{"id":"https://openalex.org/W2942566426","doi":"https://doi.org/10.1145/3424155","title":"On Generating Network Traffic Datasets with Synthetic Attacks for Intrusion Detection","display_name":"On Generating Network Traffic Datasets with Synthetic Attacks for Intrusion Detection","publication_year":2021,"publication_date":"2021-01-02","ids":{"openalex":"https://openalex.org/W2942566426","doi":"https://doi.org/10.1145/3424155","mag":"2942566426"},"language":"en","primary_location":{"id":"doi:10.1145/3424155","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3424155","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3424155","source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3424155","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033953374","display_name":"Carlos Garc\u00eda Cordero","orcid":"https://orcid.org/0000-0002-7244-3519"},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Carlos Garcia Cordero","raw_affiliation_strings":["Technische Universit\u00e4t Darmstadt, Hessen, Germany"],"affiliations":[{"raw_affiliation_string":"Technische Universit\u00e4t Darmstadt, Hessen, Germany","institution_ids":["https://openalex.org/I31512782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083149653","display_name":"Emmanouil Vasilomanolakis","orcid":"https://orcid.org/0000-0001-5068-9158"},"institutions":[{"id":"https://openalex.org/I891191580","display_name":"Aalborg University","ror":"https://ror.org/04m5j1k67","country_code":"DK","type":"education","lineage":["https://openalex.org/I891191580"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Emmanouil Vasilomanolakis","raw_affiliation_strings":["Aalborg University, Copenhagen, Denmark","Aalborg University Copenhagen, Denmark"],"affiliations":[{"raw_affiliation_string":"Aalborg University, Copenhagen, Denmark","institution_ids":["https://openalex.org/I891191580"]},{"raw_affiliation_string":"Aalborg University Copenhagen, Denmark","institution_ids":["https://openalex.org/I891191580"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072945278","display_name":"Aidmar Wainakh","orcid":null},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Aidmar Wainakh","raw_affiliation_strings":["Technische Universit\u00e4t Darmstadt, Hessen, Germany"],"affiliations":[{"raw_affiliation_string":"Technische Universit\u00e4t Darmstadt, Hessen, Germany","institution_ids":["https://openalex.org/I31512782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021712397","display_name":"Max M\u00fchlh\u00e4user","orcid":"https://orcid.org/0000-0003-4713-5327"},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Max M\u00fchlh\u00e4user","raw_affiliation_strings":["Technische Universit\u00e4t Darmstadt, Hessen, Germany"],"affiliations":[{"raw_affiliation_string":"Technische Universit\u00e4t Darmstadt, Hessen, Germany","institution_ids":["https://openalex.org/I31512782"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068181564","display_name":"Simin Nadjm\u2010Tehrani","orcid":"https://orcid.org/0000-0002-1485-0802"},"institutions":[{"id":"https://openalex.org/I102134673","display_name":"Link\u00f6ping University","ror":"https://ror.org/05ynxx418","country_code":"SE","type":"education","lineage":["https://openalex.org/I102134673"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Simin Nadjm-Tehrani","raw_affiliation_strings":["Link\u00f6ping University, Sweden",", Link\u00f6ping University, Sweden"],"affiliations":[{"raw_affiliation_string":"Link\u00f6ping University, Sweden","institution_ids":["https://openalex.org/I102134673"]},{"raw_affiliation_string":", Link\u00f6ping University, Sweden","institution_ids":["https://openalex.org/I102134673"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5033953374"],"corresponding_institution_ids":["https://openalex.org/I31512782"],"apc_list":null,"apc_paid":null,"fwci":0.4803,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.64590806,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":"24","issue":"2","first_page":"1","last_page":"39"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.8421816825866699},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8142995238304138},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7285118103027344},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6058166027069092},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.5069615840911865},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4973330795764923},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.45968127250671387},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.450858473777771},{"id":"https://openalex.org/keywords/trace","display_name":"TRACE (psycholinguistics)","score":0.4310655891895294},{"id":"https://openalex.org/keywords/anomaly-based-intrusion-detection-system","display_name":"Anomaly-based