Get quick answers to your questions about the article from our AI researcher chatbot
{'id': 'https://openalex.org/W2725876746', 'doi': 'https://doi.org/10.11648/j.awcn.20170304.11', 'title': 'Hybrid Insider Cyber Security Threats Mitigation Scheme Using ECC and Behavoural Analysis Methodology', 'display_name': 'Hybrid Insider Cyber Security Threats Mitigation Scheme Using ECC and Behavoural Analysis Methodology', 'publication_year': 2017, 'publication_date': '2017-01-01', 'ids': {'openalex': 'https://openalex.org/W2725876746', 'doi': 'https://doi.org/10.11648/j.awcn.20170304.11', 'mag': '2725876746'}, 'language': 'en', 'primary_location': {'is_oa': True, 'landing_page_url': 'https://doi.org/10.11648/j.awcn.20170304.11', 'pdf_url': 'http://article.sciencepublishinggroup.com/pdf/10.11648.j.awcn.20170304.11.pdf', 'source': {'id': 'https://openalex.org/S4210198937', 'display_name': 'Advances in Wireless Communications and Networks', 'issn_l': '2575-5951', 'issn': ['2575-5951', '2575-596X'], 'is_oa': True, 'is_in_doaj': False, 'is_core': True, 'host_organization': 'https://openalex.org/P4310319272', 'host_organization_name': 'Science Publishing Group', 'host_organization_lineage': ['https://openalex.org/P4310319272'], 'host_organization_lineage_names': ['Science Publishing Group'], 'type': 'journal'}, 'license': None, 'license_id': None, 'version': 'publishedVersion', 'is_accepted': True, 'is_published': True}, 'type': 'article', 'type_crossref': 'journal-article', 'indexed_in': ['crossref'], 'open_access': {'is_oa': True, 'oa_status': 'gold', 'oa_url': 'http://article.sciencepublishinggroup.com/pdf/10.11648.j.awcn.20170304.11.pdf', 'any_repository_has_fulltext': False}, 'authorships': [{'author_position': 'first', 'author': {'id': 'https://openalex.org/A5002241584', 'display_name': 'Stephen M. Musili', 'orcid': None}, 'institutions': [{'id': 'https://openalex.org/I26805570', 'display_name': 'Jomo Kenyatta University of Agriculture and Technology', 'ror': 'https://ror.org/015h5sy57', 'country_code': 'KE', 'type': 'education', 'lineage': ['https://openalex.org/I26805570']}], 'countries': ['KE'], 'is_corresponding': True, 'raw_author_name': 'Stephen M. Musili', 'raw_affiliation_strings': ['Department of Computing, School of Computing and Information Technology, Jomo Kenyatta University of Agriculture and Technology, Nairobi, Kenya'], 'affiliations': [{'raw_affiliation_string': 'Department of Computing, School of Computing and Information Technology, Jomo Kenyatta University of Agriculture and Technology, Nairobi, Kenya', 'institution_ids': ['https://openalex.org/I26805570']}]}], 'institution_assertions': [], 'countries_distinct_count': 1, 'institutions_distinct_count': 1, 'corresponding_author_ids': ['https://openalex.org/A5002241584'], 'corresponding_institution_ids': ['https://openalex.org/I26805570'], 'apc_list': None, 'apc_paid': None, 'fwci': 0.0, 'has_fulltext': False, 'cited_by_count': 0, 'citation_normalized_percentile': {'value': 0.0, 'is_in_top_1_percent': False, 'is_in_top_10_percent': False}, 'cited_by_percentile_year': {'min': 0, 'max': 63}, 'biblio': {'volume': '3', 'issue': '4', 'first_page': '29', 'last_page': '29'}, 'is_retracted': False, 'is_paratext': False, 'primary_topic': {'id': 'https://openalex.org/T10734', 'display_name': 'Information and Cyber Security', 'score': 0.9625, 'subfield': {'id': 'https://openalex.org/subfields/1710', 'display_name': 'Information Systems'}, 'field': {'id': 'https://openalex.org/fields/17', 