Get quick answers to your questions about the article from our AI researcher chatbot
{'id': 'https://openalex.org/W2595776489', 'doi': None, 'title': 'DOI: 10.12948/issn14531305/20.3.2016.02 Secure Threat Information Exchange across the Internet of Things for Cyber Defense in a Fog Computing Environment', 'display_name': 'DOI: 10.12948/issn14531305/20.3.2016.02 Secure Threat Information Exchange across the Internet of Things for Cyber Defense in a Fog Computing Environment', 'publication_year': 2016, 'publication_date': '2016-07-01', 'ids': {'openalex': 'https://openalex.org/W2595776489', 'mag': '2595776489'}, 'language': 'en', 'primary_location': {'is_oa': False, 'landing_page_url': 'https://www.questia.com/library/journal/1P3-4313608641/doi-10-12948-issn14531305-20-3-2016-02-secure-threat', 'pdf_url': None, 'source': {'id': 'https://openalex.org/S4306513246', 'display_name': 'Informatica Economica', 'issn_l': None, 'issn': None, 'is_oa': False, 'is_in_doaj': False, 'is_core': False, 'host_organization': None, 'host_organization_name': None, 'host_organization_lineage': [], 'host_organization_lineage_names': [], 'type': 'journal'}, 'license': None, 'license_id': None, 'version': None, 'is_accepted': False, 'is_published': False}, 'type': 'article', 'type_crossref': 'journal-article', 'indexed_in': [], 'open_access': {'is_oa': False, 'oa_status': 'closed', 'oa_url': None, 'any_repository_has_fulltext': False}, 'authorships': [{'author_position': 'first', 'author': {'id': 'https://openalex.org/A5059774367', 'display_name': 'Mihai-Gabriel Ionita', 'orcid': None}, 'institutions': [], 'countries': [], 'is_corresponding': False, 'raw_author_name': 'Mihai-Gabriel Ionita', 'raw_affiliation_strings': [], 'affiliations': []}, {'author_position': 'last', 'author': {'id': 'https://openalex.org/A5050059947', 'display_name': 'Victor-Valeriu Patriciu', 'orcid': None}, 'institutions': [], 'countries': [], 'is_corresponding': False, 'raw_author_name': 'Victor-Valeriu Patriciu', 'raw_affiliation_strings': [], 'affiliations': []}], 'institution_assertions': [], 'countries_distinct_count': 0, 'institutions_distinct_count': 0, 'corresponding_author_ids': [], 'corresponding_institution_ids': [], 'apc_list': None, 'apc_paid': None, 'fwci': 0.0, 'has_fulltext': False, 'cited_by_count': 0, 'citation_normalized_percentile': {'value': 0.0, 'is_in_top_1_percent': False, 'is_in_top_10_percent': False}, 'cited_by_percentile_year': {'min': 0, 'max': 66}, 'biblio': {'volume': '20', 'issue': '3', 'first_page': '16', 'last_page': None}, 'is_retracted': False, 'is_paratext': False, 'primary_topic': {'id': 'https://openalex.org/T10400', 'display_name': 'Network Security and Intrusion Detection', 'score': 0.9335, 'subfield': {'id': 'https://openalex.org/subfields/1705', 'display_name': 'Computer Networks and Communications'}, 'field': {'id': 'https://openalex.org/fields/17', 'display_name': 'Computer Science'}, 'domain': {'id': 'https://openalex.org/domains/3', 'display_name': 'Physical Sciences'}}, 'topics': [{'id': 'https://openalex.org/T10400', 'display_name': 'Network Security and Intrusion Detection', 'score': 0.9335, 'subfield': {'id': 'https://openalex.org/subfields/1705', 'display_name': 'Computer Networks and Communications'}, 'field': {'id': 'https://openalex.org/fields/17', 'display_name': 'Computer Science'}, 'domain': {'id': 'https://openalex.org/domains/3', 'display_name': 