{"id":"https://openalex.org/W4400976809","doi":"https://doi.org/10.1145/3664476.3670880","title":"Trustworthy AI-based Cyber-Attack Detector for Network Cyber Crime Forensics","display_name":"Trustworthy AI-based Cyber-Attack Detector for Network Cyber Crime Forensics","publication_year":2024,"publication_date":"2024-07-25","ids":{"openalex":"https://openalex.org/W4400976809","doi":"https://doi.org/10.1145/3664476.3670880"},"language":"en","primary_location":{"id":"doi:10.1145/3664476.3670880","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3664476.3670880","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029009779","display_name":"Damian Puchalski","orcid":null},"institutions":[{"id":"https://openalex.org/I4210118437","display_name":"Instytut Technik Telekomunikacyjnych i Informatycznych (Poland)","ror":"https://ror.org/02r65gs06","country_code":"PL","type":"company","lineage":["https://openalex.org/I4210118437"]}],"countries":["PL"],"is_corresponding":true,"raw_author_name":"Damian Puchalski","raw_affiliation_strings":["ITTI Sp. z o.o., Poland"],"affiliations":[{"raw_affiliation_string":"ITTI Sp. z o.o., Poland","institution_ids":["https://openalex.org/I4210118437"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088536972","display_name":"Marek Pawlicki","orcid":"https://orcid.org/0000-0001-5881-6406"},"institutions":[{"id":"https://openalex.org/I1300393620","display_name":"Bydgoszcz University of Science and Technology","ror":"https://ror.org/049eq0c58","country_code":"PL","type":"education","lineage":["https://openalex.org/I1300393620"]},{"id":"https://openalex.org/I686019","display_name":"AGH University of Krakow","ror":"https://ror.org/00bas1c41","country_code":"PL","type":"education","lineage":["https://openalex.org/I686019"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Marek Pawlicki","raw_affiliation_strings":["Bydgoszcz University of Science and Technology, Poland and ITTI Sp. z o.o., Poland"],"affiliations":[{"raw_affiliation_string":"Bydgoszcz University of Science and Technology, Poland and ITTI Sp. z o.o., Poland","institution_ids":["https://openalex.org/I1300393620","https://openalex.org/I686019"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042632349","display_name":"Rafa\u0142 Kozik","orcid":"https://orcid.org/0000-0001-7122-3306"},"institutions":[{"id":"https://openalex.org/I1300393620","display_name":"Bydgoszcz University of Science and Technology","ror":"https://ror.org/049eq0c58","country_code":"PL","type":"education","lineage":["https://openalex.org/I1300393620"]},{"id":"https://openalex.org/I686019","display_name":"AGH University of Krakow","ror":"https://ror.org/00bas1c41","country_code":"PL","type":"education","lineage":["https://openalex.org/I686019"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Rafa\u0142 Kozik","raw_affiliation_strings":["Bydgoszcz University of Science and Technology, Poland and ITTI Sp. z o.o., Poland"],"affiliations":[{"raw_affiliation_string":"Bydgoszcz University of Science and Technology, Poland and ITTI Sp. z o.o., Poland","institution_ids":["https://openalex.org/I1300393620","https://openalex.org/I686019"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035207896","display_name":"Rafa\u0142 Renk","orcid":"https://orcid.org/0000-0001-8518-4440"},"institutions":[{"id":"https://openalex.org/I4210118437","display_name":"Instytut Technik Telekomunikacyjnych i Informatycznych (Poland)","ror":"https://ror.org/02r65gs06","country_code":"PL","type":"company","lineage":["https://openalex.org/I4210118437"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Rafa\u0142 Renk","raw_affiliation_strings":["ITTI Sp. z o.o., Poland"],"affiliations":[{"raw_affiliation_string":"ITTI Sp. z o.o., Poland","institution_ids":["https://openalex.org/I4210118437"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009283476","display_name":"Micha\u0142 Chora\u015b","orcid":"https://orcid.org/0000-0003-1405-9911"},"institutions":[{"id":"https://openalex.org/I1300393620","display_name":"Bydgoszcz University of Science and Technology","ror":"https://ror.org/049eq0c58","country_code":"PL","type":"education","lineage":["https://openalex.org/I1300393620"]},{"id":"https://openalex.org/I686019","display_name":"AGH University of Krakow","ror":"https://ror.org/00bas1c41","country_code":"PL","type":"education","lineage":["https://openalex.org/I686019"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Micha\u0142 Chora\u015b","raw_affiliation_strings":["Bydgoszcz University of Science and Technology, Poland and ITTI Sp. z o.o., Poland"],"affiliations":[{"raw_affiliation_string":"Bydgoszcz University of Science and Technology, Poland and ITTI Sp. z o.o., Poland","institution_ids":["https://openalex.org/I1300393620","https://openalex.org/I686019"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5029009779"],"corresponding_institution_ids":["https://openalex.org/I4210118437"],"apc_list":null,"apc_paid":null,"fwci":0.7654,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.76840982,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.7188600897789001},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6899467706680298},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6676566004753113},{"id":"https://openalex.org/keywords/network-forensics","display_name":"Network