{"id":"https://openalex.org/W4313121388","doi":"https://doi.org/10.1109/dsa56465.2022.00059","title":"Security Pattern Detection Through Diagonally Distributed Matrix Matching","display_name":"Security Pattern Detection Through Diagonally Distributed Matrix Matching","publication_year":2022,"publication_date":"2022-08-01","ids":{"openalex":"https://openalex.org/W4313121388","doi":"https://doi.org/10.1109/dsa56465.2022.00059"},"language":"en","primary_location":{"id":"doi:10.1109/dsa56465.2022.00059","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsa56465.2022.00059","pdf_url":null,"source":{"id":"https://openalex.org/S4363608127","display_name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087984404","display_name":"Aleem Khalid Alvi","orcid":"https://orcid.org/0000-0001-5808-003X"},"institutions":[{"id":"https://openalex.org/I204722609","display_name":"Queen's University","ror":"https://ror.org/02y72wh86","country_code":"CA","type":"education","lineage":["https://openalex.org/I204722609"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Aleem Khalid Alvi","raw_affiliation_strings":["School of Computing Queen&#x0027;s University,Kingston,Canada"],"affiliations":[{"raw_affiliation_string":"School of Computing Queen&#x0027;s University,Kingston,Canada","institution_ids":["https://openalex.org/I204722609"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005563986","display_name":"Mohammad Zulkernine","orcid":"https://orcid.org/0000-0003-1697-4101"},"institutions":[{"id":"https://openalex.org/I204722609","display_name":"Queen's University","ror":"https://ror.org/02y72wh86","country_code":"CA","type":"education","lineage":["https://openalex.org/I204722609"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Mohammad Zulkernine","raw_affiliation_strings":["School of Computing Queen&#x0027;s University,Kingston,Canada"],"affiliations":[{"raw_affiliation_string":"School of Computing Queen&#x0027;s University,Kingston,Canada","institution_ids":["https://openalex.org/I204722609"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5087984404"],"corresponding_institution_ids":["https://openalex.org/I204722609"],"apc_list":null,"apc_paid":null,"fwci":0.216,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.37875417,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"390","last_page":"402"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7970540523529053},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.6771693229675293},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.5176306366920471},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.5097074508666992},{"id":"https://openalex.org/keywords/diagonal","display_name":"Diagonal","score":0.4438527822494507},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4433678984642029},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.44220080971717834},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.41135793924331665},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.381827175617218},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.343963623046875},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3166457414627075},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.25125497579574585},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.19550514221191406},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.10738933086395264},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10710039734840393},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08320283889770508}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7970540523529053},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.6771693229675293},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.5176306366920471},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.5097074508666992},{"id":"https://openalex.org/C130367717","wikidata":"https://www.wikidata.org/wiki/Q189791","display_name":"Diagonal","level":2,"score":0.4438527822494507},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4433678984642029},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.44220080971717834},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.41135793924331665},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.381827175617218},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.343963623046875},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3166457414627075},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.25125497579574585},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.19550514221191406},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.10738933086395264},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10710039734840393},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08320283889770508},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dsa56465.2022.00059","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsa56465.2022.00059","pdf_url":null,"source":{"id":"https://openalex.org/S4363608127","display_name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W3189065608","https://openalex.org/W896362041","https://openalex.org/W1561562093","https://openalex.org/W2384598124","https://openalex.org/W2553295645","https://openalex.org/W2608133077","https://openalex.org/W2782808810","https://openalex.org/W787044214","https://openalex.org/W2765960653","https://openalex.org/W3086216911"],"abstract_inverted_index":{"Security":[0,14],"requirements":[1,22],"should":[2],"be":[3],"realized":[4],"in":[5,31,102],"the":[6,32,41,50,58,68,87,91,103,116,129,162,166,174,177,198],"design":[7],"phase":[8],"of":[9,34,43,52,61,67,70,131,165,176,186],"a":[10,120,132,139,154],"secure":[11],"software":[12,35,62,92,117,216],"system.":[13],"patterns":[15,45,55,72,89,114],"are":[16],"artifacts":[17],"used":[18],"to":[19,24,40,56],"implement":[20],"security":[21,25,33,44,54,59,71,75,88,104,113,148,156,190],"as":[23,100],"controls":[26],"and":[27,81,90,97,111,209],"features.":[28],"The":[29,150,202],"strength":[30,60],"systems":[36],"is":[37,194],"directly":[38],"proportional":[39],"number":[42,51],"used.":[46],"We":[47,84],"can":[48],"use":[49],"existing":[53],"measure":[57],"systems.":[63],"Therefore,":[64],"early":[65],"detection":[66,106,151,192,207],"absence":[69],"or":[73],"non-standard":[74],"features":[76],"will":[77],"tremendously":[78],"reduce":[79],"development":[80],"maintenance":[82],"costs.":[83],"first":[85],"convert":[86],"system":[93,118,179],"model":[94],"into":[95],"graphs":[96],"store":[98],"them":[99],"matrices":[101],"pattern":[105,157,191],"process.":[107],"Then,":[108],"we":[109,124],"explore":[110],"detect":[112],"inside":[115],"using":[119,182],"matching":[121,143,172],"technique.":[122,135,201],"Finally,":[123],"remove":[125],"false":[126,220],"positives":[127],"with":[128,173,218],"help":[130],"semantic":[133],"analysis":[134],"This":[136],"paper":[137],"proposes":[138],"diagonally":[140],"distributed":[141],"matrix":[142,158,180],"(DDMM)":[144],"technique":[145,152],"for":[146,171,213],"detecting":[147],"patterns.":[149],"uses":[153],"standard":[155],"(SPM).":[159],"It":[160],"selects":[161],"main":[163],"diagonal":[164,187],"SPM.":[167],"Then":[168],"compares":[169],"it":[170],"diagonals":[175],"target":[178],"(TSM)":[181],"all":[183],"possible":[184],"combinations":[185],"elements.":[188],"A":[189],"tool":[193],"implemented":[195],"based":[196],"on":[197],"proposed":[199],"DDMM":[200],"experimental":[203],"results":[204],"show":[205],"sufficient":[206],"accuracy":[208],"reasonable":[210],"time":[211],"consumption":[212],"five":[214],"java-based":[215],"projects":[217],"zero":[219],"positives.":[221]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
