{"id":"https://openalex.org/W2059978479","doi":"https://doi.org/10.1145/1993083.1993085","title":"Characterizing Intelligence Gathering and Control on an Edge Network","display_name":"Characterizing Intelligence Gathering and Control on an Edge Network","publication_year":2011,"publication_date":"2011-07-01","ids":{"openalex":"https://openalex.org/W2059978479","doi":"https://doi.org/10.1145/1993083.1993085","mag":"2059978479"},"language":"en","primary_location":{"id":"doi:10.1145/1993083.1993085","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1993083.1993085","pdf_url":null,"source":{"id":"https://openalex.org/S97833917","display_name":"ACM Transactions on Internet Technology","issn_l":"1533-5399","issn":["1533-5399","1557-6051"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Internet Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5106082330","display_name":"Martin Arlitt","orcid":null},"institutions":[{"id":"https://openalex.org/I1324840837","display_name":"Hewlett-Packard (United States)","ror":"https://ror.org/059rn9488","country_code":"US","type":"company","lineage":["https://openalex.org/I1324840837"]},{"id":"https://openalex.org/I168635309","display_name":"University of Calgary","ror":"https://ror.org/03yjb2x39","country_code":"CA","type":"education","lineage":["https://openalex.org/I168635309"]}],"countries":["CA","US"],"is_corresponding":true,"raw_author_name":"Martin Arlitt","raw_affiliation_strings":["HP Labs, Palo Alto and University of Calgary"],"affiliations":[{"raw_affiliation_string":"HP Labs, Palo Alto and University of Calgary","institution_ids":["https://openalex.org/I1324840837","https://openalex.org/I168635309"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077044865","display_name":"Niklas Carlsson","orcid":"https://orcid.org/0000-0003-1367-1594"},"institutions":[{"id":"https://openalex.org/I102134673","display_name":"Link\u00f6ping University","ror":"https://ror.org/05ynxx418","country_code":"SE","type":"education","lineage":["https://openalex.org/I102134673"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Niklas Carlsson","raw_affiliation_strings":["Link\u00f6ping University"],"affiliations":[{"raw_affiliation_string":"Link\u00f6ping University","institution_ids":["https://openalex.org/I102134673"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071387474","display_name":"Phillipa Gill","orcid":"https://orcid.org/0000-0003-4286-3018"},"institutions":[{"id":"https://openalex.org/I185261750","display_name":"University of Toronto","ror":"https://ror.org/03dbr7087","country_code":"CA","type":"education","lineage":["https://openalex.org/I185261750"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Phillipa Gill","raw_affiliation_strings":["University of Toronto"],"affiliations":[{"raw_affiliation_string":"University of Toronto","institution_ids":["https://openalex.org/I185261750"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046437897","display_name":"Aniket Mahanti","orcid":"https://orcid.org/0000-0002-6545-3073"},"institutions":[{"id":"https://openalex.org/I168635309","display_name":"University of Calgary","ror":"https://ror.org/03yjb2x39","country_code":"CA","type":"education","lineage":["https://openalex.org/I168635309"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Aniket Mahanti","raw_affiliation_strings":["University of Calgary"],"affiliations":[{"raw_affiliation_string":"University of Calgary","institution_ids":["https://openalex.org/I168635309"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083779826","display_name":"Carey Williamson","orcid":"https://orcid.org/0000-0001-9922-7237"},"institutions":[{"id":"https://openalex.org/I168635309","display_name":"University of Calgary","ror":"https://ror.org/03yjb2x39","country_code":"CA","type":"education","lineage":["https://openalex.org/I168635309"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Carey Williamson","raw_affiliation_strings":["University of Calgary"],"affiliations":[{"raw_affiliation_string":"University of Calgary","institution_ids":["https://openalex.org/I168635309"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5106082330"],"corresponding_institution_ids":["https://openalex.org/I1324840837","https://openalex.org/I168635309"],"apc_list":null,"apc_paid":null,"fwci":1.4003,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.82271219,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"11","issue":"1","first_page":"1","last_page":"26"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spamming","display_name":"Spamming","score":0.823143720626831},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7543069124221802},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.6363716125488281},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.6024656891822815},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5072038173675537},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4995114803314209},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4913865625858307},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4218295216560364},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