{"id":"https://openalex.org/W6963288822","doi":"https://doi.org/10.21227/421e-0b70","title":"Before DDOS","display_name":"Before DDOS","publication_year":2024,"publication_date":"2024-04-24","ids":{"openalex":"https://openalex.org/W6963288822","doi":"https://doi.org/10.21227/421e-0b70"},"language":"en","primary_location":{"id":"doi:10.21227/421e-0b70","is_oa":true,"landing_page_url":"https://doi.org/10.21227/421e-0b70","pdf_url":null,"source":{"id":"https://openalex.org/S7407051695","display_name":"IEEE DataPort","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"dataset"},"type":"dataset","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.21227/421e-0b70","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Itodo, Cornelius","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Itodo, Cornelius","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Ozer, Murat","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ozer, Murat","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":null,"topics":[],"keywords":[{"id":"https://openalex.org/keywords/globe","display_name":"Globe","score":0.645799994468689},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5389000177383423},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5134000182151794},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.4300999939441681},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.4124999940395355},{"id":"https://openalex.org/keywords/best-practice","display_name":"Best practice","score":0.3928999900817871},{"id":"https://openalex.org/keywords/phenomenon","display_name":"Phenomenon","score":0.3869999945163727},{"id":"https://openalex.org/keywords/core","display_name":"Core (optical fiber)","score":0.38350000977516174},{"id":"https://openalex.org/keywords/conceptual-model","display_name":"Conceptual model","score":0.361299991607666}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6704999804496765},{"id":"https://openalex.org/C2775899829","wikidata":"https://www.wikidata.org/wiki/Q3109007","display_name":"Globe","level":2,"score":0.645799994468689},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6162999868392944},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5389000177383423},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5134000182151794},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.4300999939441681},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.4124999940395355},{"id":"https://openalex.org/C184356942","wikidata":"https://www.wikidata.org/wiki/Q830382","display_name":"Best practice","level":2,"score":0.3928999900817871},{"id":"https://openalex.org/C50335755","wikidata":"https://www.wikidata.org/wiki/Q483247","display_name":"Phenomenon","level":2,"score":0.3869999945163727},{"id":"https://openalex.org/C2164484","wikidata":"https://www.wikidata.org/wiki/Q5170150","display_name":"Core (optical fiber)","level":2,"score":0.38350000977516174},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.364300012588501},{"id":"https://openalex.org/C13606891","wikidata":"https://www.wikidata.org/wiki/Q2623243","display_name":"Conceptual model","level":2,"score":0.361299991607666},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.349700003862381},{"id":"https://openalex.org/C2780264999","wikidata":"https://www.wikidata.org/wiki/Q7445032","display_name":"Security domain","level":2,"score":0.3328999876976013},{"id":"https://openalex.org/C14224292","wikidata":"https://www.wikidata.org/wiki/Q13600188","display_name":"Conceptual framework","level":2,"score":0.3156000077724457},{"id":"https://openalex.org/C2780813799","wikidata":"https://www.wikidata.org/wiki/Q3274237","display_name":"Zero (linguistics)","level":2,"score":0.3098999857902527},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.290800005197525},{"id":"https://openalex.org/C2778012447","wikidata":"https://www.wikidata.org/wiki/Q1034415","display_name":"Scope (computer