{"id":"https://openalex.org/W1986394600","doi":"https://doi.org/10.1145/1298406.1298410","title":"Evaluation of a temporal-abstraction knowledge acquisition tool in the network security domain","display_name":"Evaluation of a temporal-abstraction knowledge acquisition tool in the network security domain","publication_year":2007,"publication_date":"2007-10-28","ids":{"openalex":"https://openalex.org/W1986394600","doi":"https://doi.org/10.1145/1298406.1298410","mag":"1986394600"},"language":"en","primary_location":{"id":"doi:10.1145/1298406.1298410","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1298406.1298410","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th international conference on Knowledge capture","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002391103","display_name":"Asaf Shabtai","orcid":"https://orcid.org/0000-0003-0630-4059"},"institutions":[{"id":"https://openalex.org/I124227911","display_name":"Ben-Gurion University of the Negev","ror":"https://ror.org/05tkyf982","country_code":"IL","type":"education","lineage":["https://openalex.org/I124227911"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"Asaf Shabtai","raw_affiliation_strings":["Duetsche Telekom Laboratories at Ben-Gurion University, Beer-Sheva, Israel","Duetsche Telekom Laboratories at Ben-Gurion University, Beer-Sheva, Israel#TAB#"],"affiliations":[{"raw_affiliation_string":"Duetsche Telekom Laboratories at Ben-Gurion University, Beer-Sheva, Israel","institution_ids":[]},{"raw_affiliation_string":"Duetsche Telekom Laboratories at Ben-Gurion University, Beer-Sheva, Israel#TAB#","institution_ids":["https://openalex.org/I124227911"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080102772","display_name":"Maor Atlas","orcid":null},"institutions":[{"id":"https://openalex.org/I124227911","display_name":"Ben-Gurion University of the Negev","ror":"https://ror.org/05tkyf982","country_code":"IL","type":"education","lineage":["https://openalex.org/I124227911"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Maor Atlas","raw_affiliation_strings":["Duetsche Telekom Laboratories at Ben-Gurion University, Beer-Sheva, Israel","Duetsche Telekom Laboratories at Ben-Gurion University, Beer-Sheva, Israel#TAB#"],"affiliations":[{"raw_affiliation_string":"Duetsche Telekom Laboratories at Ben-Gurion University, Beer-Sheva, Israel","institution_ids":[]},{"raw_affiliation_string":"Duetsche Telekom Laboratories at Ben-Gurion University, Beer-Sheva, Israel#TAB#","institution_ids":["https://openalex.org/I124227911"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073893701","display_name":"Yuval Sha\u1e25ar","orcid":"https://orcid.org/0000-0003-0328-2333"},"institutions":[{"id":"https://openalex.org/I124227911","display_name":"Ben-Gurion University of the Negev","ror":"https://ror.org/05tkyf982","country_code":"IL","type":"education","lineage":["https://openalex.org/I124227911"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Yuval Shahar","raw_affiliation_strings":["Duetsche Telekom Laboratories at Ben-Gurion University, Beer-Sheva, Israel","Duetsche Telekom Laboratories at Ben-Gurion University, Beer-Sheva, Israel#TAB#"],"affiliations":[{"raw_affiliation_string":"Duetsche Telekom Laboratories at Ben-Gurion University, Beer-Sheva, Israel","institution_ids":[]},{"raw_affiliation_string":"Duetsche Telekom Laboratories at Ben-Gurion University, Beer-Sheva, Israel#TAB#","institution_ids":["https://openalex.org/I124227911"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072913672","display_name":"Yuval Elovici","orcid":"https://orcid.org/0000-0002-9641-128X"},"institutions":[{"id":"https://openalex.org/I124227911","display_name":"Ben-Gurion University of the Negev","ror":"https://ror.org/05tkyf982","country_code":"IL","type":"education","lineage":["https://openalex.org/I124227911"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Yuval Elovici","raw_affiliation_strings":["Duetsche Telekom Laboratories at Ben-Gurion University, Beer-Sheva, Israel","Duetsche Telekom Laboratories at Ben-Gurion University, Beer-Sheva, Israel#TAB#"],"affiliations":[{"raw_affiliation_string":"Duetsche Telekom Laboratories at Ben-Gurion University, Beer-Sheva, Israel","institution_ids":[]},{"raw_affiliation_string":"Duetsche Telekom Laboratories at Ben-Gurion University, Beer-Sheva, Israel#TAB#","institution_ids":["https://openalex.org/I124227911"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5002391103"],"corresponding_institution_ids":["https://openalex.org/I124227911"],"apc_list":null,"apc_paid":null,"fwci":0.6417,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.7186713,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"7","last_page":"14"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11596","display_name":"Constraint Satisfaction and Optimization","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11596","display_name":"Constraint Satisfaction and Optimization","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10215","display_name":"Semantic Web and Ontologies","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11106","display_name":"Data Management and