{"id":"https://openalex.org/W2967547499","doi":"https://doi.org/10.1145/3339252.3341490","title":"Framework for Anticipatory Self-Protective 5G Environments","display_name":"Framework for Anticipatory Self-Protective 5G Environments","publication_year":2019,"publication_date":"2019-08-09","ids":{"openalex":"https://openalex.org/W2967547499","doi":"https://doi.org/10.1145/3339252.3341490","mag":"2967547499"},"language":"en","primary_location":{"id":"doi:10.1145/3339252.3341490","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3339252.3341490","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023887822","display_name":"Jorge Maestre Vidal","orcid":"https://orcid.org/0000-0002-4131-5100"},"institutions":[{"id":"https://openalex.org/I37446213","display_name":"Indra (Spain)","ror":"https://ror.org/00vpq6g39","country_code":"ES","type":"company","lineage":["https://openalex.org/I37446213"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Jorge Maestre Vidal","raw_affiliation_strings":["Indra, Digital Lab, Alcobendas, Madrid, Spain"],"affiliations":[{"raw_affiliation_string":"Indra, Digital Lab, Alcobendas, Madrid, Spain","institution_ids":["https://openalex.org/I37446213"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015993350","display_name":"Marco Antonio Sotelo Monge","orcid":"https://orcid.org/0000-0001-6392-0216"},"institutions":[{"id":"https://openalex.org/I121748325","display_name":"Universidad Complutense de Madrid","ror":"https://ror.org/02p0gd045","country_code":"ES","type":"education","lineage":["https://openalex.org/I121748325"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Marco Antonio Sotelo Monge","raw_affiliation_strings":["Complutense University of Madrid, Madrid, Spain"],"affiliations":[{"raw_affiliation_string":"Complutense University of Madrid, Madrid, Spain","institution_ids":["https://openalex.org/I121748325"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5023887822"],"corresponding_institution_ids":["https://openalex.org/I37446213"],"apc_list":null,"apc_paid":null,"fwci":2.7132,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.92064094,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anticipation","display_name":"Anticipation (artificial intelligence)","score":0.8423652052879333},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7309993505477905},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5858998894691467},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5196108222007751},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.4442240595817566},{"id":"https://openalex.org/keywords/action","display_name":"Action (physics)","score":0.43410003185272217},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.4285470247268677},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42101404070854187},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.38987791538238525},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.3225691318511963},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.19316893815994263},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.13887476921081543},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.13288158178329468},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.10490405559539795}],"concepts":[{"id":"https://openalex.org/C176777502","wikidata":"https://www.wikidata.org/wiki/Q4774623","display_name":"Anticipation (artificial intelligence)","level":2,"score":0.8423652052879333},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7309993505477905},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5858998894691467},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5196108222007751},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4442240595817566},{"id":"https://openalex.org/C2780791683","wikidata":"https://www.wikidata.org/wiki/Q846785","display_name":"Action (physics)","level":2,"score":0.43410003185272217},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.4285470247268677},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42101404070854187},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.38987791538238525},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.3225691318511963},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.19316893815994263},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.13887476921081543},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13288158178329468},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.10490405559539795},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3339252.3341490","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3339252.3341490","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5799999833106995,"id":"https://metadata.un.org/sdg/15","display_name":"Life in Land"}],"awards":[{"id":"https://openalex.org/G4988649235","display_name":null,"funder_award_id":"830892","funder_id":"https://openalex.org/F4320335254","funder_display_name":"Horizon 2020"}],"funders":[{"id":"https://openalex.org/F4320335254","display_name":"Horizon 2020","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W166348299","https://openalex.org/W260406427","https://openalex.org/W1100760050","https://openalex.org/W1965969360","https://openalex.org/W2017807084","https://openalex.org/W2038340293","https://openalex.org/W2048665112","https://openalex.org/W2050131929","https://openalex.org/W2092676845","https://openalex.org/W2103103282","https://openalex.org/W2104766360","https://openalex.org/W2108398378","https://openalex.org/W2169196271","https://openalex.org/W2490447569","https://openalex.org/W2490951954","https://openalex.org/W2509307846","https://openalex.org/W2592627133","https://openalex.org/W2603402463","https://openalex.org/W2773235317","https://openalex.org/W2795612977","https://openalex.org/W2802314367","https://openalex.org/W2885652007","https://openalex.org/W2963049813","https://openalex.org/W2963389592","https://openalex.org/W4295021613"],"related_works":["https://openalex.org/W1973439589","https://openalex.org/W3084321290","https://openalex.org/W4288754402","https://openalex.org/W3094117708","https://openalex.org/W3162671241","https://openalex.org/W3196650650","https://openalex.org/W2125815685","https://openalex.org/W4313404217","https://openalex.org/W2749188738","https://openalex.org/W4283702202"],"abstract_inverted_index":{"The":[0,145],"forthcoming":[1],"5G":[2,99,143],"operational":[3],"environment":[4],"entails":[5],"heterogeneous":[6],"and":[7,15,24,68,87,122,130],"multi-dimensional":[8],"ecosystems":[9],"where":[10],"cyber":[11,127],"assets,":[12],"digital":[13],"actors":[14],"cyber-physical":[16],"risks":[17],"coexist.":[18],"In":[19,47],"this":[20,89],"context,":[21],"the":[22,27,31,39,43,48,51,66,71,80,101,110,113,116,136,148,158],"prediction":[23,132],"anticipation":[25,114],"of":[26,38,42,50,70,74,103,112,118,147,160,162],"attacks":[28,165],"propagation":[29],"thorough":[30],"targeted":[32],"systems":[33],"promises":[34],"to":[35,84,108,135],"be":[36,77],"some":[37],"major":[40],"workhorses":[41],"emerging":[44],"self-protection":[45,97],"capabilities.":[46],"grounds":[49],"Self-Organizing":[52],"Network":[53],"(SON)":[54],"paradigm,":[55],"it":[56],"is":[57],"expected":[58],"that":[59],"by":[60,153],"taking":[61],"into":[62],"account":[63],"proactive":[64,96],"actuations,":[65],"decision":[67],"enforcement":[69],"best":[72],"courses":[73],"action":[75],"will":[76],"enhanced.":[78],"With":[79],"aim":[81],"on":[82,98,142,166],"contributing":[83],"their":[85],"planning":[86],"execution,":[88],"paper":[90],"introduces":[91],"a":[92,119,131,167],"novel":[93],"framework":[94,106],"for":[95,125,156],"environments,":[100],"description":[102],"an":[104],"architectural":[105],"able":[107],"sustain":[109],"rest":[111],"enablers,":[115],"formalization":[117],"knowledge":[120],"representation":[121],"reasoning":[123],"strategy":[124,133],"active":[126],"threat":[128],"mitigation,":[129],"adapted":[134],"difficulties":[137],"inherent":[138],"in":[139],"analyzing":[140],"events":[141],"scenarios.":[144],"effectiveness":[146],"proposal":[149],"has":[150],"been":[151],"demonstrated":[152],"proof-of-concept":[154],"instantiation":[155],"anticipating":[157],"impact":[159],"Denial":[161],"Service":[163],"(DoS)":[164],"real":[168],"communication":[169],"environment.":[170]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