.3345225751399994},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.23245340585708618},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.21469175815582275},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1460859179496765},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.08805915713310242},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.08463510870933533}],"concepts":[{"id":"https://openalex.org/C158955206","wikidata":"https://www.wikidata.org/wiki/Q83058","display_name":"Spamming","level":3,"score":0.823143720626831},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7543069124221802},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.6363716125488281},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6024656891822815},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5072038173675537},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4995114803314209},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4913865625858307},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4218295216560364},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.3345225751399994},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.23245340585708618},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.21469175815582275},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1460859179496765},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.08805915713310242},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08463510870933533}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1993083.1993085","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1993083.1993085","pdf_url":null,"source":{"id":"https://openalex.org/S97833917","display_name":"ACM Transactions on Internet Technology","issn_l":"1533-5399","issn":["1533-5399","1557-6051"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Internet Technology","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W66771705","https://openalex.org/W164610907","https://openalex.org/W202500387","https://openalex.org/W1498585374","https://openalex.org/W1533194311","https://openalex.org/W1541210462","https://openalex.org/W1551705282","https://openalex.org/W1593657937","https://openalex.org/W1682505673","https://openalex.org/W1744212210","https://openalex.org/W1781758015","https://openalex.org/W1836378862","https://openalex.org/W1980793860","https://openalex.org/W2002537105","https://openalex.org/W2009250465","https://openalex.org/W2011112929","https://openalex.org/W2044384431","https://openalex.org/W2045414949","https://openalex.org/W2096030967","https://openalex.org/W2105014180","https://openalex.org/W2123539383","https://openalex.org/W2130430857","https://openalex.org/W2132429838","https://openalex.org/W2136420282","https://openalex.org/W2155300758","https://openalex.org/W2155409100","https://openalex.org/W2155620999","https://openalex.org/W2158060559","https://openalex.org/W2158673492","https://openalex.org/W2163034159","https://openalex.org/W2165184405","https://openalex.org/W2167777553","https://openalex.org/W2168523552","https://openalex.org/W2168938675","https://openalex.org/W2998394994","https://openalex.org/W4212768396","https://openalex.org/W4230593636","https://openalex.org/W4301489482","https://openalex.org/W6608239868"],"related_works":["https://openalex.org/W1987732684","https://openalex.org/W2286465138","https://openalex.org/W637393809","https://openalex.org/W2808742736","https://openalex.org/W1526983901","https://openalex.org/W3126526144","https://openalex.org/W3021299372","https://openalex.org/W2184211279","https://openalex.org/W2346278349","https://openalex.org/W3139094847"],"abstract_inverted_index":{"There":[0],"is":[1,13],"a":[2,67],"continuous":[3],"struggle":[4],"for":[5,39,64],"control":[6,35,53,115],"of":[7,36,54,88],"resources":[8,25],"at":[9],"every":[10],"organization":[11,20],"that":[12],"connected":[14],"to":[15,22,26,93],"the":[16,86,111],"Internet.":[17],"The":[18],"local":[19,120],"wishes":[21],"use":[23],"its":[24],"achieve":[27],"strategic":[28],"goals.":[29],"Some":[30],"external":[31,49,78,94,116],"entities":[32,50,117],"seek":[33,51],"direct":[34,112],"these":[37],"resources,":[38],"purposes":[40],"such":[41],"as":[42],"spamming":[43],"or":[44,92,102],"launching":[45],"denial-of-service":[46],"attacks.":[47],"Other":[48],"indirect":[52,114],"assets":[55],"(e.g.,":[56],"users,":[57],"finances),":[58],"but":[59],"provide":[60],"services":[61],"in":[62],"exchange":[63],"them.":[65],"Using":[66],"year-long":[68],"trace":[69],"from":[70],"an":[71],"edge":[72],"network,":[73],"we":[74],"examine":[75],"what":[76],"various":[77],"organizations":[79,95],"know":[80],"about":[81],"one":[82],"organization.":[83],"We":[84,108],"compare":[85],"types":[87],"information":[89],"exposed":[90],"by":[91],"using":[96],"either":[97],"active":[98],"(":[99,104],"reconnaissance":[100],")":[101,106],"passive":[103],"surveillance":[105],"techniques.":[107],"also":[109],"explore":[110],"and":[113],"have":[118],"on":[119],"IT":[121],"resources.":[122]},"counts_by_year":[{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
