{"id":"https://openalex.org/W4381389678","doi":"https://doi.org/10.1145/3587828.3587857","title":"Analysis of Digital Forensic Artifacts Data Enrichment Mechanism for Cyber Threat Intelligence","display_name":"Analysis of Digital Forensic Artifacts Data Enrichment Mechanism for Cyber Threat Intelligence","publication_year":2023,"publication_date":"2023-02-23","ids":{"openalex":"https://openalex.org/W4381389678","doi":"https://doi.org/10.1145/3587828.3587857"},"language":"en","primary_location":{"id":"doi:10.1145/3587828.3587857","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3587828.3587857","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 12th International Conference on Software and Computer Applications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100746039","display_name":"Hyung-Woo Lee","orcid":"https://orcid.org/0000-0002-7148-9187"},"institutions":[{"id":"https://openalex.org/I36738375","display_name":"Hanshin University","ror":"https://ror.org/039fgyk85","country_code":"KR","type":"education","lineage":["https://openalex.org/I36738375"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Hyung-Woo Lee","raw_affiliation_strings":["Div. of Com. Eng. Hanshin Univ., Rep. of Korea"],"raw_orcid":"https://orcid.org/0000-0002-7148-9187","affiliations":[{"raw_affiliation_string":"Div. of Com. Eng. Hanshin Univ., Rep. of Korea","institution_ids":["https://openalex.org/I36738375"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5100746039"],"corresponding_institution_ids":["https://openalex.org/I36738375"],"apc_list":null,"apc_paid":null,"fwci":0.8968,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.7848431,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"192","last_page":"199"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7679404020309448},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.6721564531326294},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6204013228416443},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.6078622937202454},{"id":"https://openalex.org/keywords/artifact","display_name":"Artifact (error)","score":0.5469338297843933},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.4924567639827728},{"id":"https://openalex.org/keywords/cyber-crime","display_name":"Cyber crime","score":0.4532349109649658},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.4333326816558838},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.12439003586769104},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.10742968320846558},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.08632639050483704}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7679404020309448},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.6721564531326294},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6204013228416443},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.6078622937202454},{"id":"https://openalex.org/C2779010991","wikidata":"https://www.wikidata.org/wiki/Q2720909","display_name":"Artifact (error)","level":2,"score":0.5469338297843933},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.4924567639827728},{"id":"https://openalex.org/C2989129637","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cyber crime","level":3,"score":0.4532349109649658},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.4333326816558838},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.12439003586769104},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.10742968320846558},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.08632639050483704},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3587828.3587857","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3587828.3587857","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 12th International Conference on Software and Computer Applications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6800000071525574,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2090666139","https://openalex.org/W2152049917","https://openalex.org/W2529303197","https://openalex.org/W2561675875","https://openalex.org/W2606177645","https://openalex.org/W2677312956","https://openalex.org/W2783245716","https://openalex.org/W2947635729","https://openalex.org/W2999472659","https://openalex.org/W3047150775","https://openalex.org/W3092545670"],"related_works":["https://openalex.org/W2883757844","https://openalex.org/W4242080468","https://openalex.org/W93745046","https://openalex.org/W4205463820","https://openalex.org/W2481291650","https://openalex.org/W2281316034","https://openalex.org/W4282582506","https://openalex.org/W2616862624","https://openalex.org/W4205125206","https://openalex.org/W2010965336"],"abstract_inverted_index":{"Cyber":[0],"attack":[1],"targeting":[2],"heterogeneous":[3,112],"devices":[4],"in":[5,20],"large-scale":[6],"network":[7],"environments":[8],"through":[9],"advanced":[10],"persistent":[11],"threat":[12,50,66],"(APT)":[13],"attacks":[14],"are":[15],"on":[16,82],"the":[17,24,27,42,60,71,83,95],"rise.":[18],"Therefore,":[19,55],"order":[21],"to":[22,35,48,93],"improve":[23,94],"effectiveness":[25,99],"of":[26],"cyber":[28,65,73,108],"incident":[29,74],"response":[30,75],"system,":[31],"it":[32,90],"is":[33,91],"necessary":[34],"apply":[36],"a":[37],"data":[38,47,61,103],"enrichment":[39,62,104],"mechanism":[40,63],"for":[41,64,106],"collected":[43,110],"digital":[44,85],"forensic":[45,86],"artifacts":[46],"reinforce":[49],"analysis":[51],"and":[52,58,98],"detection":[53,96],"performance.":[54],"we":[56],"designed":[57],"implemented":[59],"intelligent":[67],"system":[68],"by":[69],"analyzing":[70,107],"existing":[72],"framework":[76],"such":[77],"as":[78],"SIEM,":[79],"CTI":[80],"based":[81],"aggregated":[84],"artifacts.":[87],"Through":[88],"this,":[89],"expected":[92],"performance":[97],"when":[100],"using":[101],"artifact":[102],"process":[105],"incidents":[109],"from":[111],"devices.":[113]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
