{"id":"https://openalex.org/W4200407332","doi":"https://doi.org/10.3390/informatics8040086","title":"Searching Deterministic Chaotic Properties in System-Wide Vulnerability Datasets","display_name":"Searching Deterministic Chaotic Properties in System-Wide Vulnerability Datasets","publication_year":2021,"publication_date":"2021-12-04","ids":{"openalex":"https://openalex.org/W4200407332","doi":"https://doi.org/10.3390/informatics8040086"},"language":"en","primary_location":{"id":"doi:10.3390/informatics8040086","is_oa":true,"landing_page_url":"https://doi.org/10.3390/informatics8040086","pdf_url":"https://www.mdpi.com/2227-9709/8/4/86/pdf?version=1638772553","source":{"id":"https://openalex.org/S2738238905","display_name":"Informatics","issn_l":"2227-9709","issn":["2227-9709"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2227-9709/8/4/86/pdf?version=1638772553","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048746747","display_name":"Ioannis Tsantilis","orcid":null},"institutions":[{"id":"https://openalex.org/I154757721","display_name":"University of Piraeus","ror":"https://ror.org/02qs84g94","country_code":"GR","type":"education","lineage":["https://openalex.org/I154757721"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Ioannis Tsantilis","raw_affiliation_strings":["Department of Informatics, University of Piraeus, 80 Karaoli & Dimitriou Str., 18534 Piraeus, Greece"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Informatics, University of Piraeus, 80 Karaoli & Dimitriou Str., 18534 Piraeus, Greece","institution_ids":["https://openalex.org/I154757721"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043923219","display_name":"Thomas K. Dasaklis","orcid":"https://orcid.org/0000-0003-1240-4822"},"institutions":[{"id":"https://openalex.org/I231025917","display_name":"Hellenic Open University","ror":"https://ror.org/02kq26x23","country_code":"GR","type":"education","lineage":["https://openalex.org/I231025917"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Thomas K. Dasaklis","raw_affiliation_strings":["School of Social Sciences, Hellenic Open University, Aristotelous 18, 26335 Patra, Greece"],"raw_orcid":"https://orcid.org/0000-0003-1240-4822","affiliations":[{"raw_affiliation_string":"School of Social Sciences, Hellenic Open University, Aristotelous 18, 26335 Patra, Greece","institution_ids":["https://openalex.org/I231025917"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000463728","display_name":"Christos Douligeris","orcid":"https://orcid.org/0000-0002-6849-6693"},"institutions":[{"id":"https://openalex.org/I154757721","display_name":"University of Piraeus","ror":"https://ror.org/02qs84g94","country_code":"GR","type":"education","lineage":["https://openalex.org/I154757721"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Christos Douligeris","raw_affiliation_strings":["Department of Informatics, University of Piraeus, 80 Karaoli & Dimitriou Str., 18534 Piraeus, Greece"],"raw_orcid":"https://orcid.org/0000-0002-6849-6693","affiliations":[{"raw_affiliation_string":"Department of Informatics, University of Piraeus, 80 Karaoli & Dimitriou Str., 18534 Piraeus, Greece","institution_ids":["https://openalex.org/I154757721"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067301270","display_name":"Constantinos Patsakis","orcid":"https://orcid.org/0000-0002-4460-9331"},"institutions":[{"id":"https://openalex.org/I154757721","display_name":"University of Piraeus","ror":"https://ror.org/02qs84g94","country_code":"GR","type":"education","lineage":["https://openalex.org/I154757721"]},{"id":"https://openalex.org/I4210156054","display_name":"Athena Research and Innovation Center In Information Communication & Knowledge Technologies","ror":"https://ror.org/0576by029","country_code":"GR","type":"facility","lineage":["https://openalex.org/I4210156054"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Constantinos Patsakis","raw_affiliation_strings":["Athena Research Center, Information Management Systems Institute, Artemidos 6, 15125 Marousi, Greece","Department of Informatics, University of Piraeus, 80 Karaoli & Dimitriou Str., 18534 Piraeus, Greece"],"raw_orcid":"https://orcid.org/0000-0002-4460-9331","affiliations":[{"raw_affiliation_string":"Athena Research Center, Information Management Systems Institute, Artemidos 6, 15125 Marousi, Greece","institution_ids":["https://openalex.org/I4210156054"]},{"raw_affiliation_string":"Department of Informatics, University of Piraeus, 80 Karaoli & Dimitriou Str., 18534 