{"id":"https://openalex.org/W2027987700","doi":"https://doi.org/10.1145/2810103.2812627","title":"WISCS'15","display_name":"WISCS'15","publication_year":2015,"publication_date":"2015-10-06","ids":{"openalex":"https://openalex.org/W2027987700","doi":"https://doi.org/10.1145/2810103.2812627","mag":"2027987700"},"language":"en","primary_location":{"id":"doi:10.1145/2810103.2812627","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2810103.2812627","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089816676","display_name":"Tomas Sander","orcid":null},"institutions":[{"id":"https://openalex.org/I1324840837","display_name":"Hewlett-Packard (United States)","ror":"https://ror.org/059rn9488","country_code":"US","type":"company","lineage":["https://openalex.org/I1324840837"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Tomas Sander","raw_affiliation_strings":["HP Labs, Princeton, NJ, USA","HP Labs., Princeton, NJ, USA"],"affiliations":[{"raw_affiliation_string":"HP Labs, Princeton, NJ, USA","institution_ids":[]},{"raw_affiliation_string":"HP Labs., Princeton, NJ, USA","institution_ids":["https://openalex.org/I1324840837"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030243906","display_name":"Moti Yung","orcid":"https://orcid.org/0000-0003-0848-0873"},"institutions":[{"id":"https://openalex.org/I1291425158","display_name":"Google (United States)","ror":"https://ror.org/00njsd438","country_code":"US","type":"company","lineage":["https://openalex.org/I1291425158","https://openalex.org/I4210128969"]},{"id":"https://openalex.org/I78577930","display_name":"Columbia University","ror":"https://ror.org/00hj8s172","country_code":"US","type":"education","lineage":["https://openalex.org/I78577930"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Moti Yung","raw_affiliation_strings":["Google Inc. and Columbia University, New York, USA","Google Inc. and Columbia University, New York, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Google Inc. and Columbia University, New York, USA","institution_ids":["https://openalex.org/I1291425158","https://openalex.org/I78577930"]},{"raw_affiliation_string":"Google Inc. and Columbia University, New York, USA#TAB#","institution_ids":["https://openalex.org/I78577930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5089816676"],"corresponding_institution_ids":["https://openalex.org/I1324840837"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07660439,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1717","last_page":"1718"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6778966784477234},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.594274640083313},{"id":"https://openalex.org/keywords/information-sharing","display_name":"Information sharing","score":0.5854817032814026},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.5738465785980225},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.53028804063797},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4624185264110565},{"id":"https://openalex.org/keywords/security-community","display_name":"Security community","score":0.43326616287231445},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.42169392108917236},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.4102358818054199},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.38164326548576355},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.21354880928993225},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.10433268547058105}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6778966784477234},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.594274640083313},{"id":"https://openalex.org/C2776854237","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information sharing","level":2,"score":0.5854817032814026},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.5738465785980225},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.53028804063797},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4624185264110565},{"id":"https://openalex.org/C2778062554","wikidata":"https://www.wikidata.org/wiki/Q3404031","display_name":"Security community","level":2,"score":0.43326616287231445},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.42169392108917236},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.4102358818054199},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.38164326548576355},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.21354880928993225},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.10433268547058105},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2810103.2812627","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2810103.2812627","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.44999998807907104,"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W2044384431","https://openalex.org/W2514307643","https://openalex.org/W4230593636"],"related_works":["https://openalex.org/W1528506334","https://openalex.org/W2547209441","https://openalex.org/W1829795994","https://openalex.org/W2188404590","https://openalex.org/W3045225068","https://openalex.org/W1603564374","https://openalex.org/W4232886654","https://openalex.org/W2391845923","https://openalex.org/W2550197181","https://openalex.org/W2359419514"],"abstract_inverted_index":{"The":[0,27,48],"mission":[1],"of":[2,58,92,102,116],"the":[3,16,40,56],"2nd":[4],"ACM":[5],"Workshop":[6],"on":[7,65,107],"Information":[8],"Sharing":[9,91],"and":[10,22,44,62,68,83,94,113,129],"Collaborative":[11],"Security":[12],"is":[13,50],"to":[14,34,60,88,109,119,135],"advance":[15],"scientific":[17],"foundations":[18],"for":[19,29],"sharing":[20,32,52,79,126],"threat":[21,95],"security-related":[23],"data":[24,96,118],"among":[25],"organizations.":[26],"call":[28],"better":[30],"information":[31],"continues":[33],"be":[35,136],"an":[36],"important":[37,121],"theme":[38],"in":[39],"computer":[41],"security":[42,74,93,122],"community":[43],"with":[45],"policy":[46,131],"makers.":[47],"expectation":[49],"that":[51,76,133],"will":[53],"significantly":[54],"improve":[55],"ability":[57],"defenders":[59],"detect":[61],"mitigate":[63],"attacks":[64],"their":[66],"networks":[67],"systems.":[69],"Several":[70],"commercial":[71],"offerings":[72],"by":[73],"vendors":[75],"enable":[77],"automated":[78],"have":[80,86],"gone":[81],"live":[82],"existing":[84],"communities":[85],"begun":[87],"use":[89,115],"them.":[90],"at":[97],"scale":[98],"raises":[99,127],"a":[100],"number":[101],"interesting":[103],"research":[104],"questions,":[105],"including":[106],"how":[108],"best":[110],"collect,":[111],"analyze":[112],"make":[114],"these":[117],"address":[120],"concerns.":[123],"In":[124],"addition":[125],"privacy":[128],"other":[130],"issues":[132],"need":[134],"addressed.":[137]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
