{"id":"https://openalex.org/W2104012143","doi":"https://doi.org/10.1145/1631728.1631750","title":"Asset priority risk assessment using hidden markov models","display_name":"Asset priority risk assessment using hidden markov models","publication_year":2009,"publication_date":"2009-10-22","ids":{"openalex":"https://openalex.org/W2104012143","doi":"https://doi.org/10.1145/1631728.1631750","mag":"2104012143"},"language":"en","primary_location":{"id":"doi:10.1145/1631728.1631750","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1631728.1631750","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 10th ACM conference on SIG-information technology education","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113668156","display_name":"Charles Y.C. Pak","orcid":null},"institutions":[{"id":"https://openalex.org/I203088144","display_name":"Nova Southeastern University","ror":"https://ror.org/042bbge36","country_code":"US","type":"education","lineage":["https://openalex.org/I203088144"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Charles Pak","raw_affiliation_strings":["Nova Southeastern University, Fort Lauderdale, FL, USA","(Nova Southeastern University, Fort Lauderdale, FL, USA)"],"affiliations":[{"raw_affiliation_string":"Nova Southeastern University, Fort Lauderdale, FL, USA","institution_ids":["https://openalex.org/I203088144"]},{"raw_affiliation_string":"(Nova Southeastern University, Fort Lauderdale, FL, USA)","institution_ids":["https://openalex.org/I203088144"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110536657","display_name":"James Cannady","orcid":null},"institutions":[{"id":"https://openalex.org/I203088144","display_name":"Nova Southeastern University","ror":"https://ror.org/042bbge36","country_code":"US","type":"education","lineage":["https://openalex.org/I203088144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"James Cannady","raw_affiliation_strings":["Nova Southeastern University, Fort Lauderdale, FL, USA","(Nova Southeastern University, Fort Lauderdale, FL, USA)"],"affiliations":[{"raw_affiliation_string":"Nova Southeastern University, Fort Lauderdale, FL, USA","institution_ids":["https://openalex.org/I203088144"]},{"raw_affiliation_string":"(Nova Southeastern University, Fort Lauderdale, FL, USA)","institution_ids":["https://openalex.org/I203088144"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5113668156"],"corresponding_institution_ids":["https://openalex.org/I203088144"],"apc_list":null,"apc_paid":null,"fwci":7.0007,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.96875585,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"65","last_page":"73"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/asset","display_name":"Asset (computer security)","score":0.7499641180038452},{"id":"https://openalex.org/keywords/security-management","display_name":"Security management","score":0.7081327438354492},{"id":"https://openalex.org/keywords/insider","display_name":"Insider","score":0.5450366735458374},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5358461141586304},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.4979434013366699},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4736032485961914},{"id":"https://openalex.org/keywords/risk-assessment","display_name":"Risk assessment","score":0.44006550312042236},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.4245559871196747},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4183109700679779}],"concepts":[{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.7499641180038452},{"id":"https://openalex.org/C83163435","wikidata":"https://www.wikidata.org/wiki/Q3954104","display_name":"Security management","level":2,"score":0.7081327438354492},{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.5450366735458374},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5358461141586304},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4979434013366699},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4736032485961914},{"id":"https://openalex.org/C12174686","wikidata":"https://www.wikidata.org/wiki/Q1058438","display_name":"Risk