intrusion detection system","score":0.414529412984848},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3396780788898468},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.0920705497264862},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.07208207249641418}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.8421816825866699},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8142995238304138},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7285118103027344},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6058166027069092},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.5069615840911865},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4973330795764923},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.45968127250671387},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.450858473777771},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.4310655891895294},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.414529412984848},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3396780788898468},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0920705497264862},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.07208207249641418},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1145/3424155","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3424155","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3424155","source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:1905.00304","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1905.00304","pdf_url":"https://arxiv.org/pdf/1905.00304","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:pure.atira.dk:publications/84d452ec-9996-4ddc-aebd-a554e68108a6","is_oa":true,"landing_page_url":"https://vbn.aau.dk/da/publications/84d452ec-9996-4ddc-aebd-a554e68108a6","pdf_url":"https://vbn.aau.dk/ws/files/517892511/Open_Access_Article.pdf","source":{"id":"https://openalex.org/S4306401731","display_name":"VBN Forskningsportal (Aalborg Universitet)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I891191580","host_organization_name":"Aalborg University","host_organization_lineage":["https://openalex.org/I891191580"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cordero, C G, Vasilomanolakis, E, Wainakh, A, M\u00fchlh\u00e4user, M & Nadjm-Tehrani, S 2021, 'On generating network traffic datasets with synthetic attacks for intrusion detection', ACM Transactions on Privacy and Security, vol. 24, no. 2, 8. https://doi.org/10.1145/3424155","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"mag:2942566426","is_oa":true,"landing_page_url":"http://export.arxiv.org/pdf/1905.00304","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"doi:10.48550/arxiv.1905.00304","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1905.00304","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.1145/3424155","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3424155","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3424155","source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1835803654","display_name":null,"funder_award_id":"National Research Center for Applied Cybersecurity ATHENE","funder_id":"https://openalex.org/F4320321114","funder_display_name":"Bundesministerium f\u00fcr Bildung und Forschung"},{"id":"https://openalex.org/G2401905507","display_name":null,"funder_award_id":"251805230","funder_id":"https://openalex.org/F4320320879","funder_display_name":"Deutsche Forschungsgemeinschaft"},{"id":"https://openalex.org/G4752833628","display_name":null,"funder_award_id":"ATHENE","funder_id":"https://openalex.org/F4320320879","funder_display_name":"Deutsche Forschungsgemeinschaft"},{"id":"https://openalex.org/G5106512922","display_name":null,"funder_award_id":"Deutsche Forschungsgemeinschaft (DFG","funder_id":"https://openalex.org/F4320320879","funder_display_name":"Deutsche Forschungsgemeinschaft"},{"id":"https://openalex.org/G5873599431","display_name":null,"funder_award_id":"251805230/GRK 2050","funder_id":"https://openalex.org/F4320320879","funder_display_name":"Deutsche Forschungsgemeinschaft"},{"id":"https://openalex.org/G8566578122","display_name":null,"funder_award_id":"ATHENE","funder_id":"https://openalex.org/F4320321114","funder_display_name":"Bundesministerium f\u00fcr Bildung und Forschung"}],"funders":[{"id":"https://openalex.org/F4320320879","display_name":"Deutsche Forschungsgemeinschaft","ror":"https://ror.org/018mejw64"},{"id":"https://openalex.org/F4320321114","display_name":"Bundesministerium f\u00fcr Bildung und