{"id":"https://openalex.org/W2729537186","doi":"https://doi.org/10.1109/tbdata.2017.2723570","title":"Big Data for Cybersecurity: Vulnerability Disclosure Trends and Dependencies","display_name":"Big Data for Cybersecurity: Vulnerability Disclosure Trends and Dependencies","publication_year":2017,"publication_date":"2017-07-05","ids":{"openalex":"https://openalex.org/W2729537186","doi":"https://doi.org/10.1109/tbdata.2017.2723570","mag":"2729537186"},"language":"en","primary_location":{"id":"doi:10.1109/tbdata.2017.2723570","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tbdata.2017.2723570","pdf_url":null,"source":{"id":"https://openalex.org/S2491400915","display_name":"IEEE Transactions on Big Data","issn_l":"2332-7790","issn":["2332-7790","2372-2096"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Big Data","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023880427","display_name":"MingJian Tang","orcid":"https://orcid.org/0000-0003-1179-3942"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"MingJian Tang","raw_affiliation_strings":["School of Risk and Actuarial Studies, University of New South Wales, NSW, Australia"],"raw_orcid":"https://orcid.org/0000-0003-1179-3942","affiliations":[{"raw_affiliation_string":"School of Risk and Actuarial Studies, University of New South Wales, NSW, Australia","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018409592","display_name":"Mamoun Alazab","orcid":"https://orcid.org/0000-0002-1928-3704"},"institutions":[{"id":"https://openalex.org/I118347636","display_name":"Australian National University","ror":"https://ror.org/019wvm592","country_code":"AU","type":"education","lineage":["https://openalex.org/I118347636"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Mamoun Alazab","raw_affiliation_strings":["Australian National University, Canberra, ACT, Australia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Australian National University, Canberra, ACT, Australia","institution_ids":["https://openalex.org/I118347636"]}]},{"author_position":"last","author":{"id":null,"display_name":"Yuxiu Luo","orcid":null},"institutions":[{"id":"https://openalex.org/I4210120068","display_name":"IBM Research - Australia","ror":"https://ror.org/027r3nx49","country_code":"AU","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210114115","https://openalex.org/I4210120068"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yuxiu Luo","raw_affiliation_strings":["Global Business Service (GBS), IBM Australia, NSW, Australia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Global Business Service (GBS), IBM Australia, NSW, Australia","institution_ids":["https://openalex.org/I4210120068"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5023880427"],"corresponding_institution_ids":["https://openalex.org/I31746571"],"apc_list":null,"apc_paid":null,"fwci":13.1532,"has_fulltext":false,"cited_by_count":143,"citation_normalized_percentile":{"value":0.98625322,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"5","issue":"3","first_page":"317","last_page":"329"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9557999968528748,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.8849750757217407},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.8230427503585815},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7696382999420166},{"id":"https://openalex.org/keywords/vulnerability-management","display_name":"Vulnerability management","score":0.7317171096801758},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6616233587265015},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.6172307729721069},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.5050695538520813},{"id":"https://openalex.org/keywords/risk-management","display_name":"Risk management","score":0.4992377758026123},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.4928121864795685},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.4338308572769165},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.4168367385864258},{"id":"https://openalex.org/keywords/data-management","display_name":"Data