Get quick answers to your questions about the article from our AI researcher chatbot
{'id': 'https://openalex.org/W2779961139', 'doi': 'https://doi.org/10.4314/njt.v36i4.26', 'title': 'Zero day exploits and national readiness for cyber-warfare', 'display_name': 'Zero day exploits and national readiness for cyber-warfare', 'publication_year': 2018, 'publication_date': '2018-01-15', 'ids': {'openalex': 'https://openalex.org/W2779961139', 'doi': 'https://doi.org/10.4314/njt.v36i4.26', 'mag': '2779961139'}, 'language': 'en', 'primary_location': {'is_oa': True, 'landing_page_url': 'https://doi.org/10.4314/njt.v36i4.26', 'pdf_url': 'https://www.ajol.info/index.php/njt/article/download/164981/154477', 'source': {'id': 'https://openalex.org/S2764753315', 'display_name': 'Nigerian Journal of Technology', 'issn_l': '0331-8443', 'issn': ['0331-8443', '2467-8821'], 'is_oa': True, 'is_in_doaj': True, 'is_indexed_in_scopus': True, 'is_core': False, 'host_organization': 'https://openalex.org/P4310311022', 'host_organization_name': 'University of Nigeria', 'host_organization_lineage': ['https://openalex.org/P4310311022'], 'host_organization_lineage_names': ['University of Nigeria'], 'type': 'journal'}, 'license': 'cc-by-nc-nd', 'license_id': 'https://openalex.org/licenses/cc-by-nc-nd', 'version': 'publishedVersion', 'is_accepted': True, 'is_published': True}, 'type': 'article', 'type_crossref': 'journal-article', 'indexed_in': ['crossref'], 'open_access': {'is_oa': True, 'oa_status': 'gold', 'oa_url': 'https://www.ajol.info/index.php/njt/article/download/164981/154477', 'any_repository_has_fulltext': False}, 'authorships': [{'author_position': 'first', 'author': {'id': 'https://openalex.org/A5073639644', 'display_name': 'Ayei E. Ibor', 'orcid': 'https://orcid.org/0000-0002-4083-454X'}, 'institutions': [{'id': 'https://openalex.org/I3131845690', 'display_name': 'Cross River University of Technology', 'ror': 'https://ror.org/012w5e784', 'country_code': 'NG', 'type': 'education', 'lineage': ['https://openalex.org/I3131845690']}, {'id': 'https://openalex.org/I11892038', 'display_name': 'University of Nigeria', 'ror': 'https://ror.org/01sn1yx84', 'country_code': 'NG', 'type': 'education', 'lineage': ['https://openalex.org/I11892038']}], 'countries': ['NG'], 'is_corresponding': True, 'raw_author_name': 'A.E. Ibor', 'raw_affiliation_strings': ['Copyright© Faculty of Engineering, University of Nigeria, Nsukka,', 'DEPT. OF COMPUTER SCIENCE, CROSS RIVER UNIVERSITY OF TECHNOLOGY, CALABAR, CROSS RIVER STATE NIGERIA'], 'affiliations': [{'raw_affiliation_string': 'DEPT. OF COMPUTER SCIENCE, CROSS RIVER UNIVERSITY OF TECHNOLOGY, CALABAR, CROSS RIVER STATE NIGERIA', 'institution_ids': ['https://openalex.org/I3131845690']}, {'raw_affiliation_string': 'Copyright© Faculty of Engineering, University of Nigeria, Nsukka,', 'institution_ids': ['https://openalex.org/I11892038']}]}], 'institution_assertions': [], 'countries_distinct_count': 1, 'institutions_distinct_count': 2, 'corresponding_author_ids': ['https://openalex.org/A5073639644'], 'corresponding_institution_ids': ['https://openalex.org/I3131845690', 'https://openalex.org/I11892038'], 'apc_list': {'value': 185, 'currency': 'USD', 'value_usd': 185, 'provenance': 'doaj'}, 'apc_paid': {'value': 185, 'currency': 'USD', 'value_usd': 185, 'provenance': 'doaj'}, 'fwci': 0.155, 'has_fulltext': True, 'fulltext_origin': 'pdf', 'cited_by_count': 4, 'citation_normalized_percentile': {'value': 0.65499, 'is_in_top_1_percent': False, 'is_in_top_10_percent': False}, 'cited_by_percentile_year': {'min': 77, 'max': 79}, 'biblio': {'volume': '36', 'issue': '4', 'first_page': '1174', 'last_page': '1174'}, 'is_retracted': False, 'is_paratext': False, 'primary_topic': {'id': 'https://openalex.org/T11241', 'display_name': 'Advanced Malware Detection Techniques', 'score': 0.9983, 'subfield': {'id': 'https://openalex.org/subfields/1711', 'display_name': 'Signal Processing'}, 'field': {'id': 'https://openalex.org/fields/17', 'display_name': 'Computer Science'}, 'domain': {'id': 'https://openalex.org/domains/3', 'display_name': 'Physical Sciences'}}, 'topics': [{'id': 'https://openalex.org/T11241', 'display_name': 'Advanced Malware Detection Techniques', 'score': 0.9983, 'subfield': {'id': 'https://openalex.org/subfields/1711', 'display_name': 'Signal Processing'}, 'field': {'id': 'https://openalex.org/fields/17', 'display_name': 'Computer Science'}, 'domain': {'id': 'https://openalex.org/domains/3', 'display_name': 'Physical Sciences'}}, {'id': 'https://openalex.org/T10734', 'display_name': 'Information