'Physical Sciences'}}, {'id': 'https://openalex.org/T10734', 'display_name': 'Information and Cyber Security', 'score': 0.9328, 'subfield': {'id': 'https://openalex.org/subfields/1710', 'display_name': 'Information Systems'}, 'field': {'id': 'https://openalex.org/fields/17', 'display_name': 'Computer Science'}, 'domain': {'id': 'https://openalex.org/domains/3', 'display_name': 'Physical Sciences'}}], 'keywords': [{'id': 'https://openalex.org/keywords/cyber-attack', 'display_name': 'Cyber-attack', 'score': 0.5181305}, {'id': 'https://openalex.org/keywords/information-exchange', 'display_name': 'Information exchange', 'score': 0.5056937}, {'id': 'https://openalex.org/keywords/vulnerability', 'display_name': 'Vulnerability', 'score': 0.46066797}, {'id': 'https://openalex.org/keywords/information-sharing', 'display_name': 'Information Sharing', 'score': 0.44435474}, {'id': 'https://openalex.org/keywords/information-security-management', 'display_name': 'Information security management', 'score': 0.44160742}], 'concepts': [{'id': 'https://openalex.org/C38652104', 'wikidata': 'https://www.wikidata.org/wiki/Q3510521', 'display_name': 'Computer security', 'level': 1, 'score': 0.83699834}, {'id': 'https://openalex.org/C41008148', 'wikidata': 'https://www.wikidata.org/wiki/Q21198', 'display_name': 'Computer science', 'level': 0, 'score': 0.6411479}, {'id': 'https://openalex.org/C201307755', 'wikidata': 'https://www.wikidata.org/wiki/Q4071928', 'display_name': 'Cyber-attack', 'level': 2, 'score': 0.5181305}, {'id': 'https://openalex.org/C189693848', 'wikidata': 'https://www.wikidata.org/wiki/Q6031064', 'display_name': 'Information exchange', 'level': 2, 'score': 0.5056937}, {'id': 'https://openalex.org/C2779343474', 'wikidata': 'https://www.wikidata.org/wiki/Q3109175', 'display_name': 'Context (archaeology)', 'level': 2, 'score': 0.50088286}, {'id': 'https://openalex.org/C2779662365', 'wikidata': 'https://www.wikidata.org/wiki/Q5416694', 'display_name': 'Event (particle physics)', 'level': 2, 'score': 0.48938698}, {'id': 'https://openalex.org/C527648132', 'wikidata': 'https://www.wikidata.org/wiki/Q189900', 'display_name': 'Information security', 'level': 2, 'score': 0.47854763}, {'id': 'https://openalex.org/C95713431', 'wikidata': 'https://www.wikidata.org/wiki/Q631425', 'display_name': 'Vulnerability (computing)', 'level': 2, 'score': 0.46066797}, {'id': 'https://openalex.org/C2776854237', 'wikidata': 'https://www.wikidata.org/wiki/Q6031064', 'display_name': 'Information sharing', 'level': 2, 'score': 0.44435474}, {'id': 'https://openalex.org/C148976360', 'wikidata': 'https://www.wikidata.org/wiki/Q1662500', 'display_name': 'Information security management', 'level': 5, 'score': 0.44160742}, {'id': 'https://openalex.org/C110875604', 'wikidata': 'https://www.wikidata.org/wiki/Q75', 'display_name': 'The Internet', 'level': 2, 'score': 0.4231542}, {'id': 'https://openalex.org/C108827166', 'wikidata': 'https://www.wikidata.org/wiki/Q175975', 'display_name': 'Internet privacy', 'level': 1, 'score': 0.3268528}, {'id': 'https://openalex.org/C103377522', 'wikidata': 'https://www.wikidata.org/wiki/Q3493999', 'display_name': 'Security information and event management', 'level': 4, 'score': 0.31109527}, {'id': 'https://openalex.org/C79974875', 'wikidata': 'https://www.wikidata.org/wiki/Q483639', 'display_name': 'Cloud computing', 'level': 2, 'score': 0.30734932}, {'id': 