{"id":"https://openalex.org/W2909425896","doi":"https://doi.org/10.3390/fi11020044","title":"BlackWatch: Increasing Attack Awareness within Web Applications","display_name":"BlackWatch: Increasing Attack Awareness within Web Applications","publication_year":2019,"publication_date":"2019-02-15","ids":{"openalex":"https://openalex.org/W2909425896","doi":"https://doi.org/10.3390/fi11020044","mag":"2909425896"},"language":"en","primary_location":{"id":"doi:10.3390/fi11020044","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi11020044","pdf_url":"https://www.mdpi.com/1999-5903/11/2/44/pdf?version=1550225369","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1999-5903/11/2/44/pdf?version=1550225369","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102318867","display_name":"C. Michael Hall","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Calum Hall","raw_affiliation_strings":["MWR InfoSecurity, London SE1 3RS, UK"],"affiliations":[{"raw_affiliation_string":"MWR InfoSecurity, London SE1 3RS, UK","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046848175","display_name":"Lynsay A. Shepherd","orcid":"https://orcid.org/0000-0002-1082-1174"},"institutions":[{"id":"https://openalex.org/I877506347","display_name":"Abertay University","ror":"https://ror.org/04mwwnx67","country_code":"GB","type":"education","lineage":["https://openalex.org/I877506347"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Lynsay Shepherd","raw_affiliation_strings":["School of Design and Informatics, Abertay University, Dundee DD1 1HG, UK"],"affiliations":[{"raw_affiliation_string":"School of Design and Informatics, Abertay University, Dundee DD1 1HG, UK","institution_ids":["https://openalex.org/I877506347"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045795185","display_name":"Natalie Coull","orcid":"https://orcid.org/0000-0003-0681-9888"},"institutions":[{"id":"https://openalex.org/I877506347","display_name":"Abertay University","ror":"https://ror.org/04mwwnx67","country_code":"GB","type":"education","lineage":["https://openalex.org/I877506347"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Natalie Coull","raw_affiliation_strings":["School of Design and Informatics, Abertay University, Dundee DD1 1HG, UK"],"affiliations":[{"raw_affiliation_string":"School of Design and Informatics, Abertay University, Dundee DD1 1HG, UK","institution_ids":["https://openalex.org/I877506347"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5046848175"],"corresponding_institution_ids":["https://openalex.org/I877506347"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":0.8348,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.7152596,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"11","issue":"2","first_page":"44","last_page":"44"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.984499990940094,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.983299970626831,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8535587787628174},{"id":"https://openalex.org/keywords/web-application-security","display_name":"Web application security","score":0.7348995208740234},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6216117739677429},{"id":"https://openalex.org/keywords/web-application","display_name":"Web application","score":0.5612831115722656},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.5376800894737244},{"id":"https://openalex.org/keywords/web-service","display_name":"Web service","score":0.4505196809768677},{"id":"https://openalex.org/keywords/web-development","display_name":"Web development","score":0.4353817105293274}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8535587787628174},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.7348995208740234},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6216117739677429},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.5612831115722656},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5376800894737244},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.4505196809768677},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.4353817105293274}],"mesh":[],"locations_count":6,"locations":[{"id":"doi:10.3390/fi11020044","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi11020044","pdf_url":"https://www.mdpi.com/1999-5903/11/2/44/pdf?version=1550225369","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},{"id":"pmh:oai:rke.abertay.ac.uk:openaire_cris_publications/75a40613-7f03-47bc-b20b-ef62f91ad09f","is_oa":true,"landing_page_url":"https://rke.abertay.ac.uk/en/publications/75a40613-7f03-47bc-b20b-ef62f91ad09f","pdf_url":null,"source":{"id":"https://openalex.org/S4306402526","display_name":"Abertay Research Portal (Abertay University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I877506347","host_organization_name":"Abertay