{"id":"https://openalex.org/W2766804144","doi":"https://doi.org/10.1145/3133956.3138854","title":"DEMO","display_name":"DEMO","publication_year":2017,"publication_date":"2017-10-27","ids":{"openalex":"https://openalex.org/W2766804144","doi":"https://doi.org/10.1145/3133956.3138854","mag":"2766804144"},"language":"en","primary_location":{"id":"doi:10.1145/3133956.3138854","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3133956.3138854","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://www.osti.gov/biblio/1422376","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012619069","display_name":"Jared M. Smith","orcid":"https://orcid.org/0000-0002-3240-2405"},"institutions":[{"id":"https://openalex.org/I1289243028","display_name":"Oak Ridge National Laboratory","ror":"https://ror.org/01qz5mb56","country_code":"US","type":"facility","lineage":["https://openalex.org/I1289243028","https://openalex.org/I1330989302","https://openalex.org/I39565521","https://openalex.org/I4210159294"]},{"id":"https://openalex.org/I75027704","display_name":"University of Tennessee at Knoxville","ror":"https://ror.org/020f3ap87","country_code":"US","type":"education","lineage":["https://openalex.org/I75027704"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jared M. Smith","raw_affiliation_strings":["Oak Ridge National Laboratory &amp; University of Tennessee, Oak Ridge, TN, USA"],"affiliations":[{"raw_affiliation_string":"Oak Ridge National Laboratory &amp; University of Tennessee, Oak Ridge, TN, USA","institution_ids":["https://openalex.org/I1289243028","https://openalex.org/I75027704"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010334957","display_name":"Elliot Greenlee","orcid":null},"institutions":[{"id":"https://openalex.org/I1289243028","display_name":"Oak Ridge National Laboratory","ror":"https://ror.org/01qz5mb56","country_code":"US","type":"facility","lineage":["https://openalex.org/I1289243028","https://openalex.org/I1330989302","https://openalex.org/I39565521","https://openalex.org/I4210159294"]},{"id":"https://openalex.org/I75027704","display_name":"University of Tennessee at Knoxville","ror":"https://ror.org/020f3ap87","country_code":"US","type":"education","lineage":["https://openalex.org/I75027704"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Elliot Greenlee","raw_affiliation_strings":["Oak Ridge National Laboratory &amp; University of Tennessee, Oak Ridge, TN, USA"],"affiliations":[{"raw_affiliation_string":"Oak Ridge National Laboratory &amp; University of Tennessee, Oak Ridge, TN, USA","institution_ids":["https://openalex.org/I1289243028","https://openalex.org/I75027704"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005435987","display_name":"Aaron Ferber","orcid":null},"institutions":[{"id":"https://openalex.org/I1289243028","display_name":"Oak Ridge National Laboratory","ror":"https://ror.org/01qz5mb56","country_code":"US","type":"facility","lineage":["https://openalex.org/I1289243028","https://openalex.org/I1330989302","https://openalex.org/I39565521","https://openalex.org/I4210159294"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Aaron Ferber","raw_affiliation_strings":["Oak Ridge National Laboratory, Oak Ridge, TN, USA"],"affiliations":[{"raw_affiliation_string":"Oak Ridge National Laboratory, Oak Ridge, TN, USA","institution_ids":["https://openalex.org/I1289243028"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5012619069"],"corresponding_institution_ids":["https://openalex.org/I1289243028","https://openalex.org/I75027704"],"apc_list":null,"apc_paid":null,"fwci":0.4379,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.68723105,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"2463","last_page":"2465"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7610043287277222},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7278198003768921},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6314243078231812},{"id":"https://openalex.org/keywords/homeland-security","display_name":"Homeland security","score":0.5764143466949463},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4696694314479828},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.42264890670776367},{"id":"https://openalex.org/keywords/terrorism","display_name":"Terrorism","score":0.11569324135780334}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7610043287277222},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7278198003768921},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6314243078231812},{"id":"https://openalex.org/C506469952","wikidata":"https://www.wikidata.org/wiki/Q181467","display_name":"Homeland