'https://openalex.org/C184842701', 'wikidata': 'https://www.wikidata.org/wiki/Q370563', 'display_name': 'Cloud computing security', 'level': 3, 'score': 0.25661218}, {'id': 'https://openalex.org/C136764020', 'wikidata': 'https://www.wikidata.org/wiki/Q466', 'display_name': 'World Wide Web', 'level': 1, 'score': 0.17454803}, {'id': 'https://openalex.org/C76155785', 'wikidata': 'https://www.wikidata.org/wiki/Q418', 'display_name': 'Telecommunications', 'level': 1, 'score': 0.09358314}, {'id': 'https://openalex.org/C151730666', 'wikidata': 'https://www.wikidata.org/wiki/Q7205', 'display_name': 'Paleontology', 'level': 1, 'score': 0.0}, {'id': 'https://openalex.org/C121332964', 'wikidata': 'https://www.wikidata.org/wiki/Q413', 'display_name': 'Physics', 'level': 0, 'score': 0.0}, {'id': 'https://openalex.org/C62520636', 'wikidata': 'https://www.wikidata.org/wiki/Q944', 'display_name': 'Quantum mechanics', 'level': 1, 'score': 0.0}, {'id': 'https://openalex.org/C86803240', 'wikidata': 'https://www.wikidata.org/wiki/Q420', 'display_name': 'Biology', 'level': 0, 'score': 0.0}, {'id': 'https://openalex.org/C111919701', 'wikidata': 'https://www.wikidata.org/wiki/Q9135', 'display_name': 'Operating system', 'level': 1, 'score': 0.0}], 'mesh': [], 'locations_count': 1, 'locations': [{'is_oa': False, 'landing_page_url': 'https://www.questia.com/library/journal/1P3-4313608641/doi-10-12948-issn14531305-20-3-2016-02-secure-threat', 'pdf_url': None, 'source': {'id': 'https://openalex.org/S4306513246', 'display_name': 'Informatica Economica', 'issn_l': None, 'issn': None, 'is_oa': False, 'is_in_doaj': False, 'is_core': False, 'host_organization': None, 'host_organization_name': None, 'host_organization_lineage': [], 'host_organization_lineage_names': [], 'type': 'journal'}, 'license': None, 'license_id': None, 'version': None, 'is_accepted': False, 'is_published': False}], 'best_oa_location': None, 'sustainable_development_goals': [{'score': 0.44, 'id': 'https://metadata.un.org/sdg/16', 'display_name': 'Peace, justice, and strong institutions'}], 'grants': [], 'datasets': [], 'versions': [], 'referenced_works_count': 0, 'referenced_works': [], 'related_works': ['https://openalex.org/W378429311', 'https://openalex.org/W3185447205', 'https://openalex.org/W3159267980', 'https://openalex.org/W3157295170', 'https://openalex.org/W3153326466', 'https://openalex.org/W2924676962', 'https://openalex.org/W2913312968', 'https://openalex.org/W2898468158', 'https://openalex.org/W2725876746', 'https://openalex.org/W2610866856', 'https://openalex.org/W2473633013', 'https://openalex.org/W2388436028', 'https://openalex.org/W2338264035', 'https://openalex.org/W2182451291', 'https://openalex.org/W2182222530', 'https://openalex.org/W2156056566', 'https://openalex.org/W2146156788', 'https://openalex.org/W2041787810', 'https://openalex.org/W1552635155', 'https://openalex.org/W1488223416'], 'abstract_inverted_index': {'1': [0], 'IntroductionThe': [1], 'paper': [2, 152], 'tackles': [3], 'one': [4], 'of': [5, 10, 139, 169, 197, 205, 239, 258, 268, 279, 428, 435, 452, 461, 465, 469, 474, 488, 498, 514, 523, 560], 'the': [6, 46, 98, 136, 150, 191, 198, 207, 225, 234, 240, 266, 269, 285, 296, 312, 318, 331, 369, 420, 426, 433, 459, 466, 475, 480, 492, 499, 566, 576, 587, 609], 'most': [7], 'important': [8, 107, 456], 'fields': [9, 559], 'cyber': [11, 128, 200, 373, 444], 'security.': [12], 'The': [13, 