management","score":0.41051602363586426},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.26100483536720276},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.22303098440170288}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.8849750757217407},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.8230427503585815},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7696382999420166},{"id":"https://openalex.org/C172776598","wikidata":"https://www.wikidata.org/wiki/Q7943570","display_name":"Vulnerability management","level":4,"score":0.7317171096801758},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6616233587265015},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.6172307729721069},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.5050695538520813},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.4992377758026123},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.4928121864795685},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4338308572769165},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.4168367385864258},{"id":"https://openalex.org/C1668388","wikidata":"https://www.wikidata.org/wiki/Q1149776","display_name":"Data management","level":2,"score":0.41051602363586426},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.26100483536720276},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.22303098440170288},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tbdata.2017.2723570","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tbdata.2017.2723570","pdf_url":null,"source":{"id":"https://openalex.org/S2491400915","display_name":"IEEE Transactions on Big Data","issn_l":"2332-7790","issn":["2332-7790","2372-2096"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Big Data","raw_type":"journal-article"},{"id":"pmh:oai:openresearch-repository.anu.edu.au:1885/282451","is_oa":false,"landing_page_url":"http://hdl.handle.net/1885/282451","pdf_url":null,"source":{"id":"https://openalex.org/S4306402539","display_name":"ANU Open Research (Australian National University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I118347636","host_organization_name":"Australian National University","host_organization_lineage":["https://openalex.org/I118347636"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Transactions on Big Data","raw_type":"Journal article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6399999856948853,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320320577","display_name":"La Trobe University","ror":"https://ror.org/01rxfrp27"},{"id":"https://openalex.org/F4320320965","display_name":"University of New South Wales","ror":"https://ror.org/03r8z3t63"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":75,"referenced_works":["https://openalex.org/W23242426","https://openalex.org/W105701950","https://openalex.org/W110007310","https://openalex.org/W141628768","https://openalex.org/W1529026127","https://openalex.org/W1580561995","https://openalex.org/W1588163064","https://openalex.org/W1707806712","https://openalex.org/W1834081490","https://openalex.org/W1971733255","https://openalex.org/W1979575715","https://openalex.org/W1993687631","https://openalex.org/W1999996900","https://openalex.org/W2000052253","https://openalex.org/W2012649175","https://openalex.org/W2014113877","https://openalex.org/W2027887391","https://openalex.org/W2029438113","https://openalex.org/W2040263621","https://openalex.org/W2043079332","https://openalex.org/W2063236501","https://openalex.org/W2081290035","https://openalex.org/W2093973026","https://openalex.org/W2116512828","https://openalex.org/W2117405938","https://openalex.org/W2125653920","https://openalex.org/W2134646643","https://openalex.org/W2152804254","https://openalex.org/W2155372789","https://openalex.org/W2159173139","https://openalex.org/W2159590183","https://openalex.org/W2168234580","https://openalex.org/W2169439765","https://openalex.org/W2172029077","https://openalex.org/W2180474751","https://openalex.org/W2182001525","https://openalex.org/W2242456062","https://openalex.org/W2263098707","https://openalex.org/W2280570678","https://openalex.org/W2303287830","https://openalex.org/W2323890320","https://openalex.org/W2331870320","https://openalex.org/W2333725978","https://openalex.org/W2344286452","https://openalex.org/W2344535803","https://openalex.org/W2365436337","https://openalex.org/W2400798192","https://openalex.org/W2497280683","https://openalex.org/W2516920790","https://openalex.org/W2535855005","https://openalex.org/W2552093437","