{"id":"https://openalex.org/W2621195001","doi":"https://doi.org/10.3233/978-1-61499-672-9-1583","title":"Using a Deep Understanding of Network Activities for Network Vulnerability Assessment","display_name":"Using a Deep Understanding of Network Activities for Network Vulnerability Assessment","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W2621195001","doi":"https://doi.org/10.3233/978-1-61499-672-9-1583","mag":"2621195001"},"language":"en","primary_location":{"id":"doi:10.3233/978-1-61499-672-9-1583","is_oa":false,"landing_page_url":"https://doi.org/10.3233/978-1-61499-672-9-1583","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034965060","display_name":"Mona Lange","orcid":null},"institutions":[{"id":"https://openalex.org/I9341345","display_name":"University of L\u00fcbeck","ror":"https://ror.org/00t3r8h32","country_code":"DE","type":"education","lineage":["https://openalex.org/I9341345"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Lange Mona","raw_affiliation_strings":["University of L\u00fcbeck, L\u00fcbeck, Germany"],"affiliations":[{"raw_affiliation_string":"University of L\u00fcbeck, L\u00fcbeck, Germany","institution_ids":["https://openalex.org/I9341345"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029232717","display_name":"Felix Kuhr","orcid":null},"institutions":[{"id":"https://openalex.org/I159176309","display_name":"Universit\u00e4t Hamburg","ror":"https://ror.org/00g30e956","country_code":"DE","type":"education","lineage":["https://openalex.org/I159176309"]},{"id":"https://openalex.org/I884043246","display_name":"Hamburg University of Technology","ror":"https://ror.org/04bs1pb34","country_code":"DE","type":"education","lineage":["https://openalex.org/I884043246"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Kuhr Felix","raw_affiliation_strings":["Hamburg University of Technology, Hamburg, Germany"],"affiliations":[{"raw_affiliation_string":"Hamburg University of Technology, Hamburg, Germany","institution_ids":["https://openalex.org/I159176309","https://openalex.org/I884043246"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101970015","display_name":"Ralf M\u00f6ller","orcid":"https://orcid.org/0000-0002-1174-3323"},"institutions":[{"id":"https://openalex.org/I9341345","display_name":"University of L\u00fcbeck","ror":"https://ror.org/00t3r8h32","country_code":"DE","type":"education","lineage":["https://openalex.org/I9341345"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"M&ouml;ller Ralf","raw_affiliation_strings":["University of L\u00fcbeck, L\u00fcbeck, Germany"],"affiliations":[{"raw_affiliation_string":"University of L\u00fcbeck, L\u00fcbeck, Germany","institution_ids":["https://openalex.org/I9341345"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5034965060"],"corresponding_institution_ids":["https://openalex.org/I9341345"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.34967858,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.977400004863739,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.977400004863739,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9302999973297119,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.7660438418388367},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.6786125898361206},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.40807703137397766},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.23856475949287415},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14554628729820251},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.04875817894935608}],"concepts":[{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.7660438418388367},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.6786125898361206},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.40807703137397766},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.23856475949287415},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14554628729820251},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.04875817894935608},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/978-1-61499-672-9-1583","is_oa":false,"landing_page_url":"https://doi.org/10.3233/978-1-61499-672-9-1583","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W1883246888","https://openalex.org/W2370114625","https://openalex.org/W1756374135","https://openalex.org/W2062873522","https://openalex.org/W2947584067","https://openalex.org/W2280562859","https://openalex.org/W230721595","https://openalex.org/W3157230915","https://openalex.org/W1496728123","https://openalex.org/W2789975780"],"abstract_inverted_index":{"In":[0,94],"data-communication":[1,36],"networks,":[2],"network":[3,11,16,70,74,117],"reliability":[4],"is":[5,52],"of":[6,99,115,131],"great":[7],"concern":[8],"to":[9,19,55,86,112,127,136],"both":[10],"operators":[12,17],"and":[13,83,103],"customers.":[14],"Therefore,":[15],"want":[18],"determine":[20,39],"what":[21,40],"services":[22,41],"could":[23,42],"be":[24,43],"affected":[25,44],"by":[26,45,88,104],"software":[27,47],"vulnerabilities":[28],"being":[29,49],"exploited":[30],"that":[31],"are":[32,79,84,101,110,125],"present":[33],"within":[34],"their":[35],"network.":[37,62],"To":[38],"a":[46,61,120],"vulnerability":[48],"exploited,":[50],"it":[51],"fundamentally":[53],"important":[54],"know":[56],"the":[57,129],"ongoing":[58,116],"tasks":[59],"in":[60],"A":[63],"particular":[64],"task":[65],"may":[66],"depend":[67],"on":[68,90],"multiple":[69],"services,":[71],"spanning":[72],"many":[73],"devices.":[75],"Unfortunately,":[76],"dependency":[77],"details":[78],"often":[80],"not":[81],"documented":[82],"difficult":[85],"discover":[87],"relying":[89],"human":[91],"expert":[92],"knowledge.":[93],"monitored":[95],"networks":[96],"huge":[97],"amounts":[98],"data":[100,106,121,133],"available":[102],"applying":[105,132],"mining":[107,122,134],"techniques,":[108],"we":[109,124],"able":[111],"extract":[113],"information":[114],"activities.":[118],"From":[119],"perspective,":[123],"interested":[126],"test":[128],"potential":[130],"techniques":[135],"real-life":[137],"applications.":[138]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2017-06-09T00:00:00"}