146, 277, 472, 517], 'following': [14], 'analysis': [15], 'concerns': [16], 'threat': [17, 157, 364, 502], 'information': [18, 21, 50, 143, 170, 211, 231, 430, 441, 525, 553, 574, 604], 'exchange.': [19], 'Without': [20], 'exchange': [22, 503], 'a': [23, 35, 80, 93, 111, 167, 172, 182, 323, 356, 399, 415, 505, 520], 'cyber-security': [24, 243], "system's": [25], 'functionality': [26], 'is': [27, 51, 90, 104, 118, 153, 203, 212, 221, 288, 337, 396, 414, 425, 458, 477, 487, 513], 'severely': [28], 'hampered.': [29], 'An': [30], 'event': [31, 95, 429], 'might': [32, 62], 'not': [33, 540, 598], 'trigger': [34], 'specific': [36, 65], 'danger': [37], 'threshold': [38, 66], 'if': [39, 49], 'attacks': [40, 260], 'are': [41, 255, 528, 532, 580], 'stealthy': [42], 'and': [43, 53, 67, 108, 123, 163, 214, 233, 252, 290, 302, 346, 362, 398, 432, 495, 509, 531], 'targeted.': [44], 'But': [45], 'same': [47, 137, 588], 'attack,': [48], 'gathered': [52], 'correlated': [54], 'from': [55, 100, 190, 261, 422, 557, 608], 'different': [56, 84, 161, 187, 304, 407, 443, 535], 'sources': [57], 'around': [58], 'an': [59, 70, 101, 115, 340, 563], "organization's": [60], 'network,': [61, 358], 'hit': [63, 69], 'that': [64, 92, 117, 204, 238, 594], 'also': [68, 222, 321], 'alarm': [71], 'point': [72], 'which': [73, 103, 159, 351, 418, 448, 486, 527, 537, 579], 'will': [74, 314], 'be': [75, 179, 273, 315, 541, 570, 592], 'much': [76], 'more': [77], 'visible': [78], 'to': [79, 87, 114, 272, 284, 306, 317, 382, 478, 491, 543, 554, 572, 600, 605], 'human': [81], 'operator.': [82], 'In': [83, 586], 'studies': [85], 'similar': [86], '[1]': [88], 'it': [89, 301, 590], 'demonstrated': [91], 'single': [94], 'can': [96, 178], 'make': [97], 'difference': [99], 'incident': [102, 116, 210, 552], 'categorized': [105, 119], 'as': [106, 120], 'treated': [109], 'in': [110, 135, 149, 171, 224, 311, 368, 393, 409, 454, 483, 582], 'timely': [112], 'manner,': [113], 'usual': [121], 'activity': [122], 'left': [124], 'uninvestigated.': [125], 'Information': [126], 'regarding': [127, 442], 'threats,': [129], 'when': [130], 'exchanged': [131], 'between': [132], 'entities': [133, 536, 556, 578], 'involved': [134, 581], 'field': [138, 411, 485], 'action,': [140], 'permits': [141], 'transforming': [142], 'into': [144, 295], 'intelligence.': [145], 'topic': [147], 'discussed': [148, 223], 'present': [151], 'focused': [154], 'on': [155, 339, 355], 'intelligent': [156], 'exchange,': [158], 'makes': [160], 'checks': [162], 'decisions': [164], 'before': [165], 'sending': [166], 'series': [168], 'secure': [173, 307, 511], 'manner.': [174], 'Any': [175], 'attack': [176, 603], 'detail': [177], 'used': [180, 438], 'by': [181, 534], 'third': [183], 'party': [184], 'for': [185, 216, 265, 327, 359, 439], 'exploiting': [186], 'vulnerable': [188], 'resources': [189], 'protected': [192], 'organization.': [193], 'Another': [194], 'thorny': [195], 'problem': [196, 220, 236, 417], 'current': [199, 226, 372], 'security': [201, 209, 287, 374, 445, 524, 551], 'state': [202, 262], 'standardizing': [206], 'way': [208, 286, 401], 'normalized': [213], 'packed': [215], 'transport.': [217], 'This': [218, 292, 335, 424], 'latter': [219], 'article.In': [227], 'close': [228], 'correlation': [229], 'with': [230, 330, 575], 'sharing': [232, 253, 363], 'standardization': [235, 427, 434], 'lies': [237], 'ever': [241], 'changing': [242], 