{"id":"https://openalex.org/W2512303144","doi":"https://doi.org/10.5220/0006016801110120","title":"An Architecture for Securing Communications in Critical Infrastructure","display_name":"An Architecture for Securing Communications in Critical Infrastructure","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W2512303144","doi":"https://doi.org/10.5220/0006016801110120","mag":"2512303144"},"language":"en","primary_location":{"id":"doi:10.5220/0006016801110120","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0006016801110120","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 13th International Joint Conference on e-Business and Telecommunications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0006016801110120","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079097534","display_name":"Christian Callegari","orcid":"https://orcid.org/0000-0001-7323-8069"},"institutions":[{"id":"https://openalex.org/I4210099310","display_name":"Consorzio Nazionale Interuniversitario per le Telecomunicazioni","ror":"https://ror.org/0182a5n39","country_code":"IT","type":"funder","lineage":["https://openalex.org/I4210099310"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Christian Callegari","raw_affiliation_strings":["RaSS National Laboratory and CNIT, Italy"],"affiliations":[{"raw_affiliation_string":"RaSS National Laboratory and CNIT, Italy","institution_ids":["https://openalex.org/I4210099310"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053264051","display_name":"Alessandro Cantelli\u2010Forti","orcid":"https://orcid.org/0000-0002-6943-2632"},"institutions":[{"id":"https://openalex.org/I4210099310","display_name":"Consorzio Nazionale Interuniversitario per le Telecomunicazioni","ror":"https://ror.org/0182a5n39","country_code":"IT","type":"funder","lineage":["https://openalex.org/I4210099310"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Alessandro Cantelli Forti","raw_affiliation_strings":["RaSS National Laboratory and CNIT, Italy"],"affiliations":[{"raw_affiliation_string":"RaSS National Laboratory and CNIT, Italy","institution_ids":["https://openalex.org/I4210099310"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089121039","display_name":"G. D\u2019Amore","orcid":null},"institutions":[{"id":"https://openalex.org/I4210114815","display_name":"Vitrociset (Italy)","ror":"https://ror.org/01ezk0q28","country_code":"IT","type":"company","lineage":["https://openalex.org/I4210114815"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Giuseppe D'Amore","raw_affiliation_strings":["Vitrociset S.p.A., Italy"],"affiliations":[{"raw_affiliation_string":"Vitrociset S.p.A., Italy","institution_ids":["https://openalex.org/I4210114815"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037202263","display_name":"Enrique de la Hoz","orcid":"https://orcid.org/0000-0003-4837-3837"},"institutions":[{"id":"https://openalex.org/I189268942","display_name":"Universidad de Alcal\u00e1","ror":"https://ror.org/04pmn0e78","country_code":"ES","type":"education","lineage":["https://openalex.org/I189268942"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Enrique de la Hoz","raw_affiliation_strings":["University of Alcala, Spain"],"affiliations":[{"raw_affiliation_string":"University of Alcala, Spain","institution_ids":["https://openalex.org/I189268942"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014055712","display_name":"David Echarri Santamaria","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"David Echarri Santamaria","raw_affiliation_strings":["Oesia Network, Spain"],"affiliations":[{"raw_affiliation_string":"Oesia Network, Spain","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063948883","display_name":"Iv\u00e1n Garc\u00eda-Ferreira","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ivan Garc\u00eda-Ferreira","raw_affiliation_strings":["Oesia Network, Spain"],"affiliations":[{"raw_affiliation_string":"Oesia Network, Spain","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028831361","display_name":"German L\u00f3pez-Civera","orcid":null},"institutions":[{"id":"https://openalex.org/I189268942","display_name":"Universidad de Alcal\u00e1","ror":"https://ror.org/04pmn0e78","country_code":"ES","type":"education","lineage":["https://openalex.org/I189268942"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"German L\u00f3pez-Civera","raw_affiliation_strings":["University of Alcala, Spain"],"affiliations":[{"raw_affiliation_string":"University of Alcala, Spain","institution_ids":["https://openalex.org/I189268942"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5079097534"],"corresponding_institution_ids":["https://openalex.org/I4210099310"],"apc_list":null,"apc_paid":null,"fwci":0.2953,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.64731292,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"111","last_page":"120"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.7325015664100647},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6818879246711731},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.6650233864784241},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6398810744285583},{"id":"https://openalex.org/keywords/critical-infrastructure-protection","display_name":"Critical infrastructure protection","score":0.5749919414520264},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5064986944198608},{"id":"https://openalex.org/keywords/enterprise-information-security-architecture","display_name":"Enterprise information security architecture","score":0.41330623626708984},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.34111958742141724},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.19430911540985107}],"concepts":[{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.7325015664100647},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6818879246711731},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.6650233864784241},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6398810744285583},{"id":"https://openalex.org/C2779033394","wikidata":"https://www.wikidata.org/wiki/Q5186733","display_name":"Critical infrastructure protection","level":3,"score":0.5749919414520264},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5064986944198608},{"id":"https://openalex.org/C31139447","wikidata":"https://www.wikidata.org/wiki/Q5380386","display_name":"Enterprise information security architecture","level":2,"score":0.41330623626708984},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.34111958742141724},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.19430911540985107},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.5220/0006016801110120","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0006016801110120","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 13th International Joint Conference on e-Business and Telecommunications","raw_type":"proceedings-article"},{"id":"pmh:oai:ebuah.uah.es:10017/28743","is_oa":true,"landing_page_url":"http://hdl.handle.net/10017/28743","pdf_url":"https://ebuah.uah.es/dspace/bitstream/10017/28743/3/An_architecture_ICTE_2016.pdf","source":{"id":"https://openalex.org/S7407055200","display_name":"e_Buah","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-sa","license_id":"https://openalex.org/licenses/cc-by-nc-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"conference output"}],"best_oa_location":{"id":"doi:10.5220/0006016801110120","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0006016801110120","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 13th International Joint Conference on e-Business and Telecommunications","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6200000047683716}],"awards":[{"id":"https://openalex.org/G645663373","display_name":null,"funder_award_id":"7th Framework","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G7594588034","display_name":"Multitech SeCurity system for intercOnnected space control groUnd staTions","funder_award_id":"607019","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2085358621","https://openalex.org/W3045199176","https://openalex.org/W4386971846","https://openalex.org/W3004302778","https://openalex.org/W2184280487","https://openalex.org/W578380379","https://openalex.org/W3047124310","https://openalex.org/W4386959929","https://openalex.org/W3128859700","https://openalex.org/W2604003881"],"abstract_inverted_index":{"7th":[0],"International":[1],"Conference":[2],"on":[3],"Data":[4],"Communication":[5],"Networking":[6],"-":[7],"DCNET":[8],"2016,":[9],",":[10],"26/07/2016-28/07/2016,":[11],"Lisboa,":[12],"Portugal":[13]},"counts_by_year":[{"year":2018,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