forensics","score":0.6136250495910645},{"id":"https://openalex.org/keywords/cyber-crime","display_name":"Cyber crime","score":0.4813845455646515},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.33880311250686646},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.19408035278320312},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.17848879098892212},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.14518219232559204}],"concepts":[{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.7188600897789001},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6899467706680298},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6676566004753113},{"id":"https://openalex.org/C50747538","wikidata":"https://www.wikidata.org/wiki/Q7001032","display_name":"Network forensics","level":3,"score":0.6136250495910645},{"id":"https://openalex.org/C2989129637","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cyber crime","level":3,"score":0.4813845455646515},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.33880311250686646},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.19408035278320312},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.17848879098892212},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.14518219232559204}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3664476.3670880","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3664476.3670880","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.49000000953674316,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G299694355","display_name":null,"funder_award_id":"101021797","funder_id":"https://openalex.org/F4320323817","funder_display_name":"Universitas Brawijaya"}],"funders":[{"id":"https://openalex.org/F4320323817","display_name":"Universitas Brawijaya","ror":"https://ror.org/01wk3d929"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2530314904","https://openalex.org/W3008603700","https://openalex.org/W3046647252","https://openalex.org/W3080759852","https://openalex.org/W3112718981","https://openalex.org/W3161898103","https://openalex.org/W3170475680","https://openalex.org/W3188250489","https://openalex.org/W3190805652","https://openalex.org/W4281287860","https://openalex.org/W4312273550"],"related_works":["https://openalex.org/W2076536433","https://openalex.org/W90316445","https://openalex.org/W2547321903","https://openalex.org/W2530496201","https://openalex.org/W2095767446","https://openalex.org/W1982246970","https://openalex.org/W3161846523","https://openalex.org/W2950101076","https://openalex.org/W2924625394","https://openalex.org/W3044847539"],"abstract_inverted_index":{"In":[0,131],"recent":[1],"years,":[2],"the":[3,12,49,80,85,118,136,144,149,161,176,183,204],"increasing":[4],"sophistication":[5],"and":[6,34,37,41,62,113,124,151,165,187],"proliferation":[7],"of":[8,115,128,153,169,185,206],"cyberthreats":[9,30],"have":[10],"underscored":[11],"necessity":[13],"for":[14,51,148,159,166,182,203],"robust":[15],"network":[16,63,119,162,171,195],"security":[17],"measures,":[18],"as":[19,21,93,110],"well":[20],"a":[22,94],"comprehensive":[23],"approach":[24],"to":[25,79,100,194],"cyberprotection":[26],"at":[27],"large.":[28],"As":[29],"are":[31],"continuously":[32],"more":[33,35],"complex,":[36],"their":[38],"detection,":[39],"response":[40],"mitigation":[42],"often":[43,74],"involve":[44],"dealing":[45],"with":[46,121,212],"big":[47,105],"data,":[48,106],"need":[50],"novel":[52],"solutions":[53],"is":[54],"present":[55,135],"also":[56,199],"in":[57,77,104,117,163],"cyber-criminal":[58],"law":[59],"enforcement":[60],"(LEA)":[61],"forensics":[64],"contexts.":[65],"Traditional,":[66],"anomaly-based":[67],"or":[68],"signature-based":[69],"intrusion":[70,111],"detection":[71,112,150],"systems":[72],"(IDS)":[73],"face":[75],"challenges":[76],"adapting":[78],"evolving":[81],"cyberattack":[82],"landscape.":[83],"On":[84],"other":[86,213],"hand,":[87],"Machine":[88],"Learning":[89],"(ML)":[90],"has":[91],"emerged":[92],"promising":[95],"approach,":[96],"proving":[97],"its":[98],"ability":[99],"detect":[101],"complex":[102],"patterns":[103],"including":[107],"applications":[108],"such":[109],"classification":[114,152],"threats":[116],"environment,":[120],"high":[122],"accuracy":[123],"precision":[125],"(reduced":[126],"rate":[127],"false":[129],"positives).":[130],"this":[132],"paper":[133],"we":[134],"Trustworthy":[137],"Cyberattack":[138],"Detector":[139],"tool":[140],"(TCAD),":[141],"benefiting":[142],"from":[143],"machine":[145],"learning":[146],"algorithms":[147],"cyberattacks.":[154],"TCAD":[155,177],"can":[156,178,200],"be":[157,179,201],"used":[158],"monitoring":[160],"real-time":[164],"offline":[167],"analysis":[168],"collected":[170,214],"data.":[172],"We":[173],"believe":[174],"that":[175],"successfully":[180],"applied":[181],"task":[184],"detecting":[186],"classifying":[188],"evidence":[189],"during":[190],"criminal":[191],"investigations":[192],"related":[193],"cyber":[196],"attacks,":[197],"but":[198],"helpful":[202],"correlation":[205],"discovered":[207],"network-based":[208],"events":[209],"over":[210],"time":[211],"non-network":[215],"evidence.":[216]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2024-07-26T00:00:00"}