Forschung","ror":"https://ror.org/04pz7b180"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2942566426.pdf","grobid_xml":"https://content.openalex.org/works/W2942566426.grobid-xml"},"referenced_works_count":35,"referenced_works":["https://openalex.org/W44307044","https://openalex.org/W158061484","https://openalex.org/W1516506771","https://openalex.org/W1526098320","https://openalex.org/W1591480890","https://openalex.org/W1738203895","https://openalex.org/W1772700132","https://openalex.org/W1981738628","https://openalex.org/W1988918299","https://openalex.org/W2031163547","https://openalex.org/W2040333627","https://openalex.org/W2077488147","https://openalex.org/W2099940443","https://openalex.org/W2110324540","https://openalex.org/W2114818286","https://openalex.org/W2127589913","https://openalex.org/W2162240407","https://openalex.org/W2183325936","https://openalex.org/W2288883909","https://openalex.org/W2292529361","https://openalex.org/W2295071300","https://openalex.org/W2296509296","https://openalex.org/W2326059556","https://openalex.org/W2341697730","https://openalex.org/W2401501243","https://openalex.org/W2474150305","https://openalex.org/W2561637844","https://openalex.org/W2601474892","https://openalex.org/W2607918523","https://openalex.org/W2888802852","https://openalex.org/W3138598418","https://openalex.org/W4213221859","https://openalex.org/W4214709352","https://openalex.org/W4235381699","https://openalex.org/W4243582384"],"related_works":["https://openalex.org/W3119524937","https://openalex.org/W3096927290","https://openalex.org/W2782255728","https://openalex.org/W3196382900","https://openalex.org/W3214395749","https://openalex.org/W3117827099","https://openalex.org/W3207020565","https://openalex.org/W1552354032","https://openalex.org/W3129336802","https://openalex.org/W3161394766","https://openalex.org/W3012327234","https://openalex.org/W2805665873","https://openalex.org/W2963769237","https://openalex.org/W1975415766","https://openalex.org/W2953448948","https://openalex.org/W2181398447","https://openalex.org/W2295071300","https://openalex.org/W3092093850","https://openalex.org/W3169613401","https://openalex.org/W2754794836"],"abstract_inverted_index":{"Most":[0],"research":[1],"in":[2,14,48,147,160,200,216],"the":[3,34,45,58,66,88,109,114,135,143,148,151,178,201,225,240],"field":[4],"of":[5,68,79,90,153,190,227,246],"network":[6],"intrusion":[7,131],"detection":[8,132],"heavily":[9],"relies":[10],"on":[11,130],"datasets.":[12,133,149,229],"Datasets":[13],"this":[15,52],"field,":[16],"however,":[17],"are":[18,207],"scarce":[19],"and":[20,27,57,158,173,235,248],"difficult":[21],"to":[22,64,74,141,162,170,220,239,242],"reproduce.":[23],"To":[24],"compare,":[25],"evaluate,":[26],"test":[28],"related":[29,49],"work,":[30,53],"researchers":[31],"usually":[32],"need":[33],"same":[35],"datasets":[36,40,70,92],"or":[37,181],"at":[38],"least":[39],"with":[41,71,108,224],"similar":[42],"characteristics":[43,73],"as":[44,177,193],"ones":[46],"used":[47,215],"work.":[50,164],"In":[51,134],"we":[54,125,137,210],"present":[55,126],"concepts":[56],"Intrusion":[59,82],"Detection":[60,83],"Dataset":[61,84],"Toolkit":[62,85],"(ID2T)":[63,86],"alleviate":[65],"problem":[67],"reproducing":[69],"desired":[72],"enable":[75,168],"an":[76],"accurate":[77],"replication":[78],"scientific":[80,222],"results.":[81],"facilitates":[87],"creation":[89],"labeled":[91],"by":[93,105,112],"injecting":[94],"synthetic":[95,102],"attacks":[96,103,206,247],"into":[97,204],"background":[98,110,115,202],"traffic.":[99],"The":[100,165],"injected":[101],"created":[104],"ID2T":[106,154,169,213,230],"blend":[107],"traffic":[111,203],"mimicking":[113],"traffic\u2019s":[116],"properties.":[117],"This":[118],"article":[119],"has":[120],"three":[121],"core":[122],"contributions.":[123],"First,":[124],"a":[127,139,182,188],"comprehensive":[128],"survey":[129],"survey,":[136],"propose":[138],"classification":[140],"group":[142],"negative":[144],"qualities":[145],"found":[146],"Second,":[150],"architecture":[152],"is":[155,214,231,236],"revised,":[156],"improved,":[157],"expanded":[159],"comparison":[161],"previous":[163],"architectural":[166],"changes":[167],"inject":[171],"recent":[172],"advanced":[174],"attacks,":[175],"such":[176],"EternalBlue":[179],"exploit":[180],"peer-to-peer":[183],"botnet.":[184],"ID2T\u2019s":[185],"functionality":[186],"provides":[187],"set":[189],"tests,":[191],"known":[192],"TIDED,":[194],"that":[195],"helps":[196],"identify":[197],"potential":[198],"defects":[199],"which":[205],"injected.":[208],"Third,":[209],"illustrate":[211],"how":[212],"different":[217],"use-case":[218],"scenarios":[219],"replicate":[221],"results":[223],"help":[226],"reproducible":[228],"open":[232],"source":[233],"software":[234],"made":[237],"available":[238],"community":[241],"expand":[243],"its":[244],"arsenal":[245],"capabilities.":[249]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-19T08:26:33.389920","created_date":"2021-01-18T00:00:00"}
