{"id":"https://openalex.org/W4396857277","doi":"https://doi.org/10.3390/info15050273","title":"Insights into Cybercrime Detection and Response: A Review of Time Factor","display_name":"Insights into Cybercrime Detection and Response: A Review of Time Factor","publication_year":2024,"publication_date":"2024-05-12","ids":{"openalex":"https://openalex.org/W4396857277","doi":"https://doi.org/10.3390/info15050273"},"language":"en","primary_location":{"id":"doi:10.3390/info15050273","is_oa":true,"landing_page_url":"https://doi.org/10.3390/info15050273","pdf_url":"https://www.mdpi.com/2078-2489/15/5/273/pdf?version=1715649864","source":{"id":"https://openalex.org/S4210219776","display_name":"Information","issn_l":"2078-2489","issn":["2078-2489"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information","raw_type":"journal-article"},"type":"review","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2078-2489/15/5/273/pdf?version=1715649864","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081423238","display_name":"Hamed Taherdoost","orcid":"https://orcid.org/0000-0002-6503-6739"},"institutions":[{"id":"https://openalex.org/I2800893096","display_name":"Global University Systems","ror":"https://ror.org/04883df86","country_code":"GB","type":"company","lineage":["https://openalex.org/I2800893096"]},{"id":"https://openalex.org/I214977574","display_name":"University Canada West","ror":"https://ror.org/028d12s45","country_code":"CA","type":"education","lineage":["https://openalex.org/I214977574"]}],"countries":["CA","GB"],"is_corresponding":true,"raw_author_name":"Hamed Taherdoost","raw_affiliation_strings":["Department of Arts, Communications and Social Sciences, University Canada West, Vancouver, BC V6B 1V9, Canada","GUS Institute, Global University Systems, London EC1N 2LX, UK"],"affiliations":[{"raw_affiliation_string":"Department of Arts, Communications and Social Sciences, University Canada West, Vancouver, BC V6B 1V9, Canada","institution_ids":["https://openalex.org/I214977574"]},{"raw_affiliation_string":"GUS Institute, Global University Systems, London EC1N 2LX, UK","institution_ids":["https://openalex.org/I2800893096"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5081423238"],"corresponding_institution_ids":["https://openalex.org/I214977574","https://openalex.org/I2800893096"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":6.059,"has_fulltext":true,"cited_by_count":17,"citation_normalized_percentile":{"value":0.966482,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"15","issue":"5","first_page":"273","last_page":"273"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.7942609190940857},{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.7762922048568726},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7415329217910767},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7233869433403015},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6640818119049072},{"id":"https://openalex.org/keywords/identity-theft","display_name":"Identity theft","score":0.6421973705291748},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.6060440540313721},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.5673163533210754},{"id":"https://openalex.org/keywords/blacklisting","display_name":"Blacklisting","score":0.5565506815910339},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5510797500610352},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5339846611022949},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.45803168416023254},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.4508117437362671},{"id":"https://openalex.org/keywords/interoperability","display_name":"Interoperability","score":0.4355284571647644},{"id":"https://openalex.org/keywords/information-exchange","display_name":"Information exchange","score":0.413600891828537},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.22601881623268127},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.15580648183822632},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1316673457622528}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.7942609190940857},{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.7762922048568726},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7415329217910767},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7233869433403015},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6640818119049072},{"id":"https://openalex.org/C522325796","wikidata":"https://www.wikidata.org/wiki/Q471880","display_name":"Identity