{"id":"https://openalex.org/W4416549566","doi":"https://doi.org/10.1145/3719027.3767661","title":"WATCH '25: First Workshop on Analytics, Telemetry, and Cybersecurity for HPCC","display_name":"WATCH '25: First Workshop on Analytics, Telemetry, and Cybersecurity for HPCC","publication_year":2025,"publication_date":"2025-11-19","ids":{"openalex":"https://openalex.org/W4416549566","doi":"https://doi.org/10.1145/3719027.3767661"},"language":null,"primary_location":{"id":"doi:10.1145/3719027.3767661","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3719027.3767661","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077589329","display_name":"Massimo Cafaro","orcid":"https://orcid.org/0000-0003-1118-7109"},"institutions":[{"id":"https://openalex.org/I142910587","display_name":"University of Salento","ror":"https://ror.org/03fc1k060","country_code":"IT","type":"education","lineage":["https://openalex.org/I142910587"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Massimo Cafaro","raw_affiliation_strings":["Universit\u00e0 del Salento, Lecce LE, Italy"],"affiliations":[{"raw_affiliation_string":"Universit\u00e0 del Salento, Lecce LE, Italy","institution_ids":["https://openalex.org/I142910587"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068148122","display_name":"Eric Chan\u2010Tin","orcid":"https://orcid.org/0000-0001-8367-5836"},"institutions":[{"id":"https://openalex.org/I1925986","display_name":"Loyola University Chicago","ror":"https://ror.org/04b6x2g63","country_code":"US","type":"education","lineage":["https://openalex.org/I1925986"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Eric Chan-Tin","raw_affiliation_strings":["Loyola University Chicago, Chicago, USA"],"affiliations":[{"raw_affiliation_string":"Loyola University Chicago, Chicago, USA","institution_ids":["https://openalex.org/I1925986"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005498754","display_name":"Jerry Chou","orcid":"https://orcid.org/0000-0001-7851-1140"},"institutions":[{"id":"https://openalex.org/I25846049","display_name":"National Tsing Hua University","ror":"https://ror.org/00zdnkx70","country_code":"TW","type":"education","lineage":["https://openalex.org/I25846049"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Jerry Chou","raw_affiliation_strings":["National Tsing Hua University, Hsinchu, Taiwan"],"affiliations":[{"raw_affiliation_string":"National Tsing Hua University, Hsinchu, Taiwan","institution_ids":["https://openalex.org/I25846049"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101877231","display_name":"Jinoh Kim","orcid":"https://orcid.org/0000-0002-9835-1866"},"institutions":[{"id":"https://openalex.org/I206651237","display_name":"Texas A&M University \u2013 Commerce","ror":"https://ror.org/01red3556","country_code":"US","type":"education","lineage":["https://openalex.org/I206651237"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jinoh Kim","raw_affiliation_strings":["East Texas A&amp;M University, Commerce, TX, USA"],"affiliations":[{"raw_affiliation_string":"East Texas A&amp;M University, Commerce, TX, USA","institution_ids":["https://openalex.org/I206651237"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5077589329"],"corresponding_institution_ids":["https://openalex.org/I142910587"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.43538565,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"4896","last_page":"4897"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.11810000240802765,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.11810000240802765,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.09149999916553497,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.04969999939203262,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/presentation","display_name":"Presentation (obstetrics)","score":0.5881999731063843},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.5453000068664551},{"id":"https://openalex.org/keywords/conjunction","display_name":"Conjunction (astronomy)","score":0.49129998683929443},{"id":"https://openalex.org/keywords/communications-security","display_name":"Communications security","score":0.3781000077724457},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.352400004863739},{"id":"https://openalex.org/keywords/panel-discussion","display_name":"Panel