'context.': [244], 'Where': [245], 'huge,': [246], 'cloud': [247], 'based,': [248], 'software': [249], 'code': [250], 'development': [251], 'platforms': [254], 'under': [256], 'Denial': [257], 'Service': [259], 'entities.': [263], 'Security': [264, 463], 'future': [267], 'internet': [270], 'has': [271], 'taken': [274], 'very': [275], 'seriously.': [276], 'Internet': [278], 'Things': [280], 'brings': [281], 'huge': [282, 416, 489], 'changes': [283], 'planned': [289], 'done.': [291], 'article': [293], 'delves': [294], 'fog': [297, 332], 'computing': [298, 333], 'paradigm': [299], 'analyzing': [300, 361], 'proposing': [303], 'ways': [305], 'end': [308], 'devices': [309], 'which,': [310], 'end,': [313], 'connected': [316], 'network.': [319], 'It': [320], 'upgrades': [322], 'currently': [324], 'implemented': [325], 'system': [326, 336], 'its': [328, 353], 'integration': [329], 'paradigm.': [334], 'based': [338], 'evolved': [341], 'micro': [342], 'distributed': [343, 530], 'Security,': [344], 'Incident': [345], 'Event': [347], 'Management': [348], '(SIEM)-like': [349], 'architecture': [350], 'bases': [352], 'intelligence': [354, 583], 'neural': [357], 'collecting,': [360], 'information.2Information': [365], 'Exchange': [366], 'Perspectives': [367], 'PresentIn': [370], "today's": [371], 'world': [375], 'evaluating': [376], 'incidents': [377], 'without': [378, 389], 'knowing': [379], 'what': [380], 'happens': [381], 'adjacent': [383], 'network': [384], 'segments,': [385], 'neighboring': [386], 'countries': [387], 'or': [388, 545], 'having': [390], 'full': [391], 'visibility': [392], 'your': [394], 'organization': [395, 447], 'unimaginable': [397], 'sure': [400], 'toward': [402], 'failure.': [403], 'There': [404], 'have': [405, 519], 'been': [406], 'initiatives': [408], 'this': [410, 484], 'but': [412], 'there': [413], 'keeps': [419], 'domain': [421], 'evolving.': [423], 'definition': [431], 'message': [436], 'format': [437], 'exchanging': [440], 'events.The': [446], 'invests': [449], 'large': [450, 521], 'amounts': [451], 'money': [453], 'any': [455], 'initiative': [457], 'Department': [460], 'Homeland': [462], '(DHS)': [464], 'United': [467], 'States': [468], 'America': [470], '(USA).': [471], 'interest': [473, 490], 'DHS': [476], 'keep': [479], 'pole': [481], 'position': [482], 'civil,': [493], 'governmental': [494, 577, 610], 'military': [496], 'institutions': [497], 'USA.': [500], 'Cyber': [501], 'through': [504], 'standardized,': [506], 'reliable,': [507], 'tested': [508], 'nonetheless': [510], 'protocol': [512], 'utmost': [515], 'importance.': [516], 'USA': [518], 'base': [522], 'collectors,': [526], 'geographically': [529], 'administered': [533], 'sometimes': [538], 'may': [539, 591], 'willing': [542], 'share': [544, 573], 'give': [546, 601], 'away': [547, 602], 'all': [548], 'their': [549], 'collected': [550], 'other': [555, 558], 'activity.': [561], 'As': [562], 'example,': [564], 'maybe': [565], 'public': [567], 'sector': [568], 'would': [569, 597], 'reluctant': [571], 'collection': [584], 'activities.': [585], 'direction,': [589], 'possible': [593], 'militarized': [595], 'structures': [596], 'want': [599], 'civil': [606], 'organizations': [607], 'hierarchy.': [611], '…': [612]}, 'cited_by_api_url': 'https://api.openalex.org/works?filter=cites:W2595776489', 'counts_by_year': [], 'updated_date': '2024-12-15T04:50:28.957561', 'created_date': '2017-03-23'}