{"id":"https://openalex.org/W2756953140","doi":"https://doi.org/10.15439/2017f463","title":"Load-balanced Integrated Information Security Monitoring System","display_name":"Load-balanced Integrated Information Security Monitoring System","publication_year":2017,"publication_date":"2017-09-24","ids":{"openalex":"https://openalex.org/W2756953140","doi":"https://doi.org/10.15439/2017f463","mag":"2756953140"},"language":"en","primary_location":{"id":"doi:10.15439/2017f463","is_oa":true,"landing_page_url":"https://doi.org/10.15439/2017f463","pdf_url":"https://annals-csis.org/proceedings/2017/drp/pdf/463.pdf","source":{"id":"https://openalex.org/S4220651875","display_name":"Annals of Computer Science and Information Systems","issn_l":"2300-5963","issn":["2300-5963"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310317484","host_organization_name":"Polskie Towarzystwo Informatyczne","host_organization_lineage":["https://openalex.org/P4310317484"],"host_organization_lineage_names":["Polskie Towarzystwo Informatyczne"],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annals of Computer Science and Information Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://annals-csis.org/proceedings/2017/drp/pdf/463.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028522280","display_name":"Tomasz Klasa","orcid":null},"institutions":[{"id":"https://openalex.org/I155313962","display_name":"West Pomeranian University of Technology","ror":"https://ror.org/0596m7f19","country_code":"PL","type":"education","lineage":["https://openalex.org/I155313962"]},{"id":"https://openalex.org/I4210093344","display_name":"Zachodniopomorska Szko\u0142a Biznesu w Szczecinie","ror":"https://ror.org/00gz03w45","country_code":"PL","type":"education","lineage":["https://openalex.org/I4210093344"]},{"id":"https://openalex.org/I170230895","display_name":"Warsaw University of Life Sciences","ror":"https://ror.org/05srvzs48","country_code":"PL","type":"education","lineage":["https://openalex.org/I170230895"]}],"countries":["PL"],"is_corresponding":true,"raw_author_name":"Tomasz Klasa","raw_affiliation_strings":["Warsaw University of Life Sciences, Faculty of Applied Informatics and Mathematics, Warsaw, Poland, West","West Pomeranian Business School, Szczecin, Poland","TK Systems Security","Pomeranian University of Technology, Faculty of Computer Science, Szczecin, Poland"],"affiliations":[{"raw_affiliation_string":"Warsaw University of Life Sciences, Faculty of Applied Informatics and Mathematics, Warsaw, Poland, West","institution_ids":["https://openalex.org/I170230895"]},{"raw_affiliation_string":"West Pomeranian Business School, Szczecin, Poland","institution_ids":["https://openalex.org/I4210093344"]},{"raw_affiliation_string":"TK Systems Security","institution_ids":[]},{"raw_affiliation_string":"Pomeranian University of Technology, Faculty of Computer Science, Szczecin, Poland","institution_ids":["https://openalex.org/I155313962"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089301299","display_name":"Imed El Fray","orcid":"https://orcid.org/0000-0002-3060-488X"},"institutions":[{"id":"https://openalex.org/I155313962","display_name":"West Pomeranian University of Technology","ror":"https://ror.org/0596m7f19","country_code":"PL","type":"education","lineage":["https://openalex.org/I155313962"]},{"id":"https://openalex.org/I4210093344","display_name":"Zachodniopomorska Szko\u0142a Biznesu w Szczecinie","ror":"https://ror.org/00gz03w45","country_code":"PL","type":"education","lineage":["https://openalex.org/I4210093344"]},{"id":"https://openalex.org/I170230895","display_name":"Warsaw University of Life Sciences","ror":"https://ror.org/05srvzs48","country_code":"PL","type":"education","lineage":["https://openalex.org/I170230895"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Imed El Fray","raw_affiliation_strings":["Pomeranian University of Technology, Faculty of Computer Science, Szczecin, Poland","TK Systems Security","West Pomeranian Business School, Szczecin, Poland","Warsaw University of Life Sciences, Faculty of Applied Informatics and Mathematics, Warsaw, Poland, West"],"affiliations":[{"raw_affiliation_string":"Pomeranian University of Technology, Faculty of Computer Science, Szczecin, Poland","institution_ids":["https://openalex.org/I155313962"]},{"raw_affiliation_string":"TK Systems Security","institution_ids":[]},{"raw_affiliation_string":"West Pomeranian Business School, Szczecin, Poland","institution_ids":["https://openalex.org/I4210093344"]},{"raw_affiliation_string":"Warsaw University of Life Sciences, Faculty of Applied Informatics and Mathematics, Warsaw, Poland, West","institution_ids":["https://openalex.org/I170230895"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5028522280"],"corresponding_institution_ids":["https://openalex.org/I155313962","https://openalex.org/I170230895","https://openalex.org/I4210093344"],"apc_list":null,"apc_paid":null,"fwci":0.2762,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.48197956,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"13","issue":null,"first_page":"213","last_page":"221"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6877330541610718},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.6498208045959473},{"id":"https://openalex.org/keywords/security-management","display_name":"Security management","score":0.5870579481124878},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.580754280090332},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.5469563007354736},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.528649628162384},{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.5205639004707336},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.516620934009552},{"id":"https://openalex.org/keywords/information-security-management-system","display_name":"Information security management system","score":0.4995448589324951},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.49253806471824646},{"id":"https://openalex.org/keywords/itil-security-management","display_name":"ITIL security management","score":0.47528329491615295},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.4678049385547638},{"id":"https://openalex.org/keywords/information-security-audit","display_name":"Information security audit","score":0.4506988823413849},{"id":"https://openalex.org/keywords/security-convergence","display_name":"Security