{"id":"https://openalex.org/W2757991163","doi":"https://doi.org/10.15439/2017f280","title":"TARZAN: An Integrated Platform for Security Analysis","display_name":"TARZAN: An Integrated Platform for Security Analysis","publication_year":2017,"publication_date":"2017-09-24","ids":{"openalex":"https://openalex.org/W2757991163","doi":"https://doi.org/10.15439/2017f280","mag":"2757991163"},"language":"en","primary_location":{"id":"doi:10.15439/2017f280","is_oa":true,"landing_page_url":"https://doi.org/10.15439/2017f280","pdf_url":"https://annals-csis.org/proceedings/2017/drp/pdf/280.pdf","source":{"id":"https://openalex.org/S4220651875","display_name":"Annals of Computer Science and Information Systems","issn_l":"2300-5963","issn":["2300-5963"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310317484","host_organization_name":"Polskie Towarzystwo Informatyczne","host_organization_lineage":["https://openalex.org/P4310317484"],"host_organization_lineage_names":["Polskie Towarzystwo Informatyczne"],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annals of Computer Science and Information Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://annals-csis.org/proceedings/2017/drp/pdf/280.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042502592","display_name":"Marek Rychl\u00fd","orcid":"https://orcid.org/0000-0002-3057-4836"},"institutions":[{"id":"https://openalex.org/I60587646","display_name":"Brno University of Technology","ror":"https://ror.org/03613d656","country_code":"CZ","type":"education","lineage":["https://openalex.org/I60587646"]}],"countries":["CZ"],"is_corresponding":true,"raw_author_name":"Marek Rychl\u00fd","raw_affiliation_strings":["Brno University of Technology Faculty of Information Technology, Department of Information Systems IT4Innovations Centre of Excellence Brno, Czech Republic"],"affiliations":[{"raw_affiliation_string":"Brno University of Technology Faculty of Information Technology, Department of Information Systems IT4Innovations Centre of Excellence Brno, Czech Republic","institution_ids":["https://openalex.org/I60587646"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001527809","display_name":"Ond\u0159ej Ry\u0161av\u00fd","orcid":"https://orcid.org/0000-0001-9652-6418"},"institutions":[{"id":"https://openalex.org/I60587646","display_name":"Brno University of Technology","ror":"https://ror.org/03613d656","country_code":"CZ","type":"education","lineage":["https://openalex.org/I60587646"]}],"countries":["CZ"],"is_corresponding":false,"raw_author_name":"Ondrej Ry\u0161av\u00fd","raw_affiliation_strings":["Brno University of Technology Faculty of Information Technology, Department of Information Systems IT4Innovations Centre of Excellence Brno, Czech Republic"],"affiliations":[{"raw_affiliation_string":"Brno University of Technology Faculty of Information Technology, Department of Information Systems IT4Innovations Centre of Excellence Brno, Czech Republic","institution_ids":["https://openalex.org/I60587646"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5042502592"],"corresponding_institution_ids":["https://openalex.org/I60587646"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.0866057,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":"11","issue":null,"first_page":"561","last_page":"567"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7958776950836182},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7287980318069458},{"id":"https://openalex.org/keywords/middleware","display_name":"Middleware (distributed applications)","score":0.508478045463562},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.5065869092941284},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43796810507774353},{"id":"https://openalex.org/keywords/distributed-data-store","display_name":"Distributed data store","score":0.4194115400314331},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.41456714272499084},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3840371370315552},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.2989073097705841},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.234383225440979}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7958776950836182},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7287980318069458},{"id":"https://openalex.org/C169468491","wikidata":"https://www.wikidata.org/wiki/Q146923","display_name":"Middleware (distributed applications)","level":2,"score":0.508478045463562},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.5065869092941284},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43796810507774353},{"id":"https://openalex.org/C24885549","wikidata":"https://www.wikidata.org/wiki/Q339678","display_name":"Distributed data