Piraeus, Greece","institution_ids":["https://openalex.org/I154757721"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5043923219"],"corresponding_institution_ids":["https://openalex.org/I231025917"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.5924,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.82953171,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":"8","issue":"4","first_page":"86","last_page":"86"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11270","display_name":"Complex Systems and Time Series Analysis","score":0.9819999933242798,"subfield":{"id":"https://openalex.org/subfields/2002","display_name":"Economics and Econometrics"},"field":{"id":"https://openalex.org/fields/20","display_name":"Economics, Econometrics and Finance"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11270","display_name":"Complex Systems and Time Series Analysis","score":0.9819999933242798,"subfield":{"id":"https://openalex.org/subfields/2002","display_name":"Economics and Econometrics"},"field":{"id":"https://openalex.org/fields/20","display_name":"Economics, Econometrics and Finance"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10244","display_name":"Chaos control and synchronization","score":0.9645000100135803,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9639000296592712,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8135926723480225},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7103762030601501},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6938284039497375},{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.6736125946044922},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.6224108934402466},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.6008687615394592},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4999253749847412},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4991631507873535},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.48151978850364685},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.4271285831928253},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.32395777106285095},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.13757741451263428}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8135926723480225},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7103762030601501},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6938284039497375},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.6736125946044922},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.6224108934402466},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.6008687615394592},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4999253749847412},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4991631507873535},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.48151978850364685},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.4271285831928253},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.32395777106285095},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.13757741451263428},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3390/informatics8040086","is_oa":true,"landing_page_url":"https://doi.org/10.3390/informatics8040086","pdf_url":"https://www.mdpi.com/2227-9709/8/4/86/pdf?version=1638772553","source":{"id":"https://openalex.org/S2738238905","display_name":"Informatics","issn_l":"2227-9709","issn":["2227-9709"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Informatics","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:03cf7e0f7627479b82c808e1f4d40600","is_oa":true,"landing_page_url":"https://doaj.org/article/03cf7e0f7627479b82c808e1f4d40600","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Informatics, Vol 8, Iss 4, p 86 (2021)","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/2227-9709/8/4/86/","is_oa":true,"landing_page_url":"https://dx.doi.org/10.3390/informatics8040086","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Informatics; Volume 8; Issue 4; Pages: 86","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/informatics8040086","is_oa":true,"landing_page_url":"https://doi.org/10.3390/informatics8040086","pdf_url":"https://www.mdpi.com/2227-9709/8/4/86/pdf?version=1638772553","source":{"id":"https://openalex.org/S2738238905","display_name":"Informatics","issn_l":"2227-9709","issn":["2227-9709"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Informatics","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4200407332.pdf","grobid_xml":"https://content.openalex.org/works/W4200407332.grobid-xml"},"referenced_works_count":73,"referenced_works":["https://openalex.org/W110007310","https://openalex.org/W1532623393","https://openalex.org/W1533198000","https://openalex.org/W1967320885","https://openalex