University","host_organization_lineage":["https://openalex.org/I877506347"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"Hall , C C , Shepherd , L A &amp; Coull , N 2019 , ' BlackWatch : increasing attack awareness within web applications ' , Future Internet , vol. 11 , no. 2 , 44 . https://doi.org/10.3390/fi11020044","raw_type":"article"},{"id":"pmh:oai:arXiv.org:1901.04243","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1901.04243","pdf_url":"https://arxiv.org/pdf/1901.04243","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:RePEc:gam:jftint:v:11:y:2019:i:2:p:44-:d:206220","is_oa":false,"landing_page_url":"https://www.mdpi.com/1999-5903/11/2/44/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},{"id":"pmh:oai:doaj.org/article:90ab7197db974832830fdb8c6cdea58c","is_oa":true,"landing_page_url":"https://doaj.org/article/90ab7197db974832830fdb8c6cdea58c","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Future Internet, Vol 11, Iss 2, p 44 (2019)","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/1999-5903/11/2/44/","is_oa":true,"landing_page_url":"http://dx.doi.org/10.3390/fi11020044","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Future Internet","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/fi11020044","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi11020044","pdf_url":"https://www.mdpi.com/1999-5903/11/2/44/pdf?version=1550225369","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7699999809265137}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2909425896.pdf","grobid_xml":"https://content.openalex.org/works/W2909425896.grobid-xml"},"referenced_works_count":18,"referenced_works":["https://openalex.org/W406696335","https://openalex.org/W1505159507","https://openalex.org/W1514346788","https://openalex.org/W2003662123","https://openalex.org/W2057450999","https://openalex.org/W2065461065","https://openalex.org/W2116010854","https://openalex.org/W2209527820","https://openalex.org/W2314987672","https://openalex.org/W2405318205","https://openalex.org/W2555855703","https://openalex.org/W2613124126","https://openalex.org/W2794656545","https://openalex.org/W2798733577","https://openalex.org/W2806222646","https://openalex.org/W2809183419","https://openalex.org/W2888915331","https://openalex.org/W6666689337"],"related_works":["https://openalex.org/W2139596909","https://openalex.org/W2156201195","https://openalex.org/W3139770152","https://openalex.org/W2913452075","https://openalex.org/W2064213895","https://openalex.org/W178471791","https://openalex.org/W2613374639","https://openalex.org/W1988556654","https://openalex.org/W1967778478","https://openalex.org/W4313139008"],"abstract_inverted_index":{"Web":[0],"applications":[1,16,27,69,107],"are":[2],"relied":[3],"upon":[4],"by":[5,97],"many":[6],"for":[7,193],"the":[8,31,43,71,103,128,149,189],"services":[9],"they":[10],"provide.":[11],"It":[12],"is":[13,38,66,114],"essential":[14,40],"that":[15],"implement":[17,49],"appropriate":[18],"security":[19,23,44,96],"measures":[20],"to":[21,61,73,82,92,179,187],"prevent":[22],"incidents.":[24],"Currently,":[25],"web":[26,57,94,106,125,144],"focus":[28],"resources":[29],"towards":[30],"preventative":[32],"side":[33],"of":[34,42,52,105,130,134],"security.":[35],"While":[36],"prevention":[37],"an":[39,64,80],"part":[41],"process,":[45],"developers":[46,171],"must":[47],"also":[48],"a":[50,115,152],"level":[51],"attack":[53,65],"awareness":[54],"into":[55,181],"their":[56,87],"applications.":[58,183],"Being":[59],"able":[60],"detect":[62],"when":[63],"occurring":[67,122],"provides":[68],"with":[70,127,142,170],"ability":[72],"execute":[74],"responses":[75],"against":[76],"malicious":[77,99,132],"users":[78],"in":[79],"attempt":[81],"slow":[83],"down":[84],"or":[85],"deter":[86],"attacks.":[88],"This":[89,136],"research":[90],"seeks":[91,186],"improve":[93],"application":[95,117,145],"identifying":[98,131],"behavior":[100],"from":[101,151,161],"within":[102,123],"context":[104],"using":[108],"our":[109],"tool":[110,113],"BlackWatch.":[111],"The":[112],"Python-based":[116],"which":[118],"analyzes":[119],"suspicious":[120],"events":[121],"client":[124],"applications,":[126],"objective":[129],"patterns":[133],"behavior.":[135],"approach":[137],"avoids":[138],"issues":[139],"typically":[140],"encountered":[141],"traditional":[143],"firewalls.":[146],"Based":[147],"on":[148],"results":[150],"preliminary":[153],"study,":[154],"BlackWatch":[155,173,190],"was":[156,174,177],"effective":[157],"at":[158],"detecting":[159],"attacks":[160],"both":[162],"authenticated":[163],"and":[164,176],"unauthenticated":[165],"users.":[166],"Furthermore,":[167],"user":[168],"tests":[169],"indicated":[172],"user-friendly,":[175],"easy":[178],"integrate":[180],"existing":[182],"Future":[184],"work":[185],"develop":[188],"solution":[191],"further":[192],"public":[194],"release.":[195]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