'display_name': 'Computer Science'}, 'domain': {'id': 'https://openalex.org/domains/3', 'display_name': 'Physical Sciences'}}, 'topics': [{'id': 'https://openalex.org/T10734', 'display_name': 'Information and Cyber Security', 'score': 0.9625, 'subfield': {'id': 'https://openalex.org/subfields/1710', 'display_name': 'Information Systems'}, 'field': {'id': 'https://openalex.org/fields/17', 'display_name': 'Computer Science'}, 'domain': {'id': 'https://openalex.org/domains/3', 'display_name': 'Physical Sciences'}}, {'id': 'https://openalex.org/T11005', 'display_name': 'Radiation Effects in Electronics', 'score': 0.9562, 'subfield': {'id': 'https://openalex.org/subfields/2208', 'display_name': 'Electrical and Electronic Engineering'}, 'field': {'id': 'https://openalex.org/fields/22', 'display_name': 'Engineering'}, 'domain': {'id': 'https://openalex.org/domains/3', 'display_name': 'Physical Sciences'}}, {'id': 'https://openalex.org/T10951', 'display_name': 'Cryptographic Implementations and Security', 'score': 0.9257, 'subfield': {'id': 'https://openalex.org/subfields/1702', 'display_name': 'Artificial Intelligence'}, 'field': {'id': 'https://openalex.org/fields/17', 'display_name': 'Computer Science'}, 'domain': {'id': 'https://openalex.org/domains/3', 'display_name': 'Physical Sciences'}}], 'keywords': [{'id': 'https://openalex.org/keywords/insider-threat', 'display_name': 'Insider threat', 'score': 0.78998387}, {'id': 'https://openalex.org/keywords/firewall', 'display_name': 'Firewall (physics)', 'score': 0.47107047}, {'id': 'https://openalex.org/keywords/cyber-threats', 'display_name': 'Cyber threats', 'score': 0.4251481}], 'concepts': [{'id': 'https://openalex.org/C2776633304', 'wikidata': 'https://www.wikidata.org/wiki/Q6038026', 'display_name': 'Insider threat', 'level': 3, 'score': 0.78998387}, {'id': 'https://openalex.org/C38652104', 'wikidata': 'https://www.wikidata.org/wiki/Q3510521', 'display_name': 'Computer security', 'level': 1, 'score': 0.7503654}, {'id': 'https://openalex.org/C2778971194', 'wikidata': 'https://www.wikidata.org/wiki/Q1664551', 'display_name': 'Insider', 'level': 2, 'score': 0.729373}, {'id': 'https://openalex.org/C2781241145', 'wikidata': 'https://www.wikidata.org/wiki/Q204606', 'display_name': 'Cyberspace', 'level': 3, 'score': 0.512446}, {'id': 'https://openalex.org/C77714075', 'wikidata': 'https://www.wikidata.org/wiki/Q5452017', 'display_name': 'Firewall (physics)', 'level': 5, 'score': 0.47107047}, {'id': 'https://openalex.org/C144133560', 'wikidata': 'https://www.wikidata.org/wiki/Q4830453', 'display_name': 'Business', 'level': 0, 'score': 0.42827076}, {'id': 'https://openalex.org/C3018725008', 'wikidata': 'https://www.wikidata.org/wiki/Q4071928', 'display_name': 'Cyber threats', 'level': 2, 'score': 0.4251481}, {'id': 'https://openalex.org/C41008148', 'wikidata': 'https://www.wikidata.org/wiki/Q21198', 'display_name': 'Computer science', 'level': 0, 'score': 0.42255515}, {'id': 'https://openalex.org/C110875604', 'wikidata': 'https://www.wikidata.org/wiki/Q75', 'display_name': 'The Internet', 'level': 2, 'score': 0.15947428}, {'id': 'https://openalex.org/C17744445', 'wikidata': 'https://www.wikidata.org/wiki/Q36442', 'display_name': 'Political science', 'level': 0, 'score': 0.09207812}, {'id': 'https://openalex.org/C2776401274', 'wikidata': 'https://www.wikidata.org/wiki/Q3756855', 'display_name': 'Accretion (finance)', 'level': 2, 'score': 0.0}, {'id': 'https://openalex.org/C115304011', 