[91],"those":[93],"methods,":[94],"along":[95],"prioritization":[98],"issues.":[99],"To":[100],"bridge":[101],"this":[102,148],"gap,":[103],"we":[104,201],"introduce":[105],"a":[106,137,157],"novel":[107],"scoring":[108,153],"system":[109,154],"focusing":[110,203],"on":[111,204],"latest":[113],"version":[114],"Center":[117],"Internet":[119],"Security":[120,122],"Critical":[121],"Controls":[123],"(CIS":[124],"Controls).":[125],"Our":[126],"work":[127,174],"integrates":[128],"Harmonic":[130],"mean":[131],"combination":[132,143],"six-base":[138],"safeguard":[139],"implementation":[140],"levels.":[141],"The":[142,168],"presented":[146],"paper":[149],"solution":[155],"provides":[156],"quantitative-based":[158],"approach":[159,224],"assess":[161],"posture":[164,184],"practical":[166],"scenarios.":[167],"aspect":[170],"our":[172,223],"contributes":[175],"stakeholders\u2019":[177],"more":[178,229],"accurate":[179],"understanding":[180],"their":[182],"security":[183,187],"that":[189,215],"must":[190],"be":[191,228],"prioritized":[192],"efficiently":[194],"addressing":[195],"threat":[197,243],"challenges.":[198],"Moreover,":[199],"because":[200],"CIS":[206],"controls,":[207],"which":[208],"mapped":[211],"mitigation":[213],"techniques":[214],"prevent":[216],"common":[219],"types":[220],"attacks,":[222],"is":[225],"expected":[226],"realistic":[230],"than":[231],"adaptation":[233],"other":[235],"frameworks":[237],"linked":[240],"empirical":[244],"evidence.":[245]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