convergence","score":0.41872361302375793},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.32053524255752563},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.19307547807693481},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.12875238060951233}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6877330541610718},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.6498208045959473},{"id":"https://openalex.org/C83163435","wikidata":"https://www.wikidata.org/wiki/Q3954104","display_name":"Security management","level":2,"score":0.5870579481124878},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.580754280090332},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.5469563007354736},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.528649628162384},{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.5205639004707336},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.516620934009552},{"id":"https://openalex.org/C111153917","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management system","level":5,"score":0.4995448589324951},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.49253806471824646},{"id":"https://openalex.org/C114351632","wikidata":"https://www.wikidata.org/wiki/Q5974820","display_name":"ITIL security management","level":5,"score":0.47528329491615295},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.4678049385547638},{"id":"https://openalex.org/C39358052","wikidata":"https://www.wikidata.org/wiki/Q2578632","display_name":"Information security audit","level":5,"score":0.4506988823413849},{"id":"https://openalex.org/C52420254","wikidata":"https://www.wikidata.org/wiki/Q7445028","display_name":"Security convergence","level":5,"score":0.41872361302375793},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.32053524255752563},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.19307547807693481},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.12875238060951233},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.15439/2017f463","is_oa":true,"landing_page_url":"https://doi.org/10.15439/2017f463","pdf_url":"https://annals-csis.org/proceedings/2017/drp/pdf/463.pdf","source":{"id":"https://openalex.org/S4220651875","display_name":"Annals of Computer Science and Information Systems","issn_l":"2300-5963","issn":["2300-5963"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310317484","host_organization_name":"Polskie Towarzystwo Informatyczne","host_organization_lineage":["https://openalex.org/P4310317484"],"host_organization_lineage_names":["Polskie Towarzystwo Informatyczne"],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annals of Computer Science and Information Systems","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.15439/2017f463","is_oa":true,"landing_page_url":"https://doi.org/10.15439/2017f463","pdf_url":"https://annals-csis.org/proceedings/2017/drp/pdf/463.pdf","source":{"id":"https://openalex.org/S4220651875","display_name":"Annals of Computer Science and Information Systems","issn_l":"2300-5963","issn":["2300-5963"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310317484","host_organization_name":"Polskie Towarzystwo Informatyczne","host_organization_lineage":["https://openalex.org/P4310317484"],"host_organization_lineage_names":["Polskie Towarzystwo Informatyczne"],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annals of Computer Science and Information Systems","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2756953140.pdf","grobid_xml":"https://content.openalex.org/works/W2756953140.grobid-xml"},"referenced_works_count":23,"referenced_works":["https://openalex.org/W774573213","https://openalex.org/W1505031252","https://openalex.org/W1862295427","https://openalex.org/W1875962355","https://openalex.org/W1982359930","https://openalex.org/W2003767898","https://openalex.org/W2011957793","https://openalex.org/W2031838350","https://openalex.org/W2034000848","https://openalex.org/W2051805074","https://openalex.org/W2073930626","https://openalex.org/W2085775116","https://openalex.org/W2127374382","https://openalex.org/W2146341912","https://openalex.org/W2176849474","https://openalex.org/W2521505223","https://openalex.org/W2535346220","https://openalex.org/W2583862887","https://openalex.org/W3186379692","https://openalex.org/W4205962651","https://openalex.org/W4230797262","https://openalex.org/W4234911083","https://openalex.org/W6903894191"],"related_works":["https://openalex.org/W3048038405","https://openalex.org/W2584162156","https://openalex.org/W1573253764","https://openalex.org/W3202944588","https://openalex.org/W4386396756","https://openalex.org/W2066297175","https://openalex.org/W2587779048","https://openalex.org/W4205358031","https://openalex.org/W2121906315","https://openalex.org/W2483557577"],"abstract_inverted_index":{"Monitoring":[0],"is":[1,12,40,78,116,148],"the":[2,6,17,24,44,55,71,81,89,97,109,121],"last":[3],"step":[4],"of":[5,19,28,70,88,108],"information":[7,129],"security":[8,20,30,56,72,125,138],"management":[9,73],"process.":[10],"It":[11],"intended":[13],"to":[14,42,118],"evaluate":[15],"not":[16,101],"state":[18],"itself,":[21],"but":[22],"rather":[23],"accuracy":[25],"and":[26,32,49,58,64],"quality":[27],"prior":[29],"evaluation":[31,59],"risk":[33],"treatment":[34],"applied.":[35],"In":[36,111],"other":[37,51],"words,":[38],"it":[39,83,115],"supposed":[41],"provide":[43,102],"answer,":[45],"whether":[46],"chosen":[47],"countermeasures":[48,99],"all":[50,120],"decisions":[52],"based":[53],"on":[54],"assessment":[57],"results":[60],"were":[61],"accurate,":[62],"proper":[63],"sufficient.":[65],"If":[66],"during":[67],"this":[68,151],"phase":[69],"process,":[74],"any":[75],"significant":[76],"anomaly":[77],"found":[79],"within":[80],"system,":[82],"means":[84],"that":[85,96,123,140],"either":[86],"one":[87],"accepted":[90],"'as":[91],"is'":[92],"risks":[93],"occurred,":[94],"or":[95],"applied":[98],"did":[100],"assumed":[103],"protection":[104],"in":[105,132,150],"some":[106],"point":[107],"system.":[110],"such":[112],"a":[113],"case":[114],"necessary":[117],"identify":[119],"areas":[122],"require":[124],"audit":[126],"repeat.":[127],"As":[128],"systems":[130],"grow":[131],"complexity,":[133],"an":[134],"integrated":[135],"solution":[136],"for":[137],"monitoring":[139,147],"will":[141],"prevent":[142],"system":[143],"overload":[144],"caused":[145],"by":[146],"proposed":[149],"paper.":[152]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
