{"id":"https://openalex.org/W2039292858","doi":"https://doi.org/10.1109/sysose.2012.6384127","title":"Advancing the defense in depth model","display_name":"Advancing the defense in depth model","publication_year":2012,"publication_date":"2012-07-01","ids":{"openalex":"https://openalex.org/W2039292858","doi":"https://doi.org/10.1109/sysose.2012.6384127","mag":"2039292858"},"language":"en","primary_location":{"id":"doi:10.1109/sysose.2012.6384127","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sysose.2012.6384127","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 7th International Conference on System of Systems Engineering (SoSE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076742948","display_name":"Stephen Groat","orcid":null},"institutions":[{"id":"https://openalex.org/I24648388","display_name":"Bradley University","ror":"https://ror.org/04kmeaw70","country_code":"US","type":"education","lineage":["https://openalex.org/I24648388"]},{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Stephen Groat","raw_affiliation_strings":["IT Security Office and Laboratory Bradley Department of Electrical andComputer Engineering, Virginia Technology, Blacksburg, VA, USA","IT Security Office and Lab, Bradley Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, 24061, USA"],"affiliations":[{"raw_affiliation_string":"IT Security Office and Laboratory Bradley Department of Electrical andComputer Engineering, Virginia Technology, Blacksburg, VA, USA","institution_ids":["https://openalex.org/I24648388"]},{"raw_affiliation_string":"IT Security Office and Lab, Bradley Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, 24061, USA","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110356556","display_name":"Joseph G. Tront","orcid":null},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Joseph Tront","raw_affiliation_strings":["Bradley Department of Electrical and Computer Engineering, Virginia Technology, Blacksburg, VA, USA","Bradley Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, 24061 USA"],"affiliations":[{"raw_affiliation_string":"Bradley Department of Electrical and Computer Engineering, Virginia Technology, Blacksburg, VA, USA","institution_ids":["https://openalex.org/I859038795"]},{"raw_affiliation_string":"Bradley Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, 24061 USA","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051333920","display_name":"Randy Marchany","orcid":"https://orcid.org/0000-0002-9048-3872"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Randy Marchany","raw_affiliation_strings":["IT Security Office and Laboratory, Virginia Technology, Blacksburg, VA, USA","IT Security Office and Lab, Virginia Tech, Blacksburg, 24061, USA"],"affiliations":[{"raw_affiliation_string":"IT Security Office and Laboratory, Virginia Technology, Blacksburg, VA, USA","institution_ids":["https://openalex.org/I859038795"]},{"raw_affiliation_string":"IT Security Office and Lab, Virginia Tech, Blacksburg, 24061, USA","institution_ids":["https://openalex.org/I859038795"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5076742948"],"corresponding_institution_ids":["https://openalex.org/I24648388","https://openalex.org/I859038795"],"apc_list":null,"apc_paid":null,"fwci":1.1282,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.79539043,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"285","last_page":"290"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7581734657287598},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7508347034454346},{"id":"https://openalex.org/keywords/insider","display_name":"Insider","score":0.6447578072547913},{"id":"https://openalex.org/keywords/blocking","display_name":"Blocking (statistics)","score":0.5888147950172424},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5389606952667236},{"id":"https://openalex.org/keywords/network-architecture","display_name":"Network architecture","score":0.5127995610237122},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4870331883430481},{"id":"https://openalex.org/keywords/enterprise-private-network","display_name":"Enterprise private network","score":0.440233051776886},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4272865653038025}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7581734657287598},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7508347034454346},{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.6447578072547913},{"id":"https://openalex.org/C144745244","wikidata":"https://www.wikidata.org/wiki/Q4927286","display_name":"Blocking (statistics)","level":2,"score":0.5888147950172424},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5389606952667236},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.5127995610237122},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4870331883430481},{"id":"https://openalex.org/C149859251","wikidata":"https://www.wikidata.org/wiki/Q483426","display_name":"Enterprise private network","level":2,"score":0.440233051776886},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4272865653038025},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/sysose.2012.6384127","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sysose.2012.6384127","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 7th International Conference on System of Systems Engineering (SoSE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1487878019","https://openalex.org/W1970141412","https://openalex.org/W1990414757","https://openalex.org/W2006861272","https://openalex.org/W2063928382","https://openalex.org/W2106645528","https://openalex.org/W2107831657","https://openalex.org/W2108682287","https://openalex.org/W2116950902","https://openalex.org/W2162503364","https://openalex.org/W2170852315","https://openalex.org/W2235970817","https://openalex.org/W6676403443"],"related_works":["https://openalex.org/W2362500257","https://openalex.org/W2944763794","https://openalex.org/W2363032787","https://openalex.org/W36040077","https://openalex.org/W2390013638","https://openalex.org/W2349495853","https://openalex.org/W2379463196","https://openalex.org/W2361530254","https://openalex.org/W2349199213","https://openalex.org/W2119719849"],"abstract_inverted_index":{"Systems":[0],"and":[1,75,132,175,196,202],"network":[2,27,43,64,96,121,141,170,176],"defenses":[3,35,151],"currently":[4],"implementing":[5],"a":[6,21,42,92,107,163],"Defense":[7],"in":[8,114,199],"Depth":[9],"(DiD)":[10],"strategy":[11],"frequently":[12],"slow":[13],"attackers'":[14],"progress":[15],"but":[16],"do":[17],"not":[18],"act":[19],"as":[20,168],"secure":[22],"barrier.":[23],"These":[24],"systems":[25],"of":[26,33,48,63,83,91,143],"defense":[28,81,97,122],"methods":[29],"are":[30],"primarily":[31],"comprised":[32],"static":[34],"focused":[36,111],"on":[37,77,94],"preventing":[38,129],"attacks":[39,134,187],"from":[40,188],"entering":[41],"by":[44,146,181],"enabling":[45],"the":[46,59,66,99,115,120,126,139,147,182],"features":[47],"blocking":[49],"access,":[50],"requiring":[51],"authentication,":[52],"or":[53,86,109],"analyzing":[54,87],"traffic.":[55,89],"To":[56],"adapt":[57],"to":[58,72,105,124,135,160,185],"ever-changing":[60],"threat":[61],"profile":[62],"attacks,":[65],"DiD":[67,100,116,183],"model":[68,101,117,184],"must":[69,152,178],"be":[70,73,103,106,136,154,179],"adapted":[71],"symmetric":[74],"focus":[76],"new":[78],"vectors":[79],"for":[80,119],"instead":[82,142],"authenticating,":[84],"blocking,":[85],"all":[88],"Instead":[90],"focusing":[93],"feature-centric":[95],"requirements,":[98],"should":[102],"redesigned":[104],"functional":[108],"capability":[110],"model.":[112],"Symmetry":[113],"allows":[118],"system":[123],"recognize":[125],"insider":[127],"threat,":[128],"data":[130],"exfiltration":[131],"allowing":[133],"stopped":[137],"at":[138],"originating":[140],"being":[144],"defended":[145],"attacked":[148],"network.":[149,164],"Dynamic":[150],"also":[153],"enabled,":[155],"which":[156],"change":[157],"attack":[158],"surfaces":[159],"proactively":[161],"defend":[162],"New":[165],"vectors,":[166],"such":[167],"dynamic":[169],"addressing,":[171],"enterprise":[172],"computing":[173],"resources,":[174,195],"architectures,":[177],"used":[180],"prevent":[186],"reaching":[189],"network,":[190],"consuming":[191],"attackers":[192],"often":[193],"limited":[194],"securing":[197],"networks":[198],"their":[200],"design":[201],"architecture.":[203]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