theft","level":2,"score":0.6421973705291748},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.6060440540313721},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.5673163533210754},{"id":"https://openalex.org/C2779797433","wikidata":"https://www.wikidata.org/wiki/Q632959","display_name":"Blacklisting","level":2,"score":0.5565506815910339},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5510797500610352},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5339846611022949},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.45803168416023254},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.4508117437362671},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.4355284571647644},{"id":"https://openalex.org/C189693848","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information exchange","level":2,"score":0.413600891828537},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.22601881623268127},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.15580648183822632},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1316673457622528},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3390/info15050273","is_oa":true,"landing_page_url":"https://doi.org/10.3390/info15050273","pdf_url":"https://www.mdpi.com/2078-2489/15/5/273/pdf?version=1715649864","source":{"id":"https://openalex.org/S4210219776","display_name":"Information","issn_l":"2078-2489","issn":["2078-2489"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information","raw_type":"journal-article"},{"id":"pmh:oai:HAL:hal-05087343v1","is_oa":true,"landing_page_url":"https://hal.science/hal-05087343","pdf_url":"https://hal.science/hal-05087343/document","source":{"id":"https://openalex.org/S4406922466","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Information, 2024, 15 (5), pp.273. &#x27E8;10.3390/info15050273&#x27E9;","raw_type":"Journal articles"},{"id":"pmh:oai:doaj.org/article:016d9fd4e02649eaab616f1d45e69820","is_oa":true,"landing_page_url":"https://doaj.org/article/016d9fd4e02649eaab616f1d45e69820","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Information, Vol 15, Iss 5, p 273 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/info15050273","is_oa":true,"landing_page_url":"https://doi.org/10.3390/info15050273","pdf_url":"https://www.mdpi.com/2078-2489/15/5/273/pdf?version=1715649864","source":{"id":"https://openalex.org/S4210219776","display_name":"Information","issn_l":"2078-2489","issn":["2078-2489"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4396857277.pdf"},"referenced_works_count":60,"referenced_works":["https://openalex.org/W2564147261","https://openalex.org/W2890953656","https://openalex.org/W2956341360","https://openalex.org/W2958285686","https://openalex.org/W2973601119","https://openalex.org/W2979928150","https://openalex.org/W3000666967","https://openalex.org/W3005678530","https://openalex.org/W3027894845","https://openalex.org/W3030593508","https://openalex.org/W3033013607","https://openalex.org/W3125947561","https://openalex.org/W3141567114","https://openalex.org/W3160635732","https://openalex.org/W3169649651","https://openalex.org/W3181734985","https://openalex.org/W3197944870","https://openalex.org/W3198335859","https://openalex.org/W3202210923","https://openalex.org/W3216127079","https://openalex.org/W4205625641","https://openalex.org/W4206713037","https://openalex.org/W4213292645","https://openalex.org/W4244161706","https://openalex.org/W4283368000","https://openalex.org/W4285133068","https://openalex.org/W4285198827","https://openalex.org/W4286489859","https://openalex.org/W4289656135","https://openalex.org/W4293570060","https://openalex.org/W4295714241","https://openalex.org/W4300772840","https://openalex.org/W4307561139","https://openalex.org/W4312058654","https://openalex.org/W4312430101","https://openalex.org/W4313164219","https://openalex.org/W4315767683","https://openalex.org/W4321214091","https://openalex.org/W4323276229","https://openalex.org/W4323833211","https://openalex.org/W4324358781","https://openalex.org/W4353004226","https://openalex.org/W4366283699","https://openalex.org/W4381250293","https://openalex.org