{"id":"https://openalex.org/W7128777559","doi":"https://doi.org/10.1145/3674213.3674216","title":"Systematic Mapping and Temporal Reasoning of IoT Cyber Risks using Structured Data","display_name":"Systematic Mapping and Temporal Reasoning of IoT Cyber Risks using Structured Data","publication_year":2024,"publication_date":"2024-08-09","ids":{"openalex":"https://openalex.org/W7128777559","doi":"https://doi.org/10.1145/3674213.3674216"},"language":null,"primary_location":{"id":"doi:10.1145/3674213.3674216","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3674213.3674216","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th Asian Internet Engineering Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5125995198","display_name":"Marta Zumaquero Gil","orcid":null},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Marta Zumaquero Gil","raw_affiliation_strings":["University of New South Wales, Australia"],"affiliations":[{"raw_affiliation_string":"University of New South Wales, Australia","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125951209","display_name":"Zhibo Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Zhibo Hu","raw_affiliation_strings":["University of New South Wales, Australia"],"affiliations":[{"raw_affiliation_string":"University of New South Wales, Australia","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082890991","display_name":"Minzhao Lyu","orcid":"https://orcid.org/0000-0001-8677-248X"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Minzhao Lyu","raw_affiliation_strings":["University of New South Wales, Australia"],"affiliations":[{"raw_affiliation_string":"University of New South Wales, Australia","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029634834","display_name":"Gustavo Batista","orcid":"https://orcid.org/0000-0002-3482-8442"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Gustavo Batista","raw_affiliation_strings":["University of New South Wales, Australia"],"affiliations":[{"raw_affiliation_string":"University of New South Wales, Australia","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5123506993","display_name":"Hassan Habibi Gharakheili","orcid":null},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Hassan Habibi Gharakheili","raw_affiliation_strings":["University of New South Wales, Australia"],"affiliations":[{"raw_affiliation_string":"University of New South Wales, Australia","institution_ids":["https://openalex.org/I31746571"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5125995198"],"corresponding_institution_ids":["https://openalex.org/I31746571"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.71181561,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"18","last_page":"25"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.2822999954223633,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.2822999954223633,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11864","display_name":"Supply Chain Resilience and Risk Management","score":0.06599999964237213,"subfield":{"id":"https://openalex.org/subfields/1408","display_name":"Strategy and Management"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T14347","display_name":"Big Data and Digital Economy","score":0.05649999901652336,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.635200023651123},{"id":"https://openalex.org/keywords/schema","display_name":"Schema (genetic algorithms)","score":0.5285999774932861},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4765999913215637},{"id":"https://openalex.org/keywords/product","display_name":"Product (mathematics)","score":0.3937000036239624},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.34619998931884766},{"id":"https://openalex.org/keywords/digital-data","display_name":"Digital data","score":0.3400000035762787},{"id":"https://openalex.org/keywords/risk-management","display_name":"Risk management","score":0.33889999985694885},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.30799999833106995}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7039999961853027},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.635200023651123},{"id":"https://openalex.org/C52146309","wikidata":"https://www.wikidata.org/wiki/Q7431116","display_name":"Schema (genetic algorithms)","level":2,"score":0.5285999774932861},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.5044999718666077},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4765999913215637},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4034000039100647},{"id":"https://openalex.org/C90673727","wikidata":"https://www.wikidata.org/wiki/Q901718","display_name":"Product (mathematics)","level":2,"score":0.3937000036239624},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3531000018119812},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.34619998931884766},{"id":"https://openalex.org/C2778864079","wikidata":"https://www.wikidata.org/wiki/Q173285","display_name":"Digital data","level":3,"score":0.3400000035762787},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.33889999985694885},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.30799999833106995},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.3061999976634979},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.3012999892234802},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.29989999532699585},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.2865000069141388},{"id":"https://openalex.org/C12174686","wikidata":"https://www.wikidata.org/wiki/Q1058438","display_name":"Risk assessment","level":2,"score":0.28360000252723694},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.27970001101493835},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.27549999952316284},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2653000056743622},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.2646999955177307},{"id":"https://openalex.org/C40077939","wikidata":"https://www.wikidata.org/wiki/Q2336004","display_name":"Semi-structured data","level":3,"score":0.26420000195503235},{"id":"https://openalex.org/C72634772","wikidata":"https://www.wikidata.org/wiki/Q386824","display_name":"Data integration","level":2,"score":0.26100000739097595}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3674213.3674216","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3674213.3674216","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th Asian Internet Engineering Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6560497879981995,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2250539671","https://openalex.org/W2766295581","https://openalex.org/W2891432086","https://openalex.org/W3135592327","https://openalex.org/W3167506177","https://openalex.org/W3183469243","https://openalex.org/W3191226037","https://openalex.org/W3209128423","https://openalex.org/W4200396171","https://openalex.org/W4221139921","https://openalex.org/W4298148514"],"related_works":[],"abstract_inverted_index":{"Deploying":[0],"Internet-of-Things":[1],"(IoT)":[2],"assets,":[3],"such":[4,23],"as":[5,24,144],"cameras,":[6],"printers,":[7],"and":[8,15,46,65,71,101,109,146,176,200],"building":[9],"sensors,":[10],"at":[11],"scale":[12],"introduces":[13],"operational":[14],"cyber":[16,37,89,122],"risks":[17,68,123],"to":[18,61,77,82,120,161],"organizations.":[19],"While":[20],"public":[21,94,163],"repositories":[22,95],"the":[25,59,110],"National":[26],"Vulnerability":[27],"Database":[28],"(NVD)":[29],"or":[30,132],"Exploit-DB":[31],"provide":[32],"valuable":[33],"data":[34,118,151,165,177],"on":[35],"known":[36],"risks,":[38],"each":[39],"comes":[40],"with":[41,125],"its":[42,154],"specific":[43,126],"query":[44],"format,":[45],"their":[47,107],"knowledge":[48],"is":[49],"often":[50,57],"fragmented,":[51],"lacking":[52],"a":[53,84,117,137,141,149,185],"comprehensive":[54],"perspective.":[55],"Organizations":[56],"require":[58],"capability":[60],"assess":[62],"current":[63],"vulnerabilities":[64],"forecast":[66],"future":[67],"from":[69],"distributed":[70],"nonunified":[72],"sources.":[73],"This":[74,104],"paper":[75],"aims":[76],"empower":[78],"digital":[79,97],"infrastructure":[80],"teams":[81],"obtain":[83,162],"complete":[85],"view":[86],"of":[87,153,166,189],"IoT":[88,170,192],"risks.":[90],"First,":[91],"we":[92,115,183],"map":[93],"for":[96,202],"product":[98,142],"vulnerabilities,":[99,198],"exploits,":[100],"patches":[102],"(solutions).":[103],"includes":[105],"highlighting":[106],"interrelationships":[108],"information":[111],"they":[112],"offer.":[113],"Second,":[114],"develop":[116],"schema":[119],"detail":[121],"associated":[124],"products,":[127],"like":[128],"equipment,":[129],"operating":[130],"systems,":[131],"applications.":[133],"We":[134,157],"build":[135],"\u201cvesData\",":[136],"tool":[138,160,175],"that":[139],"takes":[140],"name":[143],"input":[145],"automatically":[147],"produces":[148],"machine-processable":[150],"structure":[152],"risk":[155,164,193],"knowledge.":[156],"apply":[158],"our":[159,173,190],"about":[167],"20":[168],"consumer":[169],"products":[171],"in":[172],"lab\u2014our":[174],"will":[178],"be":[179],"released":[180],"openly.":[181],"Third,":[182],"demonstrate":[184],"preliminary":[186],"use":[187],"case":[188],"structured":[191],"data,":[194],"which":[195],"predicts":[196],"new":[197],"patches,":[199],"exploits":[201],"existing":[203],"ones.":[204]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2026-02-14T00:00:00"}
