{"id":"https://openalex.org/W336466745","doi":"https://doi.org/10.3217/jucs-011-01-0083","title":"ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention","display_name":"ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention","publication_year":2020,"publication_date":"2020-04-07","ids":{"openalex":"https://openalex.org/W336466745","doi":"https://doi.org/10.3217/jucs-011-01-0083","mag":"336466745"},"language":"en","primary_location":{"id":"pmh:oai:zenodo.org:6996683","is_oa":true,"landing_page_url":"https://zenodo.org/record/6996683","pdf_url":"https://zenodo.org/record/6996683","source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"JUCS - Journal of Universal Computer Science 11((1)) 83-103","raw_type":"info:eu-repo/semantics/article"},"type":"article","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://zenodo.org/record/6996683","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088080120","display_name":"Sachin P. Joglekar","orcid":null},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sachin P. Joglekar","raw_affiliation_strings":["University of North Texas, United States of America"],"affiliations":[{"raw_affiliation_string":"University of North Texas, United States of America","institution_ids":["https://openalex.org/I123534392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026222278","display_name":"Stephen R. Tate","orcid":"https://orcid.org/0000-0001-9315-2705"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Stephen R. Tate","raw_affiliation_strings":["University of North Texas, United States of America"],"affiliations":[{"raw_affiliation_string":"University of North Texas, United States of America","institution_ids":["https://openalex.org/I123534392"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5088080120"],"corresponding_institution_ids":["https://openalex.org/I123534392"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":11,"citation_normalized_percentile":{"value":0.00076693,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6523370146751404},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.630605161190033},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6248196959495544},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5465377569198608},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5312860608100891},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.42385226488113403},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.411419153213501},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3535718321800232},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.08219179511070251},{"id":"https://openalex.org/keywords/geology","display_name":"Geology","score":0.08047467470169067}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6523370146751404},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.630605161190033},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6248196959495544},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5465377569198608},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5312860608100891},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.42385226488113403},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.411419153213501},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3535718321800232},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.08219179511070251},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.08047467470169067},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:zenodo.org:6996683","is_oa":true,"landing_page_url":"https://zenodo.org/record/6996683","pdf_url":"https://zenodo.org/record/6996683","source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"JUCS - Journal of Universal Computer Science 11((1)) 83-103","raw_type":"info:eu-repo/semantics/article"},{"id":"doi:10.3217/jucs-011-01-0083","is_oa":true,"landing_page_url":"https://doi.org/10.3217/jucs-011-01-0083","pdf_url":null,"source":{"id":"https://openalex.org/S4306400660","display_name":"TUGraz OPEN Library (Graz University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4092182","host_organization_name":"Graz University of Technology","host_organization_lineage":["https://openalex.org/I4092182"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:zenodo.org:6996683","is_oa":true,"landing_page_url":"https://zenodo.org/record/6996683","pdf_url":"https://zenodo.org/record/6996683","source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"JUCS - Journal of Universal Computer Science 11((1)) 83-103","raw_type":"info:eu-repo/semantics/article"},"sustainable_development_goals":[{"score":0.6700000166893005,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8813613426","display_name":"Mobile Agent Security Through Multi-Agent Protocols","funder_award_id":"0208640","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W336466745.pdf","grobid_xml":"https://content.openalex.org/works/W336466745.grobid-xml"},"referenced_works_count":21,"referenced_works":["https://openalex.org/W189766157","https://openalex.org/W1533182289","https://openalex.org/W1555184966","https://openalex.org/W1560720671","https://openalex.org/W1583975142","https://openalex.org/W1596447773","https://openalex.org/W1597765364","https://openalex.org/W1649901946","https://openalex.org/W1809974132","https://openalex.org/W1989359075","https://openalex.org/W2029693536","https://openalex.org/W2076542244","https://openalex.org/W2115674733","https://openalex.org/W2124782811","https://openalex.org/W2125109784","https://openalex.org/W2128217000","https://openalex.org/W2131895477","https://openalex.org/W2146973388","https://openalex.org/W2150682469","https://openalex.org/W2166093784","https://openalex.org/W3013607954"],"related_works":["https://openalex.org/W2133389611","https://openalex.org/W2289378658","https://openalex.org/W1531360494","https://openalex.org/W2093529019","https://openalex.org/W87530933","https://openalex.org/W2282990539","https://openalex.org/W154233216","https://openalex.org/W2026856585","https://openalex.org/W2102905434","https://openalex.org/W1988007309"],"abstract_inverted_index":{"Intrusion":[0],"Detection":[1],"Systems":[2],"(IDS)":[3],"are":[4,28],"responsible":[5],"for":[6,32,53,63,122],"monitoring":[7,157],"and":[8,36,83,128,137,147,159],"analyzing":[9],"host":[10],"or":[11,25],"network":[12],"activity":[13],"to":[14,19,43,75,87,143,162,164],"detect":[15,60,88],"intrusions":[16],"in":[17,99,151],"order":[18],"protect":[20],"information":[21],"from":[22,90],"unauthorized":[23],"access":[24],"manipulation.":[26],"There":[27],"two":[29],"main":[30],"approaches":[31],"intrusion":[33],"detection:":[34],"signature-based":[35],"anomaly-based.":[37],"Signature_based":[38],"detection":[39,71],"employs":[40],"pattern":[41],"matching":[42],"match":[44],"attack":[45],"signatures":[46],"with":[47],"observed":[48],"data":[49],"making":[50],"it":[51,58,103],"ideal":[52],"detecting":[54,100,123],"known":[55],"attacks.":[56],"However,":[57],"cannot":[59],"unknown":[61,101],"attacks":[62],"which":[64],"there":[65],"is":[66,97],"no":[67],"signature":[68],"available.":[69],"Anomaly-based":[70],"uses":[72,84],"machine-learning":[73],"techniques":[74],"create":[76],"a":[77,105,108,154],"profile":[78,86],"of":[79,107,126],"normal":[80,92],"system":[81,132],"behavior":[82],"this":[85,95,114],"deviations":[89],"the":[91,141,160],"behavior.":[93],"Although":[94],"technique":[96],"effective":[98],"attacks,":[102],"has":[104,133],"drawback":[106],"high":[109],"false":[110],"alarm":[111],"rate.":[112],"In":[113],"paper,":[115],"we":[116],"describe":[117],"our":[118],"anomaly_based":[119],"IDS":[120],"designed":[121],"malicious":[124],"use":[125],"cryptographic":[127,145],"application-level":[129,148],"protocols.":[130],"Our":[131],"several":[134],"unique":[135],"characteristics":[136],"benefits,":[138],"such":[139],"as":[140],"ability":[142,161],"monitor":[144],"protocols":[146,149],"embedded":[150],"encrypted":[152],"sessions,":[153],"very":[155],"lightweight":[156],"process,":[158],"react":[163],"protocol":[165,169],"misuse":[166],"by":[167],"modifying":[168],"response":[170],"directly.":[171]},"counts_by_year":[],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
