{"id":"https://openalex.org/W2948361386","doi":"https://doi.org/10.1155/2019/3261453","title":"Advances in Complex Systems and Their Applications to Cybersecurity","display_name":"Advances in Complex Systems and Their Applications to Cybersecurity","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2948361386","doi":"https://doi.org/10.1155/2019/3261453","mag":"2948361386"},"language":"en","primary_location":{"id":"doi:10.1155/2019/3261453","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/3261453","pdf_url":"http://downloads.hindawi.com/journals/complexity/2019/3261453.pdf","source":{"id":"https://openalex.org/S207319443","display_name":"Complexity","issn_l":"1076-2787","issn":["1076-2787","1099-0526"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Complexity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"http://downloads.hindawi.com/journals/complexity/2019/3261453.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101606365","display_name":"Fernando S\u00e1nchez Lasheras","orcid":"https://orcid.org/0000-0002-7052-2811"},"institutions":[{"id":"https://openalex.org/I165339363","display_name":"Universidad de Oviedo","ror":"https://ror.org/006gksa02","country_code":"ES","type":"education","lineage":["https://openalex.org/I165339363"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Fernando S\u00e1nchez Lasheras","raw_affiliation_strings":["Mathematics Department, University of Oviedo, c/Federico Garca Lorca 18, 33007 Oviedo, Spain","Mathematics Department, University of Oviedo, c/Federico Garc\u00eda Lorca 18, 33007 Oviedo, Spain"],"affiliations":[{"raw_affiliation_string":"Mathematics Department, University of Oviedo, c/Federico Garca Lorca 18, 33007 Oviedo, Spain","institution_ids":["https://openalex.org/I165339363"]},{"raw_affiliation_string":"Mathematics Department, University of Oviedo, c/Federico Garc\u00eda Lorca 18, 33007 Oviedo, Spain","institution_ids":["https://openalex.org/I165339363"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019647783","display_name":"Danilo Comminiello","orcid":"https://orcid.org/0000-0003-4067-4504"},"institutions":[{"id":"https://openalex.org/I861853513","display_name":"Sapienza University of Rome","ror":"https://ror.org/02be6w209","country_code":"IT","type":"education","lineage":["https://openalex.org/I861853513"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Danilo Comminiello","raw_affiliation_strings":["Department of Information Engineering, Electronics and Telecommunications (DIET), Sapienza University of Rome, Via Eudossiana 18, 00184 Rome, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering, Electronics and Telecommunications (DIET), Sapienza University of Rome, Via Eudossiana 18, 00184 Rome, Italy","institution_ids":["https://openalex.org/I861853513"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048605535","display_name":"Alicja Krzemie\u0144","orcid":"https://orcid.org/0000-0002-6279-3275"},"institutions":[{"id":"https://openalex.org/I3020398883","display_name":"Central Mining Institute","ror":"https://ror.org/0367ap631","country_code":"PL","type":"facility","lineage":["https://openalex.org/I3020398883"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Alicja Krzemie\u0144","raw_affiliation_strings":["Department of Risk Assessment and Industrial Safety, Central Mining Institute, Plac Gwarkw 1, 40166 Katowice, Poland","Department of Risk Assessment and Industrial Safety, Central Mining Institute, Plac Gwark\u00f3w 1, 40166 Katowice, Poland"],"affiliations":[{"raw_affiliation_string":"Department of Risk Assessment and Industrial Safety, Central Mining Institute, Plac Gwarkw 1, 40166 Katowice, Poland","institution_ids":["https://openalex.org/I3020398883"]},{"raw_affiliation_string":"Department of Risk Assessment and Industrial Safety, Central Mining Institute, Plac Gwark\u00f3w 1, 40166 Katowice, Poland","institution_ids":["https://openalex.org/I3020398883"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101606365"],"corresponding_institution_ids":["https://openalex.org/I165339363"],"apc_list":{"value":2300,"currency":"USD","value_usd":2300},"apc_paid":{"value":2300,"currency":"USD","value_usd":2300},"fwci":0.3537,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.61787581,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"2019","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.7166000008583069,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.7166000008583069,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.710099995136261,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.6453999876976013,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6583936810493469},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5647875666618347}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6583936810493469},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5647875666618347}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1155/2019/3261453","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/3261453","pdf_url":"http://downloads.hindawi.com/journals/complexity/2019/3261453.pdf","source":{"id":"https://openalex.org/S207319443","display_name":"Complexity","issn_l":"1076-2787","issn":["1076-2787","1099-0526"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Complexity","raw_type":"journal-article"},{"id":"pmh:oai:iris.uniroma1.it:11573/1393229","is_oa":true,"landing_page_url":"http://hdl.handle.net/11573/1393229","pdf_url":"http://hdl.handle.net/11573/1393229","source":{"id":"https://openalex.org/S4377196107","display_name":"IRIS Research product catalog (Sapienza University of Rome)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/article"},{"id":"pmh:oai:doaj.org/article:74cc817b4efd4b948d7f996ef72f8900","is_oa":true,"landing_page_url":"https://doaj.org/article/74cc817b4efd4b948d7f996ef72f8900","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Complexity, Vol 2019 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2019/3261453","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/3261453","pdf_url":"http://downloads.hindawi.com/journals/complexity/2019/3261453.pdf","source":{"id":"https://openalex.org/S207319443","display_name":"Complexity","issn_l":"1076-2787","issn":["1076-2787","1099-0526"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Complexity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2948361386.pdf","grobid_xml":"https://content.openalex.org/works/W2948361386.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W4402327032"],"abstract_inverted_index":{"Cybersecurity":[0],"is":[1,12,68],"one":[2,17],"of":[3,18,38,46,59,64,72,81,98],"the":[4,19,36,44,60,69,79,95],"fastest":[5],"growing":[6],"and":[7,11,55,66,75,105],"largest":[8],"technology":[9],"sectors":[10],"increasingly":[13],"being":[14],"recognized":[15],"as":[16],"major":[20],"issues":[21,63],"in":[22,32,100],"many":[23],"industries,":[24],"so":[25],"companies":[26],"are":[27,90],"increasing":[28],"their":[29,39],"security":[30,37,45],"budgets":[31],"order":[33,101],"to":[34,43,51,92,102],"guarantee":[35],"processes.":[40],"Successful":[41],"menaces":[42],"information":[47],"systems":[48,89,104],"could":[49],"lead":[50],"safety,":[52],"environmental,":[53],"production,":[54],"quality":[56],"problems.":[57],"One":[58],"most":[61],"harmful":[62],"attacks":[65,99],"intrusions":[67],"ever-changing":[70],"nature":[71],"attack":[73],"technologies":[74],"strategies,":[76],"which":[77],"increases":[78],"difficulty":[80],"protecting":[82],"computer":[83],"systems.":[84],"As":[85],"a":[86],"result,":[87],"advanced":[88],"required":[91],"deal":[93],"with":[94],"ever-increasing":[96],"complexity":[97],"protect":[103],"information.":[106]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