'wikidata': 'https://www.wikidata.org/wiki/Q72755', 'display_name': 'Schwarzschild radius', 'level': 3, 'score': 0.0}, {'id': 'https://openalex.org/C10138342', 'wikidata': 'https://www.wikidata.org/wiki/Q43015', 'display_name': 'Finance', 'level': 1, 'score': 0.0}, {'id': 'https://openalex.org/C136764020', 'wikidata': 'https://www.wikidata.org/wiki/Q466', 'display_name': 'World Wide Web', 'level': 1, 'score': 0.0}, {'id': 'https://openalex.org/C199539241', 'wikidata': 'https://www.wikidata.org/wiki/Q7748', 'display_name': 'Law', 'level': 1, 'score': 0.0}, {'id': 'https://openalex.org/C183915046', 'wikidata': 'https://www.wikidata.org/wiki/Q1316152', 'display_name': 'Charged black hole', 'level': 4, 'score': 0.0}], 'mesh': [], 'locations_count': 1, 'locations': [{'is_oa': True, 'landing_page_url': 'https://doi.org/10.11648/j.awcn.20170304.11', 'pdf_url': 'http://article.sciencepublishinggroup.com/pdf/10.11648.j.awcn.20170304.11.pdf', 'source': {'id': 'https://openalex.org/S4210198937', 'display_name': 'Advances in Wireless Communications and Networks', 'issn_l': '2575-5951', 'issn': ['2575-5951', '2575-596X'], 'is_oa': True, 'is_in_doaj': False, 'is_core': True, 'host_organization': 'https://openalex.org/P4310319272', 'host_organization_name': 'Science Publishing Group', 'host_organization_lineage': ['https://openalex.org/P4310319272'], 'host_organization_lineage_names': ['Science Publishing Group'], 'type': 'journal'}, 'license': None, 'license_id': None, 'version': 'publishedVersion', 'is_accepted': True, 'is_published': True}], 'best_oa_location': {'is_oa': True, 'landing_page_url': 'https://doi.org/10.11648/j.awcn.20170304.11', 'pdf_url': 'http://article.sciencepublishinggroup.com/pdf/10.11648.j.awcn.20170304.11.pdf', 'source': {'id': 'https://openalex.org/S4210198937', 'display_name': 'Advances in Wireless Communications and Networks', 'issn_l': '2575-5951', 'issn': ['2575-5951', '2575-596X'], 'is_oa': True, 'is_in_doaj': False, 'is_core': True, 'host_organization': 'https://openalex.org/P4310319272', 'host_organization_name': 'Science Publishing Group', 'host_organization_lineage': ['https://openalex.org/P4310319272'], 'host_organization_lineage_names': ['Science Publishing Group'], 'type': 'journal'}, 'license': None, 'license_id': None, 'version': 'publishedVersion', 'is_accepted': True, 'is_published': True}, 'sustainable_development_goals': [], 'grants': [], 'datasets': [], 'versions': [], 'referenced_works_count': 4, 'referenced_works': ['https://openalex.org/W1987442832', 'https://openalex.org/W2614773713', 'https://openalex.org/W623105175', 'https://openalex.org/W91476413'], 'related_works': ['https://openalex.org/W4387194049', 'https://openalex.org/W4205304595', 'https://openalex.org/W3136170567', 'https://openalex.org/W308359497', 'https://openalex.org/W2979782961', 'https://openalex.org/W2947769183', 'https://openalex.org/W2766781562', 'https://openalex.org/W2286217954', 'https://openalex.org/W2018332730', 'https://openalex.org/W1499596878'], 'abstract_inverted_index': {'The': [0, 76, 241], 'last': [1], 'decade': [2], 'has': [3, 22], 'been': [4], 'characterized': [5], 'by': [6, 263], 'many': [7, 129, 175], 'organizations': [8, 26, 130], 'making': [9], 'it': [10, 144, 198], 'their': [11, 19, 132, 136], 'priority': [12], 'to': [13, 33, 42, 60, 73, 78, 114, 155, 229, 259], 'embrace': [14], 'digital': [15], 'technologies': [16], 'in': [17, 123, 215, 249, 288], 'running': [18], 'services.': [20], 'Cyberspace': [21], 'hugely': [23], 