science)","level":2,"score":0.27959999442100525},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2721000015735626},{"id":"https://openalex.org/C89623803","wikidata":"https://www.wikidata.org/wiki/Q12184","display_name":"Pandemic","level":5,"score":0.2718000113964081},{"id":"https://openalex.org/C154800190","wikidata":"https://www.wikidata.org/wiki/Q16941470","display_name":"Trust anchor","level":4,"score":0.2651999890804291},{"id":"https://openalex.org/C106033793","wikidata":"https://www.wikidata.org/wiki/Q457332","display_name":"Ambidexterity","level":2,"score":0.25609999895095825},{"id":"https://openalex.org/C160521178","wikidata":"https://www.wikidata.org/wiki/Q5157345","display_name":"Computational trust","level":3,"score":0.2502000033855438},{"id":"https://openalex.org/C98184364","wikidata":"https://www.wikidata.org/wiki/Q1780131","display_name":"Argument (complex analysis)","level":2,"score":0.2500999867916107},{"id":"https://openalex.org/C2778143579","wikidata":"https://www.wikidata.org/wiki/Q831801","display_name":"Business continuity","level":2,"score":0.25}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.21227/421e-0b70","is_oa":true,"landing_page_url":"https://doi.org/10.21227/421e-0b70","pdf_url":null,"source":{"id":"https://openalex.org/S7407051695","display_name":"IEEE DataPort","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"dataset"}],"best_oa_location":{"id":"doi:10.21227/421e-0b70","is_oa":true,"landing_page_url":"https://doi.org/10.21227/421e-0b70","pdf_url":null,"source":{"id":"https://openalex.org/S7407051695","display_name":"IEEE DataPort","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"dataset"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0],"sudden":[1],"shift":[2],"from":[3,130],"physical":[4],"office":[5],"location":[6],"to":[7,48,52,70,95,103,116,136,157,208],"a":[8,21,83,107,124,159,177,186],"fully":[9,96],"remote":[10],"or":[11],"hybrid":[12],"work":[13],"model":[14],"accelerated":[15],"by":[16,204],"the":[17,37,46,61,64,75,88,104,140,163,182,191,197,210],"COVID-19":[18],"pandemic":[19],"is":[20,60,100],"phenomenon":[22],"that":[23,112,127,153,174,189],"changed":[24,36],"how":[25],"organizations":[26,44,92],"traditionally":[27],"operated":[28],"and":[29,34,133,145],"thereby":[30],"introduced":[31],"new":[32,50],"vulnerabilities":[33],"consequently":[35],"cyber":[38],"threat":[39],"landscape.":[40],"This":[41,99],"has":[42],"led":[43],"around":[45],"globe":[47],"seek":[49],"approaches":[51],"protect":[53],"their":[54],"enterprise":[55],"network.":[56],"One":[57],"such":[58],"approach":[59,68,86,164],"adoption":[62],"of":[63,106,142,165,199],"Zero":[65],"Trust":[66],"security":[67,77,90],"due":[69,102],"its":[71,118],"many":[72],"advantages":[73],"over":[74,87],"traditional/perimeter":[76],"approach.":[78],"Although":[79],"zero":[80,167,200],"trust":[81,201],"presents":[82],"stronger":[84],"defense":[85],"perimeter":[89],"model,":[91],"are":[93],"hesitant":[94],"embrace":[97],"it.":[98],"partly":[101],"lack":[105],"unified":[108],"zero-trust":[109,143],"implementation":[110,144,198,211],"framework":[111,188],"can":[113,175],"be":[114],"used":[115],"guide":[117,209],"adoption.":[119],"As":[120],"such,":[121],"we":[122],"conducted":[123],"multivocal":[125],"review":[126],"included":[128],"literature":[129],"both":[131],"academic":[132],"non-academic":[134],"sources":[135],"consolidate":[137],"knowledge":[138],"on":[139,162,181],"state-of-the-art":[141],"identify":[146],"gaps":[147],"in":[148,196],"literature.":[149],"Our":[150],"result":[151],"shows":[152],"existing":[154],"papers":[155],"tend":[156],"have":[158],"narrow":[160],"viewpoint":[161,173],"implementing":[166],"trust,":[168],"rather":[169],"than":[170],"an":[171],"encompassing":[172],"provide":[176],"more":[178],"holistic":[179],"view":[180],"topic.":[183],"We":[184],"developed":[185],"conceptual":[187],"articulates":[190],"five":[192],"core":[193],"components":[194],"involved":[195],"security,":[202],"guided":[203],"key":[205],"questions":[206],"designed":[207],"process.":[212]},"counts_by_year":[],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
