{"id":"https://openalex.org/W2313545748","doi":"https://doi.org/10.1109/tdsc.2015.2427846","title":"Detection of Unspecified Emergencies for Controlled Information Sharing","display_name":"Detection of Unspecified Emergencies for Controlled Information Sharing","publication_year":2015,"publication_date":"2015-04-29","ids":{"openalex":"https://openalex.org/W2313545748","doi":"https://doi.org/10.1109/tdsc.2015.2427846","mag":"2313545748"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2015.2427846","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2015.2427846","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057684417","display_name":"Barbara Carminati","orcid":"https://orcid.org/0000-0002-7502-4731"},"institutions":[{"id":"https://openalex.org/I115752224","display_name":"University of Insubria","ror":"https://ror.org/00s409261","country_code":"IT","type":"education","lineage":["https://openalex.org/I115752224"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Barbara Carminati","raw_affiliation_strings":["Department of Theoretical and Applied Science, University of Insubria, Varese, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Theoretical and Applied Science, University of Insubria, Varese, Italy","institution_ids":["https://openalex.org/I115752224"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036362276","display_name":"Elena Ferrari","orcid":"https://orcid.org/0000-0002-7312-6769"},"institutions":[{"id":"https://openalex.org/I115752224","display_name":"University of Insubria","ror":"https://ror.org/00s409261","country_code":"IT","type":"education","lineage":["https://openalex.org/I115752224"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Elena Ferrari","raw_affiliation_strings":["Department of Theoretical and Applied Science, University of Insubria, Varese, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Theoretical and Applied Science, University of Insubria, Varese, Italy","institution_ids":["https://openalex.org/I115752224"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068143470","display_name":"Michele Guglielmi","orcid":null},"institutions":[{"id":"https://openalex.org/I115752224","display_name":"University of Insubria","ror":"https://ror.org/00s409261","country_code":"IT","type":"education","lineage":["https://openalex.org/I115752224"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Michele Guglielmi","raw_affiliation_strings":["Department of Theoretical and Applied Science, University of Insubria, Varese, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Theoretical and Applied Science, University of Insubria, Varese, Italy","institution_ids":["https://openalex.org/I115752224"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5057684417"],"corresponding_institution_ids":["https://openalex.org/I115752224"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.2231892,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"13","issue":"6","first_page":"630","last_page":"643"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7332084774971008},{"id":"https://openalex.org/keywords/information-sharing","display_name":"Information sharing","score":0.43180739879608154},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3718442916870117},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.32327473163604736},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.21466267108917236}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7332084774971008},{"id":"https://openalex.org/C2776854237","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information sharing","level":2,"score":0.43180739879608154},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3718442916870117},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.32327473163604736},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.21466267108917236}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tdsc.2015.2427846","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2015.2427846","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},{"id":"pmh:oai:irinsubria.uninsubria.it:11383/2022478","is_oa":false,"landing_page_url":"http://hdl.handle.net/11383/2022478","pdf_url":null,"source":{"id":"https://openalex.org/S4377196351","display_name":"IrInSubria (University of Insubria)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I115752224","host_organization_name":"University of Insubria","host_organization_lineage":["https://openalex.org/I115752224"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320338279","display_name":"Air Force Office of Scientific Research","ror":"https://ror.org/011e9bt93"},{"id":"https://openalex.org/F4320338503","display_name":"European Office of Aerospace Research and Development","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W120019470","https://openalex.org/W1585331908","https://openalex.org/W1964782951","https://openalex.org/W1988608453","https://openalex.org/W2020255359","https://openalex.org/W2045706391","https://openalex.org/W2073553076","https://openalex.org/W2079034628","https://openalex.org/W2092256938","https://openalex.org/W2105510466","https://openalex.org/W2112915393","https://openalex.org/W2116619054","https://openalex.org/W2123662741","https://openalex.org/W2136480620","https://openalex.org/W2140313762","https://openalex.org/W2140523882","https://openalex.org/W2142877744","https://openalex.org/W2144638830","https://openalex.org/W2154336835","https://openalex.org/W2154765153","https://openalex.org/W3037078099","https://openalex.org/W4205222528","https://openalex.org/W6635212278","https://openalex.org/W6677489803","https://openalex.org/W6680607918"],"related_works":["https://openalex.org/W2130966263","https://openalex.org/W1548040509","https://openalex.org/W3007967230","https://openalex.org/W2030496847","https://openalex.org/W2996030651","https://openalex.org/W228809297","https://openalex.org/W2370189651","https://openalex.org/W259928282","https://openalex.org/W2392040788","https://openalex.org/W2370196981"],"abstract_inverted_index":{"During":[0],"emergency":[1,20,23],"situations":[2,24,36,50],"one":[3],"of":[4,105,108],"the":[5,10,19,40,106,114,116],"key":[6],"requirements":[7,64],"to":[8,31,38,56,75,86,121],"handle":[9],"crisis":[11],"is":[12,29,53,85],"information":[13,41,62,92],"sharing":[14,42,63,93],"among":[15],"organizations":[16],"involved":[17],"in":[18,44,67],"management.":[21],"When":[22],"are":[25,48],"well":[26],"known,":[27],"it":[28,52],"possible":[30,55],"specify":[32],"a":[33,72],"priori":[34],"these":[35,58],"and":[37,60,80,90,103],"plan":[39],"needs":[43,94],"advance.":[45],"However,":[46],"there":[47],"many":[49],"where":[51],"not":[54],"describe":[57],"emergencies":[59,89],"their":[61,123],"beforehand.":[65],"Therefore,":[66],"this":[68],"paper,":[69],"we":[70],"present":[71],"framework":[73],"able":[74],"deal":[76],"with":[77],"both":[78],"specified":[79],"unspecified":[81,88],"emergencies.":[82],"The":[83],"idea":[84],"detect":[87],"related":[91],"through":[95],"denied":[96],"access":[97,110],"request":[98],"analysis,":[99],"anomaly":[100],"detection":[101],"techniques,":[102,115],"analysis":[104],"history":[107],"permitted":[109],"requests.":[111],"Besides":[112],"presenting":[113],"paper":[117],"also":[118],"presents":[119],"experiments":[120],"verify":[122],"effectiveness.":[124]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
