{"id":"https://openalex.org/W4398186358","doi":"https://doi.org/10.1145/3605098.3636046","title":"Understanding the Process of Data Labeling in Cybersecurity","display_name":"Understanding the Process of Data Labeling in Cybersecurity","publication_year":2024,"publication_date":"2024-04-08","ids":{"openalex":"https://openalex.org/W4398186358","doi":"https://doi.org/10.1145/3605098.3636046"},"language":"en","primary_location":{"id":"doi:10.1145/3605098.3636046","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3605098.3636046","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103225991","display_name":"Tobias Braun","orcid":null},"institutions":[{"id":"https://openalex.org/I184656255","display_name":"University of Liechtenstein","ror":"https://ror.org/01qjrx392","country_code":"LI","type":"education","lineage":["https://openalex.org/I184656255"]}],"countries":["LI"],"is_corresponding":true,"raw_author_name":"Tobias Braun","raw_affiliation_strings":["School of Business Informatics, University of Liechtenstein, Vaduz, Liechtenstein"],"affiliations":[{"raw_affiliation_string":"School of Business Informatics, University of Liechtenstein, Vaduz, Liechtenstein","institution_ids":["https://openalex.org/I184656255"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029056103","display_name":"Irdin Pekaric","orcid":"https://orcid.org/0000-0002-0706-3202"},"institutions":[{"id":"https://openalex.org/I184656255","display_name":"University of Liechtenstein","ror":"https://ror.org/01qjrx392","country_code":"LI","type":"education","lineage":["https://openalex.org/I184656255"]}],"countries":["LI"],"is_corresponding":false,"raw_author_name":"Irdin Pekaric","raw_affiliation_strings":["School of Business Informatics, University of Liechtenstein, Vaduz, Liechtenstein"],"affiliations":[{"raw_affiliation_string":"School of Business Informatics, University of Liechtenstein, Vaduz, Liechtenstein","institution_ids":["https://openalex.org/I184656255"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084036967","display_name":"Giovanni Apruzzese","orcid":"https://orcid.org/0000-0002-6890-9611"},"institutions":[{"id":"https://openalex.org/I184656255","display_name":"University of Liechtenstein","ror":"https://ror.org/01qjrx392","country_code":"LI","type":"education","lineage":["https://openalex.org/I184656255"]}],"countries":["LI"],"is_corresponding":false,"raw_author_name":"Giovanni Apruzzese","raw_affiliation_strings":["School of Business Informatics, University of Liechtenstein, Vaduz, Liechtenstein"],"affiliations":[{"raw_affiliation_string":"School of Business Informatics, University of Liechtenstein, Vaduz, Liechtenstein","institution_ids":["https://openalex.org/I184656255"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5103225991"],"corresponding_institution_ids":["https://openalex.org/I184656255"],"apc_list":null,"apc_paid":null,"fwci":2.7886,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.90735489,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1596","last_page":"1605"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.6895182132720947},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6776548624038696},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6198203563690186},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12110969424247742}],"concepts":[{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.6895182132720947},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6776548624038696},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6198203563690186},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12110969424247742}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3605098.3636046","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3605098.3636046","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W1985987493","https://openalex.org/W2077488147","https://openalex.org/W2170689836","https://openalex.org/W2172234609","https://openalex.org/W2464629196","https://openalex.org/W2745040938","https://openalex.org/W2748696935","https://openalex.org/W2783334894","https://openalex.org/W2794609498","https://openalex.org/W2795678871","https://openalex.org/W2870670057","https://openalex.org/W2944545627","https://openalex.org/W3004908285","https://openalex.org/W3012056856","https://openalex.org/W3015308630","https://openalex.org/W3021740526","https://openalex.org/W3038955483","https://openalex.org/W3108807663","https://openalex.org/W3120695945","https://openalex.org/W3157331533","https://openalex.org/W3173151551","https://openalex.org/W3180062783","https://openalex.org/W3187829797","https://openalex.org/W3200455702","https://openalex.org/W4200614889","https://openalex.org/W4283366652","https://openalex.org/W4287636062","https://openalex.org/W4287883233","https://openalex.org/W4319301194","https://openalex.org/W4382318018","https://openalex.org/W4385412220","https://openalex.org/W4387427568","https://openalex.org/W4390190360","https://openalex.org/W4391904296"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W2382290278","https://openalex.org/W4395014643"],"abstract_inverted_index":{"Many":[0,52],"domains":[1],"now":[2],"leverage":[3],"the":[4,78,83,115],"benefits":[5],"of":[6,42,80,85],"Machine":[7],"Learning":[8],"(ML),":[9],"which":[10],"promises":[11],"solutions":[12,64],"that":[13,55,75],"can":[14],"autonomously":[15],"learn":[16],"to":[17,34,65,93],"solve":[18],"complex":[19],"tasks":[20],"by":[21,49],"training":[22],"over":[23],"some":[24,39],"data.":[25],"Unfortunately,":[26],"in":[27,59,105,114],"cyberthreat":[28,60],"detection,":[29,61],"high-quality":[30],"data":[31,45],"is":[32,57,90,97,103,112],"hard":[33],"come":[35],"by.":[36],"Moreover,":[37],"for":[38],"specific":[40],"applications":[41],"ML,":[43],"such":[44,67],"must":[46],"be":[47],"labeled":[48],"human":[50],"operators.":[51],"works":[53],"\"assume\"":[54],"labeling":[56,81,102],"tough/challenging/costly":[58],"thereby":[62],"proposing":[63],"address":[66],"a":[68,91],"hurdle.":[69],"Yet,":[70],"we":[71],"found":[72],"no":[73],"work":[74],"specifically":[76],"addresses":[77],"process":[79],"from":[82,109],"viewpoint":[84],"ML":[86],"security":[87],"practitioners.":[88],"This":[89],"problem:":[92],"this":[94],"date,":[95],"it":[96],"still":[98],"mostly":[99],"unknown":[100],"how":[101],"done":[104],"practice---thereby":[106],"preventing":[107],"one":[108],"pinpointing":[110],"\"what":[111],"needed\"":[113],"real":[116],"world.":[117]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-01T17:29:45.350535","created_date":"2025-10-10T00:00:00"}
