{"id":"https://openalex.org/W2009518882","doi":"https://doi.org/10.1145/2766498.2766503","title":"SHIELD","display_name":"SHIELD","publication_year":2015,"publication_date":"2015-06-22","ids":{"openalex":"https://openalex.org/W2009518882","doi":"https://doi.org/10.1145/2766498.2766503","mag":"2009518882"},"language":"en","primary_location":{"id":"doi:10.1145/2766498.2766503","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2766498.2766503","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th ACM Conference on Security &amp; Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025495106","display_name":"Stylianos Gisdakis","orcid":"https://orcid.org/0000-0003-2624-7522"},"institutions":[{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Stylianos Gisdakis","raw_affiliation_strings":["KTH Royal Institute of Technology, Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"KTH Royal Institute of Technology, Stockholm, Sweden","institution_ids":["https://openalex.org/I86987016"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070813911","display_name":"Thanassis Giannetsos","orcid":"https://orcid.org/0000-0003-0663-2263"},"institutions":[{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Thanassis Giannetsos","raw_affiliation_strings":["KTH Royal Institute of Technology, Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"KTH Royal Institute of Technology, Stockholm, Sweden","institution_ids":["https://openalex.org/I86987016"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030735377","display_name":"Panos Papadimitratos","orcid":"https://orcid.org/0000-0002-3267-5374"},"institutions":[{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Panos Papadimitratos","raw_affiliation_strings":["KTH Royal Institute of Technology, Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"KTH Royal Institute of Technology, Stockholm, Sweden","institution_ids":["https://openalex.org/I86987016"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5025495106"],"corresponding_institution_ids":["https://openalex.org/I86987016"],"apc_list":null,"apc_paid":null,"fwci":6.0306,"has_fulltext":false,"cited_by_count":42,"citation_normalized_percentile":{"value":0.9689814,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"12"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7882366180419922},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.6313332915306091},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6121459603309631},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6071014404296875},{"id":"https://openalex.org/keywords/forcing","display_name":"Forcing (mathematics)","score":0.5865358114242554},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.48309922218322754},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.47857192158699036},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4392159581184387},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.42453616857528687},{"id":"https://openalex.org/keywords/shield","display_name":"Shield","score":0.41150087118148804},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.35357466340065},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1126812994480133}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7882366180419922},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.6313332915306091},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6121459603309631},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6071014404296875},{"id":"https://openalex.org/C197115733","wikidata":"https://www.wikidata.org/wiki/Q1003136","display_name":"Forcing (mathematics)","level":2,"score":0.5865358114242554},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.48309922218322754},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.47857192158699036},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4392159581184387},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.42453616857528687},{"id":"https://openalex.org/C138081364","wikidata":"https://www.wikidata.org/wiki/Q852013","display_name":"Shield","level":2,"score":0.41150087118148804},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.35357466340065},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1126812994480133},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C49204034","wikidata":"https://www.wikidata.org/wiki/Q52139","display_name":"Climatology","level":1,"score":0.0},{"id":"https://openalex.org/C5900021","wikidata":"https://www.wikidata.org/wiki/Q163082","display_name":"Petrology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/2766498.2766503","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2766498.2766503","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th ACM Conference on Security &amp; Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},{"id":"pmh:oai:alma.44SUR_INST:11139292890002346","is_oa":false,"landing_page_url":"https://openresearch.surrey.ac.uk/esploro/outputs/conferencePresentation/SHIELD-A-Data-Verication-Framework-for/99514016202346","pdf_url":null,"source":{"id":"https://openalex.org/S4210197018","display_name":"View","issn_l":"2688-268X","issn":["2688-268X","2688-3988"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"","raw_type":"event"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6899999976158142,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":53,"referenced_works":["https://openalex.org/W38826608","https://openalex.org/W137249086","https://openalex.org/W1480376833","https://openalex.org/W1544003360","https://openalex.org/W1673310716","https://openalex.org/W1680392829","https://openalex.org/W1869778509","https://openalex.org/W1878337193","https://openalex.org/W1963651427","https://openalex.org/W1964375680","https://openalex.org/W1967647772","https://openalex.org/W1971752766","https://openalex.org/W1975534106","https://openalex.org/W1981643872","https://openalex.org/W1984205978","https://openalex.org/W1991119456","https://openalex.org/W1994123014","https://openalex.org/W1996573126","https://openalex.org/W2000189930","https://openalex.org/W2014480560","https://openalex.org/W2016380441","https://openalex.org/W2027685671","https://openalex.org/W2034161254","https://openalex.org/W2049031894","https://openalex.org/W2051688597","https://openalex.org/W2054198063","https://openalex.org/W2055141231","https://openalex.org/W2056591916","https://openalex.org/W2073406257","https://openalex.org/W2082512729","https://openalex.org/W2084217799","https://openalex.org/W2097994458","https://openalex.org/W2099419573","https://openalex.org/W2106129384","https://openalex.org/W2108177209","https://openalex.org/W2111626951","https://openalex.org/W2115506459","https://openalex.org/W2119146220","https://openalex.org/W2119939946","https://openalex.org/W2123876335","https://openalex.org/W2125011234","https://openalex.org/W2145002834","https://openalex.org/W2145997469","https://openalex.org/W2151940804","https://openalex.org/W2153608684","https://openalex.org/W2158957441","https://openalex.org/W2164146906","https://openalex.org/W2170918595","https://openalex.org/W2797148637","https://openalex.org/W2911964244","https://openalex.org/W3104777467","https://openalex.org/W4234681626","https://openalex.org/W4301347335"],"related_works":["https://openalex.org/W2555738791","https://openalex.org/W2123296434","https://openalex.org/W2104547074","https://openalex.org/W4298042445","https://openalex.org/W2586694115","https://openalex.org/W2132693790","https://openalex.org/W2017616439","https://openalex.org/W2367441718","https://openalex.org/W2017675414","https://openalex.org/W1593822213"],"abstract_inverted_index":{"The":[0],"openness":[1],"of":[2,100,155],"PS":[3,24,68,113],"systems":[4,114],"renders":[5],"them":[6],"vulnerable":[7],"to":[8,21,70],"malicious":[9],"users":[10],"that":[11,115,136],"can":[12,44,61,116,146],"pollute":[13],"the":[14,23,52,63,67,73,90,142,149,156,169],"measurement":[15],"collection":[16],"process,":[17],"in":[18],"an":[19],"attempt":[20],"degrade":[22],"system":[25,69],"data":[26,109,145],"and,":[27],"overall,":[28],"its":[29],"usefulness.":[30],"Mitigating":[31],"such":[32],"adversarial":[33],"behavior":[34],"is":[35,82],"hard.":[36],"Cryptographic":[37],"protection,":[38],"authentication,":[39],"authorization,":[40],"and":[41,96,130,133,165],"access":[42],"control":[43],"help":[45],"but":[46],"they":[47],"do":[48],"not":[49],"fully":[50],"address":[51],"problem.":[53],"Reports":[54],"from":[55,72],"faulty":[56,80],"insiders":[57],"(participants":[58],"with":[59,84],"credentials)":[60],"target":[62],"process":[64],"intelligently,":[65],"forcing":[66],"deviate":[71],"actual":[74],"sensed":[75,150],"phenomenon.":[76],"Filtering":[77],"out":[78],"those":[79,135],"reports":[81,157],"challenging,":[83],"practically":[85],"no":[86],"prior":[87],"knowledge":[88],"on":[89],"participants'":[91],"trustworthiness,":[92],"dynamically":[93],"changing":[94],"phenomena,":[95,151],"possibly":[97],"large":[98],"numbers":[99],"compromised":[101],"devices.":[102],"This":[103],"paper":[104],"proposes":[105],"SHIELD,":[106],"a":[107,140],"novel":[108],"verification":[110],"framework":[111],"for":[112],"complement":[117],"any":[118],"security":[119],"architecture.":[120],"SHIELD":[121],"handles":[122],"available,":[123],"contradicting":[124],"evidence,":[125],"classifies":[126],"efficiently":[127],"incoming":[128],"reports,":[129],"effectively":[131],"separates":[132],"rejects":[134],"are":[137,158],"faulty.":[138],"As":[139],"result,":[141],"deemed":[143],"correct":[144],"accurately":[147],"represent":[148],"even":[152],"when":[153],"45%":[154],"faulty,":[159],"intelligently":[160],"selected":[161],"by":[162],"coordinated":[163],"adversaries":[164],"targeted":[166],"optimally":[167],"across":[168],"system's":[170],"coverage":[171],"area.":[172]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":8},{"year":2016,"cited_by_count":8},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
