{"id":"https://openalex.org/W4231752918","doi":"https://doi.org/10.1145/3338511","title":"Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race","display_name":"Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race","publication_year":2019,"publication_date":"2019-11-08","ids":{"openalex":"https://openalex.org/W4231752918","doi":"https://doi.org/10.1145/3338511"},"language":"en","primary_location":{"id":"doi:10.1145/3338511","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3338511","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"},"type":"paratext","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":true,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9904000163078308,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9904000163078308,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9437000155448914,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9315000176429749,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/sword","display_name":"SWORD","score":0.6906540393829346},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5477780699729919},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5429986715316772},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.5202659368515015},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.4371384382247925},{"id":"https://openalex.org/keywords/security-through-obscurity","display_name":"Security through obscurity","score":0.42609700560569763},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.35777831077575684},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.35709691047668457},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.30564671754837036},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2337285876274109},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.10004687309265137}],"concepts":[{"id":"https://openalex.org/C2781424646","wikidata":"https://www.wikidata.org/wiki/Q7395200","display_name":"SWORD","level":2,"score":0.6906540393829346},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5477780699729919},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5429986715316772},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.5202659368515015},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.4371384382247925},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.42609700560569763},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.35777831077575684},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.35709691047668457},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.30564671754837036},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2337285876274109},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.10004687309265137},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3338511","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3338511","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.47999998927116394}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2311146855","https://openalex.org/W1974007298","https://openalex.org/W4362698699","https://openalex.org/W2890984938","https://openalex.org/W2049267814","https://openalex.org/W1984316831","https://openalex.org/W3211820146","https://openalex.org/W3207636679","https://openalex.org/W4226129955","https://openalex.org/W3217383677"],"abstract_inverted_index":{"It":[0],"is":[1,48,92],"our":[2,204],"great":[3],"pleasure":[4],"to":[5,8,30,38,95,99,107,208],"welcome":[6],"you":[7],"the":[9,20,40,49,59,81,135,147],"1st":[10],"Workshop":[11],"on":[12,65],"Cyber-Security":[13],"Arms":[14],"Race":[15],"(CYSARM).":[16],"This":[17,123],"year":[18],"marks":[19],"first":[21,50],"edition":[22],"of":[23,45,52,83,134,149,170,182,213,220],"this":[24],"workshop,":[25],"and":[26,36,43,55,76,86,119,130,143,154,172,191,215],"we":[27,177],"are":[28],"thrilled":[29],"start":[31],"fostering":[32,63],"collaboration":[33],"among":[34],"researchers":[35],"practitioners":[37],"discuss":[39],"various":[41],"facets":[42,129],"trade-offs":[44,75,102],"cyber-security.":[46],"CYSARM":[47],"workshop":[51,124],"its":[53],"kind,":[54],"thus":[56],"will":[57,125],"benefit":[58],"cyber-security":[60,136,148],"community":[61],"by":[62,203],"discussions":[64],"novel":[66],"(and":[67],"often":[68],"controversial)":[69],"topics":[70],"in":[71,138],"cyber-security,":[72,84],"such":[73,111],"as":[74,88,112,188,196],"double-edged":[77,131],"sword":[78,132],"techniques.":[79],"Beyond":[80],"study":[82],"privacy":[85],"trust":[87],"standalone":[89],"components,":[90],"it":[91,105],"also":[93],"important":[94],"look":[96],"at":[97],"how":[98,140],"balance":[100],"their":[101],"especially":[103],"when":[104],"comes":[106],"several":[108],"contradicting":[109],"requirements,":[110],"security":[113,116,120],"vs":[114,117,121],"privacy,":[115],"trust,":[118],"usability.":[122],"consider":[126],"all":[127],"complex":[128],"aspects":[133],"ecosystem,":[137],"particular,":[139],"new":[141],"technologies":[142],"algorithms":[144],"might":[145],"impact":[146],"existing":[150],"or":[151],"future":[152],"models":[153],"systems.":[155],"The":[156],"CYSARM'19":[157],"call":[158],"for":[159],"papers":[160,185],"attracted":[161],"submissions":[162],"from":[163,166],"13":[164],"countries,":[165],"a":[167,200,209],"wide":[168],"variety":[169],"academic":[171],"corporate":[173],"institutions.":[174],"In":[175],"total,":[176],"received":[178],"21":[179],"valid":[180],"submissions,":[181],"which":[183],"4":[184],"were":[186],"selected":[187],"Full":[189],"Papers":[190],"1":[192],"paper":[193],"was":[194],"accepted":[195],"Short":[197],"Paper":[198],"after":[199],"double-blind":[201],"review":[202],"program":[205],"committee,":[206],"leading":[207],"full":[210],"acceptance":[211,218],"rate":[212,219],"19%":[214],"an":[216],"overall":[217],"23.8%.":[221]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