'dominated': [24], 'how': [25], 'use': [27, 253], 'electronics': [28], 'and': [29, 35, 49, 55, 67, 87, 104, 177, 180, 233, 267, 276], 'the': [30, 62, 68, 147, 152, 158, 168, 178, 195, 213, 235, 252, 261, 265, 279, 284, 289], 'electromagnetic': [31], 'spectrum': [32], 'manipulate,': [34], 'exchange': [36], 'data': [37, 169], 'via': [38, 139], 'interconnected': [39], 'systems.': [40, 75], 'Due': [41], 'cyber': [43, 290], 'space’s': [44], 'great': [45], 'dependence': [46], 'on': [47, 135, 245], 'informatics': [48], 'telecommunications': [50], 'for': [51], 'almost': [52], 'every': [53], 'activity': [54], 'service,': [56], 'it’s': [57], 'extremely': [58], 'catastrophic': [59], 'ignore': [61], 'growing': [63], 'phenomenon': [64], 'of': [65, 71, 102, 160, 182, 238, 254, 270, 286], 'cybercrimes': [66], 'increasing': [69], 'number': [70], 'threats': [72, 110], 'organizations’': [74], 'threat': [77, 183], 'enterprises': [79], 'from': [80, 194], 'insider': [81, 109, 148, 239], 'activities': [82], 'is': [83, 145, 170, 184, 243], 'increasing,': [84], 'getting': [85, 192], 'worse': [86], 'that': [88, 97, 108, 187, 197, 225], 'significant': [89], 'losses': [90], 'are': [91, 111], 'being': [92], 'incurred.': [93], 'ESG': [94], 'research': [95], 'indicates': [96], 'more': [98, 112], 'than': [99, 120], 'half': [100], '(54%)': [101], 'IT': [103], 'security': [105, 133, 271], 'professionals': [106], 'believe': [107], 'difficult': [113], 'detect': [115], 'or': [116, 273], 'even': [117], 'prevent': [118], 'today': [119], 'they': [121], 'were': [122], '2011': [124], '(Jon': [125], 'Oltsik,': [126], '2013).': [127], 'While': [128], 'focus': [131], 'efforts': [134], 'network': [137], 'border': [138], 'excellently': [140], 'configured': [141], 'firewall': [142], 'systems,': [143], 'actually': [146], 'who': [149], 'perhaps': [150], 'poses': [151], 'most': [153], 'risk': [154, 285], 'cyber-security.': [156], 'Even': [157], 'existence': [159], 'some': [161], 'personnel': [162], 'can': [163, 226], 'be': [164, 227], 'at': [165, 211], 'stake': [166], 'if': [167], 'leaked.': [171], 'Cyber': [172], 'Security': [173], 'takes': [174], 'forms': [176], 'range': [179], 'nature': [181], 'so': [185], 'varied': [186], 'there': [188], 'just': [189], 'isn’t': [190], 'any': [191], 'away': [193], 'fact': [196], 'will': [199, 282], 'require': [200], 'a': [201, 207, 219], 'multi-faceted': [202], 'solution.': [203], 'This': [204], 'paper': [205], 'suggests': [206], 'hybrid': [208], 'framework': [209, 242], 'aimed': [210], 'guiding': [212], 'management': [214], 'coming': [216], 'up': [217], 'with': [218, 251], 'near': [220], 'real': [221], 'time': [222], 'mitigation': [223], 'solution': [224], 'used': [228], 'mitigate': [230], '(<i>Detecting,': [231], 'Preventing': [232], 'Responding</i>)': [234], 'dynamic': [236], 'enigma': [237], 'threats.': [240], 'based': [244], 'behavioral': [246, 268], 'variation': [247], 'analysis': [248], 'conjunction': [250], 'technical': [255], 'techniques.': [256], 'We': [257], 'tried': [258], 'change': [260], 'landscape': [262], 'adding': [264], 'technological': [266], 'equivalent': [269], 'cameras': [272], 'additional': [274], 'lighting,': [275], 'see': [277], 'whether': [278], 'resulting': [280], 'uncertainty': [281], 'eradicate': [283], 'attack': [287], 'space.': [291]}, 'cited_by_api_url': 'https://api.openalex.org/works?filter=cites:W2725876746', 'counts_by_year': [], 'updated_date': '2024-12-11T14:44:53.663857', 'created_date': '2017-07-14'}