store","level":2,"score":0.4194115400314331},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.41456714272499084},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3840371370315552},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.2989073097705841},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.234383225440979}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.15439/2017f280","is_oa":true,"landing_page_url":"https://doi.org/10.15439/2017f280","pdf_url":"https://annals-csis.org/proceedings/2017/drp/pdf/280.pdf","source":{"id":"https://openalex.org/S4220651875","display_name":"Annals of Computer Science and Information Systems","issn_l":"2300-5963","issn":["2300-5963"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310317484","host_organization_name":"Polskie Towarzystwo Informatyczne","host_organization_lineage":["https://openalex.org/P4310317484"],"host_organization_lineage_names":["Polskie Towarzystwo Informatyczne"],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annals of Computer Science and Information Systems","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.15439/2017f280","is_oa":true,"landing_page_url":"https://doi.org/10.15439/2017f280","pdf_url":"https://annals-csis.org/proceedings/2017/drp/pdf/280.pdf","source":{"id":"https://openalex.org/S4220651875","display_name":"Annals of Computer Science and Information Systems","issn_l":"2300-5963","issn":["2300-5963"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310317484","host_organization_name":"Polskie Towarzystwo Informatyczne","host_organization_lineage":["https://openalex.org/P4310317484"],"host_organization_lineage_names":["Polskie Towarzystwo Informatyczne"],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annals of Computer Science and Information Systems","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2757991163.pdf","grobid_xml":"https://content.openalex.org/works/W2757991163.grobid-xml"},"referenced_works_count":20,"referenced_works":["https://openalex.org/W138782056","https://openalex.org/W854708135","https://openalex.org/W1778942215","https://openalex.org/W1968043276","https://openalex.org/W1970399788","https://openalex.org/W1982829786","https://openalex.org/W2000674713","https://openalex.org/W2080731889","https://openalex.org/W2099226020","https://openalex.org/W2102414025","https://openalex.org/W2124808847","https://openalex.org/W2131166445","https://openalex.org/W2174009075","https://openalex.org/W2303287830","https://openalex.org/W2461897637","https://openalex.org/W2525780789","https://openalex.org/W2529303197","https://openalex.org/W2556501567","https://openalex.org/W3129849971","https://openalex.org/W6650648742"],"related_works":["https://openalex.org/W4390608645","https://openalex.org/W4247566972","https://openalex.org/W4394895745","https://openalex.org/W2960264696","https://openalex.org/W3090563135","https://openalex.org/W2497432351","https://openalex.org/W4206777497","https://openalex.org/W2910064364","https://openalex.org/W4200136508","https://openalex.org/W2149470664"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3],"present":[4],"the":[5,45,71,79,117,125,147],"TARZAN":[6,72],"platform,":[7,67],"an":[8,84],"integrated":[9,80],"platform":[10,20,126,143],"for":[11,44,74,116],"analysis":[12,152],"of":[13,92,106,119,149,153],"digital":[14],"data":[15,27,30,53,81,93,133],"from":[16,83,94],"security":[17,86,151],"incidents.":[18],"The":[19,47,142],"serves":[21],"primarily":[22],"as":[23,51,130],"a":[24,41,52,55,60,64,103,120,131,150],"middleware":[25],"between":[26],"sources":[28],"and":[29,40,57,63,113,115,139],"processing":[31,134],"applications,":[32],"however,":[33],"it":[34],"also":[35],"provides":[36],"several":[37],"supporting":[38,48],"services":[39],"runtime":[42],"environment":[43],"applications.":[46],"services,":[49],"such":[50],"storage,":[54],"resource":[56],"application":[58],"registry,":[59],"synchronization":[61],"service,":[62],"distributed":[65,107,123],"computing":[66],"are":[68],"utilized":[69],"by":[70],"applications":[73],"various":[75],"security-oriented":[76],"analyses":[77,91],"on":[78,146],"ranging":[82],"IT":[85],"incident":[87],"detection":[88],"to":[89],"inference":[90],"social":[95],"networks":[96],"or":[97],"cryptocurrency":[98],"transactions.":[99],"To":[100],"cope":[101],"with":[102],"large":[104,121],"amount":[105],"data,":[108],"both":[109],"streamed":[110],"in":[111],"real-time":[112],"stored,":[114],"need":[118],"scale":[122],"computing,":[124],"has":[127],"been":[128],"designed":[129],"big":[132],"system":[135],"ensuring":[136],"reliable,":[137],"scalable,":[138],"cost-effective":[140],"solution.":[141],"is":[144],"demonstrated":[145],"case":[148],"network":[154],"traffic.":[155]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