/W4382195983","https://openalex.org/W4385471846","https://openalex.org/W4386484284","https://openalex.org/W4386496399","https://openalex.org/W4387139675","https://openalex.org/W4387341418","https://openalex.org/W4388853806","https://openalex.org/W4389485894","https://openalex.org/W4391998180","https://openalex.org/W6730901808","https://openalex.org/W6764916604","https://openalex.org/W6794645663","https://openalex.org/W6839206338","https://openalex.org/W6844995909","https://openalex.org/W6846197872","https://openalex.org/W6850406310"],"related_works":["https://openalex.org/W4281884841","https://openalex.org/W2933056782","https://openalex.org/W2012481173","https://openalex.org/W1648378477","https://openalex.org/W2043034431","https://openalex.org/W2032900633","https://openalex.org/W1593211785","https://openalex.org/W2595760708","https://openalex.org/W182956790","https://openalex.org/W2186893595"],"abstract_inverted_index":{"Amidst":[0],"an":[1],"unprecedented":[2],"period":[3],"of":[4,13,23,32,40,45,53,67,85,164],"technological":[5],"progress,":[6],"incorporating":[7],"digital":[8,56,91],"platforms":[9,69,92],"into":[10],"diverse":[11],"domains":[12],"existence":[14],"has":[15,34,62],"become":[16],"indispensable,":[17],"fundamentally":[18],"altering":[19],"the":[20,29,38,65,82,103,152,162,206,226],"operational":[21],"processes":[22],"governments,":[24],"businesses,":[25,87],"and":[26,59,78,88,97,109,127,132,136,147,157,160,176,189,198,220,231,244,268],"individuals.":[27],"Nevertheless,":[28],"swift":[30],"process":[31],"digitization":[33],"concurrently":[35],"led":[36,63],"to":[37,64,112,150,183,208,211,237,240,246],"emergence":[39],"cybercrime,":[41],"which":[42],"takes":[43],"advantage":[44],"weaknesses":[46],"in":[47,106,130,138],"interconnected":[48],"systems.":[49],"The":[50,170],"growing":[51,83],"dependence":[52,84],"society":[54],"on":[55,90,122,173],"communication,":[57,98],"commerce,":[58,96],"information":[60,94],"sharing":[61],"exploitation":[66],"these":[68,107],"by":[70],"malicious":[71,99],"actors":[72,100],"for":[73,93,167,180,228],"hacking,":[74],"identity":[75],"theft,":[76],"ransomware,":[77],"phishing":[79,128,181],"attacks.":[80],"With":[81],"organizations,":[86],"individuals":[89],"exchange,":[95],"have":[101,110,225],"identified":[102],"susceptibilities":[104],"present":[105],"systems":[108,125],"begun":[111],"exploit":[113],"them.":[114],"This":[115],"study":[116],"examines":[117],"28":[118],"research":[119,171,258],"papers":[120],"focusing":[121],"intrusion":[123],"detection":[124,129,158,175,195,229],"(IDS),":[126],"particular,":[131],"how":[133],"quickly":[134],"responses":[135],"detections":[137],"cybersecurity":[139],"may":[140],"be":[141,238],"made.":[142],"We":[143],"investigate":[144],"various":[145],"approaches":[146],"quantitative":[148],"measurements":[149],"comprehend":[151],"link":[153],"between":[154],"reaction":[155,177,232],"time":[156,159],"emphasize":[161],"necessity":[163,207],"minimizing":[165],"both":[166],"improved":[168],"cybersecurity.":[169,185],"focuses":[172],"reducing":[174],"times,":[178],"especially":[179],"attempts,":[182],"improve":[184,209],"In":[186],"smart":[187],"grids":[188],"automobile":[190],"control":[191],"networks,":[192],"faster":[193],"attack":[194],"is":[196],"important,":[197],"machine":[199],"learning":[200],"can":[201],"help.":[202],"It":[203],"also":[204],"stresses":[205],"protocols":[210],"address":[212],"increasing":[213],"cyber":[214],"risks":[215],"while":[216],"maintaining":[217],"scalability,":[218],"interoperability,":[219],"resilience.":[221],"Although":[222],"machine-learning-based":[223],"techniques":[224],"potential":[227],"precision":[230],"speed,":[233],"obstacles":[234],"still":[235],"need":[236],"addressed":[239],"attain":[241],"real-time":[242,265],"capabilities":[243],"adjust":[245],"constantly":[247],"changing":[248],"threats.":[249],"To":[250],"create":[251],"effective":[252],"defensive":[253],"mechanisms":[254],"against":[255],"cyberattacks,":[256],"future":[257],"topics":[259],"include":[260],"investigating":[261],"innovative":[262],"methodologies,":[263],"integrating":[264],"threat":[266],"intelligence,":[267],"encouraging":[269],"collaboration.":[270]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":4}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
