{"id":"https://openalex.org/W4411709969","doi":"https://doi.org/10.1631/fitee.2500053","title":"Active cybersecurity: vision, model, and key technologies","display_name":"Active cybersecurity: vision, model, and key technologies","publication_year":2025,"publication_date":"2025-06-27","ids":{"openalex":"https://openalex.org/W4411709969","doi":"https://doi.org/10.1631/fitee.2500053"},"language":"en","primary_location":{"id":"doi:10.1631/fitee.2500053","is_oa":false,"landing_page_url":"https://doi.org/10.1631/fitee.2500053","pdf_url":null,"source":{"id":"https://openalex.org/S4210189857","display_name":"Frontiers of Information Technology & Electronic Engineering","issn_l":"2095-9184","issn":["2095-9184","2095-9230"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers of Information Technology &amp; Electronic Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100780268","display_name":"Xiaosong Zhang","orcid":"https://orcid.org/0000-0001-9886-1412"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaosong Zhang","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Sichuan, 611731, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Sichuan, 611731, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006455453","display_name":"Yukun Zhu","orcid":"https://orcid.org/0000-0003-3838-0283"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yukun Zhu","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Sichuan, 611731, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Sichuan, 611731, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112118547","display_name":"Xiong Li","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiong Li","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Sichuan, 611731, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Sichuan, 611731, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101624258","display_name":"Yongzhao Zhang","orcid":"https://orcid.org/0009-0002-2716-5369"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongzhao Zhang","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Sichuan, 611731, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Sichuan, 611731, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078928845","display_name":"Weina Niu","orcid":"https://orcid.org/0000-0002-0072-5541"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weina Niu","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Sichuan, 611731, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Sichuan, 611731, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065163438","display_name":"Fenghua Xu","orcid":"https://orcid.org/0009-0006-0446-4787"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fenghua Xu","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Sichuan, 611731, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Sichuan, 611731, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101900563","display_name":"Junpeng He","orcid":"https://orcid.org/0000-0001-7616-291X"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junpeng He","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Sichuan, 611731, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Sichuan, 611731, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050130790","display_name":"Ran Yan","orcid":"https://orcid.org/0000-0001-6705-1644"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ran Yan","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Sichuan, 611731, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Sichuan, 611731, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102983422","display_name":"Shiping Huang","orcid":"https://orcid.org/0000-0001-8868-4977"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shiping Huang","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Sichuan, 611731, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Sichuan, 611731, China","institution_ids":["https://openalex.org/I150229711"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5100780268"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.21464375,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"26","issue":"8","first_page":"1243","last_page":"1278"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.7539091110229492},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6354930996894836},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5472285151481628}],"concepts":[{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.7539091110229492},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6354930996894836},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5472285151481628}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1631/fitee.2500053","is_oa":false,"landing_page_url":"https://doi.org/10.1631/fitee.2500053","pdf_url":null,"source":{"id":"https://openalex.org/S4210189857","display_name":"Frontiers of Information Technology & Electronic Engineering","issn_l":"2095-9184","issn":["2095-9184","2095-9230"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers of Information Technology &amp; Electronic Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":71,"referenced_works":["https://openalex.org/W1945616565","https://openalex.org/W1988524530","https://openalex.org/W2021247827","https://openalex.org/W2067064328","https://openalex.org/W2081676364","https://openalex.org/W2093148648","https://openalex.org/W2100198871","https://openalex.org/W2139565456","https://openalex.org/W2148168803","https://openalex.org/W2193428859","https://openalex.org/W2293628724","https://openalex.org/W2553733554","https://openalex.org/W2763967737","https://openalex.org/W2790843555","https://openalex.org/W2889836475","https://openalex.org/W2892341857","https://openalex.org/W2917814433","https://openalex.org/W2947745012","https://openalex.org/W2951270751","https://openalex.org/W2961190629","https://openalex.org/W2962703433","https://openalex.org/W2969343988","https://openalex.org/W2997395473","https://openalex.org/W3005127313","https://openalex.org/W3006711782","https://openalex.org/W3083528243","https://openalex.org/W3111681926","https://openalex.org/W3137205257","https://openalex.org/W3163860748","https://openalex.org/W3205577829","https://openalex.org/W3214329506","https://openalex.org/W4250744658","https://openalex.org/W4283452783","https://openalex.org/W4288057717","https://openalex.org/W4288057803","https://openalex.org/W4294770755","https://openalex.org/W4308605894","https://openalex.org/W4308632305","https://openalex.org/W4313591247","https://openalex.org/W4321490422","https://openalex.org/W4322762918","https://openalex.org/W4322775461","https://openalex.org/W4362704894","https://openalex.org/W4365149876","https://openalex.org/W4377970398","https://openalex.org/W4379116241","https://openalex.org/W4383345794","https://openalex.org/W4385163784","https://openalex.org/W4386270217","https://openalex.org/W4386389417","https://openalex.org/W4387556984","https://openalex.org/W4388483305","https://openalex.org/W4389546099","https://openalex.org/W4390591018","https://openalex.org/W4390881927","https://openalex.org/W4391508129","https://openalex.org/W4392520145","https://openalex.org/W4392776130","https://openalex.org/W4393592136","https://openalex.org/W4396833306","https://openalex.org/W4398794784","https://openalex.org/W4402607479","https://openalex.org/W6600041127","https://openalex.org/W6600137863","https://openalex.org/W6600405510","https://openalex.org/W6601222452","https://openalex.org/W6602291757","https://openalex.org/W6602390520","https://openalex.org/W6647398271","https://openalex.org/W6813283921","https://openalex.org/W6817963974"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Noncooperative":[0],"computer":[1],"systems":[2],"and":[3,30,66,100,127,144,156,169,187,207,225],"network":[4,44,72],"confrontation":[5,171],"present":[6],"a":[7,173,178,198,217],"core":[8,58],"challenge":[9],"in":[10,68],"cyberspace":[11],"security.":[12],"Traditional":[13],"cybersecurity":[14,115,195,214],"technologies":[15,215],"predominantly":[16],"rely":[17],"on":[18,85],"passive":[19,202],"response":[20],"mechanisms,":[21],"which":[22],"exhibit":[23],"significant":[24],"limitations":[25],"when":[26],"addressing":[27],"real-world":[28],"complex":[29],"unknown":[31],"threats.":[32],"This":[33],"paper":[34,89],"introduces":[35],"the":[36,69,95,157,175,211],"concept":[37,62],"of":[38,60,71,153,159,213],"\u201cactive":[39],"cybersecurity,\u201d":[40],"aiming":[41],"to":[42,79,93,133,204],"enhance":[43],"security":[45],"not":[46],"only":[47],"through":[48],"technical":[49],"measures":[50],"but":[51],"also":[52],"by":[53,107,163,221],"leveraging":[54],"strategy-level":[55],"defenses.":[56],"The":[57,192],"assumption":[59],"this":[61,86,88,108],"is":[63],"that":[64,181],"attackers":[65,99],"defenders,":[67,101],"context":[70],"confrontations,":[73],"act":[74],"as":[75,172],"rational":[76],"decision-makers":[77],"seeking":[78],"maximize":[80],"their":[81,104],"respective":[82],"objectives.":[83],"Building":[84],"observation,":[87],"integrates":[90],"game":[91,164],"theory":[92],"analyze":[94],"interdependent":[96],"relationships":[97],"between":[98],"thereby":[102],"optimizing":[103],"strategies.":[105],"Guided":[106],"foundational":[109],"idea,":[110],"we":[111],"propose":[112],"an":[113,135],"active":[114,194,222],"model":[116,176,196],"involving":[117],"intelligent":[118],"threat":[119,140],"sensing,":[120],"in-depth":[121],"behavior":[122,155],"analysis,":[123,142],"comprehensive":[124,179],"path":[125],"profiling,":[126],"dynamic":[128],"countermeasures,":[129],"termed":[130],"SAPC,":[131],"designed":[132],"foster":[134],"integrated":[136],"defense":[137,203],"capability":[138],"encompassing":[139],"perception,":[141],"tracing,":[143],"response.":[145],"At":[146],"its":[147],"core,":[148],"SAPC":[149],"incorporates":[150],"theoretical":[151,184],"analyses":[152],"adversarial":[154],"optimization":[158],"corresponding":[160],"strategies":[161],"informed":[162],"theory.":[165],"By":[166],"profiling":[167],"adversaries":[168],"modeling":[170],"\u201cgame,\u201d":[174],"establishes":[177],"framework":[180],"provides":[182],"both":[183],"insights":[185],"into":[186],"practical":[188],"guidance":[189],"for":[190],"cybersecurity.":[191],"proposed":[193],"marks":[197],"transformative":[199],"shift":[200],"from":[201],"proactive":[205],"perception":[206],"confrontation.":[208],"It":[209],"facilitates":[210],"evolution":[212],"toward":[216],"new":[218],"paradigm":[219],"characterized":[220],"prediction,":[223],"prevention,":[224],"strategic":[226],"guidance.":[227]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