assessment","level":2,"score":0.44006550312042236},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.4245559871196747},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4183109700679779},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/1631728.1631750","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1631728.1631750","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 10th ACM conference on SIG-information technology education","raw_type":"proceedings-article"},{"id":"pmh:oai:nsuworks.nova.edu:gscis_facarticles-1470","is_oa":false,"landing_page_url":"https://nsuworks.nova.edu/gscis_facarticles/453","pdf_url":null,"source":{"id":"https://openalex.org/S4377196410","display_name":"NSUWorks (Nova Southeastern University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I203088144","host_organization_name":"Nova Southeastern University","host_organization_lineage":["https://openalex.org/I203088144"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"CCE Faculty Articles","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W54793799","https://openalex.org/W224267870","https://openalex.org/W1525451939","https://openalex.org/W1531809166","https://openalex.org/W1856750239","https://openalex.org/W1968016862","https://openalex.org/W1986334900","https://openalex.org/W1995200034","https://openalex.org/W2018663138","https://openalex.org/W2021372153","https://openalex.org/W2024714588","https://openalex.org/W2039615995","https://openalex.org/W2044839138","https://openalex.org/W2045925548","https://openalex.org/W2063236501","https://openalex.org/W2071160338","https://openalex.org/W2082418604","https://openalex.org/W2096532249","https://openalex.org/W2102941975","https://openalex.org/W2113656103","https://openalex.org/W2116956106","https://openalex.org/W2124589355","https://openalex.org/W2127575210","https://openalex.org/W2130393353","https://openalex.org/W2132568362","https://openalex.org/W2134460122","https://openalex.org/W2135684364","https://openalex.org/W2145903950","https://openalex.org/W2146092999","https://openalex.org/W2158310185","https://openalex.org/W2160889556","https://openalex.org/W2166683449","https://openalex.org/W2167162942","https://openalex.org/W6671349254"],"related_works":["https://openalex.org/W2417158417","https://openalex.org/W2162350346","https://openalex.org/W3138050359","https://openalex.org/W2000498638","https://openalex.org/W2085558045","https://openalex.org/W4210784828","https://openalex.org/W2013166250","https://openalex.org/W2946634840","https://openalex.org/W3193040745","https://openalex.org/W2967550622"],"abstract_inverted_index":{"Conducting":[0],"risk":[1,106],"assessment":[2],"on":[3],"organizational":[4,35],"assets":[5,36,149],"can":[6,44,90],"be":[7],"time":[8],"consuming,":[9],"burdensome,":[10],"and":[11,62,154],"misleading":[12],"in":[13,38,141],"many":[14],"cases":[15],"because":[16],"of":[17,23,145],"the":[18,34,109,122],"dynamically":[19,147],"changing":[20,148],"security":[21,40,47,79,94,119,129],"states":[22,120],"assets.":[24,112],"Risk":[25],"assessments":[26],"may":[27,65],"present":[28],"inaccurate":[29],"or":[30,53,85],"false":[31],"data":[32],"if":[33],"change":[37,45],"their":[39],"postures.":[41],"Each":[42],"asset":[43,76],"its":[46,78,82,98],"status":[48],"from":[49,121,132],"secure,":[50],"mitigated,":[51,83],"vulnerable,":[52,84],"compromised":[54],"states.":[55],"The":[56],"secure":[57],"state":[58,80,95],"is":[59,70],"only":[60],"temporary":[61],"imaginary;":[63],"it":[64,69],"never":[66],"exist.":[67],"Therefore,":[68],"accurate":[71],"to":[72,97],"say":[73],"that":[74],"each":[75,92],"changes":[77],"within":[81],"compromised,":[86],"state.":[87],"If":[88],"we":[89,101,116,139],"predict":[91],"asset\u2019s":[93],"prior":[96],"actual":[99],"state,":[100],"would":[102],"have":[103],"a":[104,142],"good":[105],"indicator":[107],"for":[108],"organization\u2019s":[110],"mission-critical":[111],"In":[113],"this":[114],"paper,":[115],"explore":[117],"possible":[118],"insider\u2019s":[123],"perspective,":[124],"as":[125],"there":[126],"are":[127,140],"more":[128],"incidents":[130],"initiated":[131],"inside":[133],"than":[134],"outside":[135],"an":[136],"organization.":[137],"However,":[138],"continuous":[143],"loop":[144],"mitigating":[146],"caused":[150],"by":[151],"both":[152],"internal":[153],"external":[155],"threats.":[156]},"counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":5}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