discussion","score":0.32739999890327454}],"concepts":[{"id":"https://openalex.org/C2777601897","wikidata":"https://www.wikidata.org/wiki/Q3409113","display_name":"Presentation (obstetrics)","level":2,"score":0.5881999731063843},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5541999936103821},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.5453000068664551},{"id":"https://openalex.org/C59656382","wikidata":"https://www.wikidata.org/wiki/Q191536","display_name":"Conjunction (astronomy)","level":2,"score":0.49129998683929443},{"id":"https://openalex.org/C151423352","wikidata":"https://www.wikidata.org/wiki/Q5154228","display_name":"Communications security","level":3,"score":0.3781000077724457},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3628000020980835},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3537999987602234},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.352400004863739},{"id":"https://openalex.org/C2781433648","wikidata":"https://www.wikidata.org/wiki/Q2100278","display_name":"Panel discussion","level":2,"score":0.32739999890327454},{"id":"https://openalex.org/C110354214","wikidata":"https://www.wikidata.org/wiki/Q6314146","display_name":"Engineering management","level":1,"score":0.322299987077713},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3077999949455261},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2849999964237213},{"id":"https://openalex.org/C121017731","wikidata":"https://www.wikidata.org/wiki/Q11661","display_name":"Information technology","level":2,"score":0.28459998965263367},{"id":"https://openalex.org/C528167355","wikidata":"https://www.wikidata.org/wiki/Q258307","display_name":"National security","level":2,"score":0.2824000120162964},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.26080000400543213},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2596000134944916}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3719027.3767661","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3719027.3767661","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0,66,156],"Workshop":[1],"on":[2,22,32,45,88],"Analytics,":[3],"Telemetry,":[4],"and":[5,10,16,34,48,53,62,81,94,108,141,144,150],"Cybersecurity":[6],"for":[7,78,96,101],"High-Performance":[8],"Computing":[9],"Communications":[11,35],"(HPCC)":[12],"is":[13,72],"newly":[14],"launched":[15],"takes":[17],"place":[18],"in":[19,26,50,86,91,112,135],"Taipei,":[20],"Taiwan,":[21],"October":[23],"17,":[24],"2025,":[25],"conjunction":[27],"with":[28],"the":[29,42,113,122,136,145],"ACM":[30],"Conference":[31],"Computer":[33,139],"Security":[36],"(CCS'25).":[37],"As":[38],"its":[39],"title":[40],"suggests,":[41],"workshop":[43,71,123,159],"centers":[44],"strengthening":[46],"resilience":[47],"security":[49],"HPCC":[51],"applications":[52],"infrastructures":[54],"by":[55,129],"leveraging":[56],"leading":[57],"technologies,":[58],"including":[59],"data-driven":[60],"methodologies":[61],"machine":[63],"intelligence":[64],"techniques.":[65],"primary":[67],"objective":[68],"of":[69,115,138,148],"this":[70],"to":[73,84],"provide":[74],"a":[75,125],"dedicated":[76],"platform":[77],"researchers,":[79],"practitioners,":[80],"industry":[82],"experts":[83],"engage":[85],"discussions":[87],"cutting-edge":[89],"topics":[90],"analytics,":[92],"telemetry,":[93],"cybersecurity":[95],"HPCC.":[97],"This":[98],"year's":[99],"call":[100],"contributions":[102],"welcomes":[103],"both":[104],"full":[105],"research":[106,118],"papers":[107],"work-in-progress":[109],"submissions,":[110],"resulting":[111],"acceptance":[114],"five":[116],"full-length":[117],"papers.":[119],"In":[120],"addition,":[121],"features":[124],"distinguished":[126],"keynote":[127],"presentation":[128],"Dr.":[130],"Hsu-Chun":[131],"Hsiao,":[132],"Associate":[133],"Professor":[134],"Department":[137],"Science":[140],"Information":[142],"Engineering":[143],"Graduate":[146],"Institute":[147],"Networking":[149],"Multimedia":[151],"at":[152],"National":[153],"Taiwan":[154],"University.":[155],"WATCH'25":[157],"complete":[158],"proceedings":[160],"can":[161],"be":[162],"found":[163],"at:":[164],"https://dl.acm.org/citation.cfm?id=3733826.":[165]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-23T00:00:00"}