security","level":3,"score":0.5764143466949463},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4696694314479828},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.42264890670776367},{"id":"https://openalex.org/C203133693","wikidata":"https://www.wikidata.org/wiki/Q7283","display_name":"Terrorism","level":2,"score":0.11569324135780334},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3133956.3138854","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3133956.3138854","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:osti.gov:1422376","is_oa":true,"landing_page_url":"https://www.osti.gov/biblio/1422376","pdf_url":null,"source":{"id":"https://openalex.org/S4306402487","display_name":"OSTI OAI (U.S. Department of Energy Office of Scientific and Technical Information)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I139351228","host_organization_name":"Office of Scientific and Technical Information","host_organization_lineage":["https://openalex.org/I139351228"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":null}],"best_oa_location":{"id":"pmh:oai:osti.gov:1422376","is_oa":true,"landing_page_url":"https://www.osti.gov/biblio/1422376","pdf_url":null,"source":{"id":"https://openalex.org/S4306402487","display_name":"OSTI OAI (U.S. Department of Energy Office of Scientific and Technical Information)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I139351228","host_organization_name":"Office of Scientific and Technical Information","host_organization_lineage":["https://openalex.org/I139351228"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":null},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals","score":0.5699999928474426}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306110","display_name":"U.S. Department of Homeland Security","ror":"https://ror.org/00jyr0d86"},{"id":"https://openalex.org/F4320338287","display_name":"Oak Ridge National Laboratory","ror":"https://ror.org/01qz5mb56"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W1538372379","https://openalex.org/W1596717185","https://openalex.org/W2084734714","https://openalex.org/W2104210067","https://openalex.org/W2125055259","https://openalex.org/W2150796457"],"related_works":["https://openalex.org/W2029203054","https://openalex.org/W46718436","https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W3152891574","https://openalex.org/W987014419","https://openalex.org/W4284893819","https://openalex.org/W4366249425","https://openalex.org/W3036824589"],"abstract_inverted_index":{"Akatosh,":[0],"a":[1],"U.S.":[2],"Department":[3],"of":[4,29,43,70,102],"Homeland":[5],"Security":[6],"Transition":[7],"to":[8,66],"Practice":[9],"Program":[10],"(TTP)":[11],"project":[12],"developed":[13],"by":[14,38,53],"Oak":[15],"Ridge":[16],"National":[17],"Laboratory":[18],"with":[19,59,96],"industry":[20],"and":[21,33,73,78,88,94,105],"academic":[22],"partnership,":[23],"enables":[24],"automated,":[25],"real-time":[26],"forensic":[27,60],"analysis":[28],"endpoints":[30,47,80,110],"after":[31],"malware-attacks":[32],"other":[34,106],"cyber":[35],"security":[36,107],"incidents":[37,108],"automatically":[39],"maintaining":[40],"detailed":[41],"snapshots":[42],"host-level":[44],"activity":[45],"on":[46,99,109],"over":[48],"time.":[49,83],"It":[50],"achieves":[51],"this":[52],"integrating":[54],"intrusion":[55],"detection":[56],"systems":[57],"(IDS)":[58],"tools.":[61],"The":[62],"combination":[63],"allows":[64],"Akatosh":[65],"collect":[67],"vast":[68],"amounts":[69],"endpoint":[71],"data":[72],"assists":[74],"in":[75,81,111],"verifying,":[76],"tracking,":[77],"analyzing":[79],"real":[82],"This":[84],"provides":[85],"operations":[86],"personnel":[87],"analysts":[89],"as":[90,92],"well":[91],"managers":[93],"executives":[95],"continuous":[97],"feedback":[98],"the":[100],"impact":[101],"malicious":[103],"software":[104],"their":[112],"network.":[113]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2018,"cited_by_count":2}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2017-11-10T00:00:00"}