https://openalex.org/W2564598968","https://openalex.org/W2586277768","https://openalex.org/W2590294838","https://openalex.org/W3005974372","https://openalex.org/W3103571870","https://openalex.org/W3122820950","https://openalex.org/W3122934377","https://openalex.org/W3123926702","https://openalex.org/W3123969097","https://openalex.org/W3126076427","https://openalex.org/W3141872514","https://openalex.org/W4205550663","https://openalex.org/W4250505091","https://openalex.org/W4285719527","https://openalex.org/W6600897621","https://openalex.org/W6605652651","https://openalex.org/W6634968766","https://openalex.org/W6637554470","https://openalex.org/W6660556005","https://openalex.org/W6678302808","https://openalex.org/W6697460116","https://openalex.org/W6789047656","https://openalex.org/W6805781468","https://openalex.org/W6845600186"],"related_works":["https://openalex.org/W2393340519","https://openalex.org/W2390459954","https://openalex.org/W4220885008","https://openalex.org/W2057803998","https://openalex.org/W4298219515","https://openalex.org/W2021298062","https://openalex.org/W1613146948","https://openalex.org/W3118510577","https://openalex.org/W2185499427","https://openalex.org/W4388541873"],"abstract_inverted_index":{"Complex":[0],"Big":[1],"Data":[2],"systems":[3],"in":[4,77,103,145],"modern":[5,49],"organisations":[6,50,56,96],"are":[7],"progressively":[8],"becoming":[9],"attack":[10],"targets":[11],"by":[12],"existing":[13,164],"and":[14,19,29,37,85,97,121,204,211],"emerging":[15],"threat":[16],"agents.":[17],"Elaborate":[18],"specialised":[20],"attacks":[21],"will":[22,90],"increasingly":[23],"be":[24,74],"crafted":[25],"to":[26,40,58,73,95,162,178],"exploit":[27,212],"vulnerabilities":[28,64],"weaknesses.":[30],"With":[31],"the":[32,60,104,111,146,163,172,189,216,219,225],"ever-increasing":[33],"trend":[34],"of":[35,52,63,87,106,228],"cybercrime":[36],"incidents":[38],"due":[39],"these":[41],"vulnerabilities,":[42],"effective":[43],"vulnerability":[44,70,88,116,157,192,210,229],"management":[45,71,105,240],"is":[46],"imperative":[47],"for":[48,221,236],"regardless":[51],"their":[53,67,180],"size.":[54],"However,":[55],"struggle":[57],"manage":[59],"sheer":[61],"volume":[62,84],"discovered":[65],"on":[66,139,166,224],"networks.":[68],"Moreover,":[69],"tends":[72],"more":[75,101,173,233],"reactive":[76],"practice.":[78],"Rigorous":[79],"statistical":[80],"models,":[81],"simulating":[82],"anticipated":[83],"dependence":[86,153],"disclosures,":[89],"undoubtedly":[91],"provide":[92],"important":[93,137],"insights":[94],"help":[98],"them":[99],"become":[100],"proactive":[102],"cyber":[107,238],"risks.":[108,158],"By":[109,129],"leveraging":[110],"rich":[112],"yet":[113],"complex":[114],"historical":[115],"data,":[117,193],"our":[118,184],"proposed":[119],"novel":[120],"rigorous":[122],"framework":[123],"has":[124],"enabled":[125],"this":[126,131],"new":[127],"capability.":[128],"utilising":[130],"sound":[132],"framework,":[133],"we":[134,170,194],"initiated":[135],"an":[136],"study":[138,223],"not":[140],"only":[141],"handling":[142],"persistent":[143],"volatilities":[144],"data":[147],"but":[148],"also":[149],"further":[150,222],"unveiling":[151],"multivariate":[152,175],"structure":[154],"amongst":[155],"different":[156,209],"In":[159,214],"sharp":[160],"contrast":[161],"studies":[165,187],"univariate":[167],"time":[168],"series,":[169],"consider":[171],"general":[174],"case":[176],"striving":[177],"capture":[179,203],"intriguing":[181],"relationships.":[182],"Through":[183],"extensive":[185],"empirical":[186],"using":[188],"real":[190],"world":[191],"have":[195],"shown":[196],"that":[197],"a":[198,242],"composite":[199],"model":[200],"can":[201],"effectively":[202],"preserve":[205],"long-term":[206],"dependency":[207],"between":[208],"disclosures.":[213],"addition,":[215],"paper":[217],"paves":[218],"way":[220],"stochastic":[226],"perspective":[227],"proliferation":[230],"towards":[231],"building":[232],"accurate":[234],"measures":[235],"better":[237],"risk":[239],"as":[241],"whole.":[243]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":22},{"year":2023,"cited_by_count":13},{"year":2022,"cited_by_count":20},{"year":2021,"cited_by_count":52},{"year":2020,"cited_by_count":16},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