.org/W1982950099","https://openalex.org/W1985258161","https://openalex.org/W1991976434","https://openalex.org/W1995875735","https://openalex.org/W1997646511","https://openalex.org/W2000847545","https://openalex.org/W2031627503","https://openalex.org/W2067148378","https://openalex.org/W2079753286","https://openalex.org/W2080505894","https://openalex.org/W2093973026","https://openalex.org/W2094586065","https://openalex.org/W2110242776","https://openalex.org/W2113693268","https://openalex.org/W2124428761","https://openalex.org/W2126513985","https://openalex.org/W2166884436","https://openalex.org/W2267503638","https://openalex.org/W2294527681","https://openalex.org/W2516920790","https://openalex.org/W2517094600","https://openalex.org/W2535855005","https://openalex.org/W2562680154","https://openalex.org/W2564850588","https://openalex.org/W2565077509","https://openalex.org/W2607898104","https://openalex.org/W2680688782","https://openalex.org/W2762461128","https://openalex.org/W2766353519","https://openalex.org/W2767521898","https://openalex.org/W2769091037","https://openalex.org/W2789976144","https://openalex.org/W2790023090","https://openalex.org/W2801806803","https://openalex.org/W2810087036","https://openalex.org/W2885003046","https://openalex.org/W2887225043","https://openalex.org/W2890264517","https://openalex.org/W2890704507","https://openalex.org/W2897684692","https://openalex.org/W2900967578","https://openalex.org/W2902634282","https://openalex.org/W2902862587","https://openalex.org/W2905148565","https://openalex.org/W2910648321","https://openalex.org/W2911255072","https://openalex.org/W2911986485","https://openalex.org/W2912751985","https://openalex.org/W2913576447","https://openalex.org/W2925390008","https://openalex.org/W2930252879","https://openalex.org/W2938063707","https://openalex.org/W2945281596","https://openalex.org/W2955669299","https://openalex.org/W2963481239","https://openalex.org/W3045523985","https://openalex.org/W3080616619","https://openalex.org/W3119716115","https://openalex.org/W3136977726","https://openalex.org/W3155640587","https://openalex.org/W3166084532","https://openalex.org/W4230557988","https://openalex.org/W4237695172","https://openalex.org/W4246603773","https://openalex.org/W4256481255","https://openalex.org/W6631691190","https://openalex.org/W6638985884","https://openalex.org/W6648263572","https://openalex.org/W6752442712"],"related_works":["https://openalex.org/W2965876165","https://openalex.org/W2331043530","https://openalex.org/W3122267592","https://openalex.org/W2042616262","https://openalex.org/W17195039","https://openalex.org/W2779961139","https://openalex.org/W3015380456","https://openalex.org/W2053293719","https://openalex.org/W4313255991","https://openalex.org/W102412348"],"abstract_inverted_index":{"Cybersecurity":[0],"is":[1,25,118],"a":[2,145],"never-ending":[3],"battle":[4],"against":[5],"attackers,":[6],"who":[7],"try":[8],"to":[9,27,36,144,148,152],"identify":[10],"and":[11,14,50,76,99],"exploit":[12],"misconfigurations":[13],"software":[15,48,84],"vulnerabilities":[16,49,125],"before":[17],"being":[18],"patched.":[19],"In":[20],"this":[21,115,139],"ongoing":[22],"conflict,":[23],"it":[24],"important":[26],"analyse":[28],"the":[29,32,52,71,81,121],"properties":[30,107,135],"of":[31,74,114,124,132],"vulnerability":[33],"time":[34,85,126],"series":[35,86,127],"understand":[37],"when":[38],"information":[39],"systems":[40,83,95],"are":[41],"more":[42],"vulnerable.":[43],"We":[44],"study":[45,68,117],"computer":[46],"systems\u2019":[47],"probe":[51],"relevant":[53,82],"National":[54,72],"Vulnerability":[55],"Database":[56],"(NVD)":[57],"time-series":[58],"properties.":[59,90],"More":[60],"specifically,":[61],"we":[62,103],"show":[63],"through":[64],"an":[65],"extensive":[66],"experimental":[67],"based":[69,96],"on":[70,97,120],"Institute":[73],"Standards":[75],"Technology":[77],"(NIST)":[78],"database":[79],"that":[80],"present":[87],"significant":[88],"chaotic":[89,106,134],"Moreover,":[91],"by":[92,138],"defining":[93],"some":[94],"open":[98],"closed":[100],"source":[101],"software,":[102],"compare":[104],"their":[105,133,153],"resulting":[108],"in":[109],"statistical":[110],"conclusions.":[111],"The":[112,129],"contribution":[113],"novel":[116],"focused":[119],"prepossessing":[122],"stage":[123],"forecasting.":[128],"strong":[130],"evidence":[131],"as":[136],"derived":[137],"research":[140],"effort":[141],"could":[142],"lead":[143],"deeper":[146],"analysis":[147],"provide":[149],"additional":[150],"tools":[151],"forecasting":[154],"process.":[155]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