Algorithms","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8208320140838623},{"id":"https://openalex.org/keywords/abstraction","display_name":"Abstraction","score":0.7798586487770081},{"id":"https://openalex.org/keywords/domain-knowledge","display_name":"Domain knowledge","score":0.674964427947998},{"id":"https://openalex.org/keywords/knowledge-acquisition","display_name":"Knowledge acquisition","score":0.6180395483970642},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.5950422286987305},{"id":"https://openalex.org/keywords/knowledge-base","display_name":"Knowledge base","score":0.586502730846405},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5819997191429138},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5135579109191895},{"id":"https://openalex.org/keywords/knowledge-based-systems","display_name":"Knowledge-based systems","score":0.4742816090583801},{"id":"https://openalex.org/keywords/raw-data","display_name":"Raw data","score":0.41993623971939087},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.41869598627090454},{"id":"https://openalex.org/keywords/knowledge-extraction","display_name":"Knowledge extraction","score":0.41650527715682983},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.34889858961105347},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2915342450141907},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.2049824297428131}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8208320140838623},{"id":"https://openalex.org/C124304363","wikidata":"https://www.wikidata.org/wiki/Q673661","display_name":"Abstraction","level":2,"score":0.7798586487770081},{"id":"https://openalex.org/C207685749","wikidata":"https://www.wikidata.org/wiki/Q2088941","display_name":"Domain knowledge","level":2,"score":0.674964427947998},{"id":"https://openalex.org/C2777220311","wikidata":"https://www.wikidata.org/wiki/Q6423340","display_name":"Knowledge acquisition","level":2,"score":0.6180395483970642},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.5950422286987305},{"id":"https://openalex.org/C4554734","wikidata":"https://www.wikidata.org/wiki/Q593744","display_name":"Knowledge base","level":2,"score":0.586502730846405},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5819997191429138},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5135579109191895},{"id":"https://openalex.org/C115925183","wikidata":"https://www.wikidata.org/wiki/Q1412694","display_name":"Knowledge-based systems","level":2,"score":0.4742816090583801},{"id":"https://openalex.org/C132964779","wikidata":"https://www.wikidata.org/wiki/Q2110223","display_name":"Raw data","level":2,"score":0.41993623971939087},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.41869598627090454},{"id":"https://openalex.org/C120567893","wikidata":"https://www.wikidata.org/wiki/Q1582085","display_name":"Knowledge extraction","level":2,"score":0.41650527715682983},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.34889858961105347},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2915342450141907},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2049824297428131},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1298406.1298410","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1298406.1298410","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th international conference on Knowledge capture","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1556525027","https://openalex.org/W1606760774","https://openalex.org/W1796560052","https://openalex.org/W1967931674","https://openalex.org/W1999882400","https://openalex.org/W2004682523","https://openalex.org/W2005678616","https://openalex.org/W2016449808","https://openalex.org/W2037369246","https://openalex.org/W2085196316","https://openalex.org/W2122540544","https://openalex.org/W2133388215","https://openalex.org/W2169491648","https://openalex.org/W2541079428"],"related_works":["https://openalex.org/W2086580554","https://openalex.org/W1520100787","https://openalex.org/W2357854711","https://openalex.org/W2083849133","https://openalex.org/W2170990285","https://openalex.org/W32894952","https://openalex.org/W2904591968","https://openalex.org/W2125479495","https://openalex.org/W2592721119","https://openalex.org/W2019832437"],"abstract_inverted_index":{"In":[0],"this":[1],"paper":[2],"we":[3],"describe":[4],"the":[5,10,22,29,65,70,74],"design":[6],"and":[7,67],"evaluation":[8],"of":[9,28,43,69],"Temporal":[11,31,51],"Knowledge":[12],"Master,":[13],"a":[14,59],"graphical":[15],"knowledge-acquisition":[16],"(KA)":[17],"tool":[18,72],"used":[19],"for":[20],"entering":[21],"knowledge":[23],"re-quired":[24],"by":[25,57],"any":[26],"implementation":[27],"Knowledge-Based":[30],"Abstraction":[32],"(KBTA)":[33],"method.":[34],"The":[35,62],"KBTA":[36],"method":[37],"provides":[38],"mechanisms":[39],"that":[40],"perform":[41],"derivation":[42],"context-specific,":[44],"interval-based":[45],"abstract":[46],"interpretations":[47],"(also":[48],"known":[49],"as":[50],"Abstractions)":[52],"from":[53],"raw":[54],"time-stamped":[55],"data,":[56],"using":[58],"domain-specific":[60],"knowledge-base.":[61],"study":[63],"evalu-ated":[64],"functionality":[66],"usability":[68],"KA":[71],"in":[73],"computer-network":[75],"security":[76],"domain.":[77]},"counts_by_year":[{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