and Cyber Security', 'score': 0.9981, 'subfield': {'id': 'https://openalex.org/subfields/1710', 'display_name': 'Information Systems'}, 'field': {'id': 'https://openalex.org/fields/17', 'display_name': 'Computer Science'}, 'domain': {'id': 'https://openalex.org/domains/3', 'display_name': 'Physical Sciences'}}, {'id': 'https://openalex.org/T10951', 'display_name': 'Cryptographic Implementations and Security', 'score': 0.9978, 'subfield': {'id': 'https://openalex.org/subfields/1702', 'display_name': 'Artificial Intelligence'}, 'field': {'id': 'https://openalex.org/fields/17', 'display_name': 'Computer Science'}, 'domain': {'id': 'https://openalex.org/domains/3', 'display_name': 'Physical Sciences'}}], 'keywords': [{'id': 'https://openalex.org/keywords/vulnerability', 'display_name': 'Vulnerability', 'score': 0.71886986}, {'id': 'https://openalex.org/keywords/espionage', 'display_name': 'Espionage', 'score': 0.5799683}], 'concepts': [{'id': 'https://openalex.org/C165696696', 'wikidata': 'https://www.wikidata.org/wiki/Q11287', 'display_name': 'Exploit', 'level': 2, 'score': 0.9435741}, {'id': 'https://openalex.org/C38652104', 'wikidata': 'https://www.wikidata.org/wiki/Q3510521', 'display_name': 'Computer security', 'level': 1, 'score': 0.8327694}, {'id': 'https://openalex.org/C95713431', 'wikidata': 'https://www.wikidata.org/wiki/Q631425', 'display_name': 'Vulnerability (computing)', 'level': 2, 'score': 0.71886986}, {'id': 'https://openalex.org/C2781241145', 'wikidata': 'https://www.wikidata.org/wiki/Q204606', 'display_name': 'Cyberspace', 'level': 3, 'score': 0.6933596}, {'id': 'https://openalex.org/C29852176', 'wikidata': 'https://www.wikidata.org/wiki/Q373338', 'display_name': 'Critical infrastructure', 'level': 2, 'score': 0.6782818}, {'id': 'https://openalex.org/C528167355', 'wikidata': 'https://www.wikidata.org/wiki/Q258307', 'display_name': 'National security', 'level': 2, 'score': 0.65707034}, {'id': 'https://openalex.org/C558872910', 'wikidata': 'https://www.wikidata.org/wiki/Q165950', 'display_name': 'Espionage', 'level': 2, 'score': 0.5799683}, {'id': 'https://openalex.org/C105339364', 'wikidata': 'https://www.wikidata.org/wiki/Q2297740', 'display_name': 'Software deployment', 'level': 2, 'score': 0.4968002}, {'id': 'https://openalex.org/C48103436', 'wikidata': 'https://www.wikidata.org/wiki/Q599031', 'display_name': 'State (computer science)', 'level': 2, 'score': 0.4735602}, {'id': 'https://openalex.org/C41008148', 'wikidata': 'https://www.wikidata.org/wiki/Q21198', 'display_name': 'Computer science', 'level': 0, 'score': 0.41437504}, {'id': 'https://openalex.org/C144133560', 'wikidata': 'https://www.wikidata.org/wiki/Q4830453', 'display_name': 'Business', 'level': 0, 'score': 0.33541316}, {'id': 'https://openalex.org/C199539241', 'wikidata': 'https://www.wikidata.org/wiki/Q7748', 'display_name': 'Law', 'level': 1, 'score': 0.20021126}, {'id': 'https://openalex.org/C17744445', 'wikidata': 'https://www.wikidata.org/wiki/Q36442', 'display_name': 'Political science', 'level': 0, 'score': 0.16285717}, {'id': 'https://openalex.org/C110875604', 'wikidata': 'https://www.wikidata.org/wiki/Q75', 'display_name': 'The Internet', 'level': 2, 'score': 0.08561227}, {'id': 'https://openalex.org/C11413529', 'wikidata': 'https://www.wikidata.org/wiki/Q8366', 'display_name': 'Algorithm', 'level': 1, 'score': 0.0}, {'id': 'https://openalex.org/C136764020', 'wikidata': 'https://www.wikidata.org/wiki/Q466', 'display_name': 'World Wide Web', 'level': 1, 'score': 0.0}, {'id': 'https://openalex.org/C111919701', 'wikidata': 'https://www.wikidata.org/wiki/Q9135', 'display_name': 'Operating system', 'level': 1, 'score': 0.0}], 'mesh': [], 'locations_count': 1, 'locations': [{'is_oa': True, 'landing_page_url': 'https://doi.org/10.4314/njt.v36i4.26', 'pdf_url': 'https://www.ajol.info/index.php/njt/article/download/164981/154477', 'source': {'id': 'https://openalex.org/S2764753315', 'display_name': 'Nigerian Journal of Technology', 'issn_l': '0331-8443', 'issn': ['0331-8443', '2467-8821'], 'is_oa': True, 'is_in_doaj': True, 'is_indexed_in_scopus': True, 'is_core': False, 'host_organization': 'https://openalex.org/P4310311022', 'host_organization_name': 'University of Nigeria', 'host_organization_lineage': ['https://openalex.org/P4310311022'], 'host_organization_lineage_names': ['University of Nigeria'], 'type': 'journal'}, 'license': 'cc-by-nc-nd', 'license_id': 'https://openalex.org/licenses/cc-by-nc-nd', 'version': 'publishedVersion', 'is_accepted': True, 'is_published': True}], 'best_oa_location': {'is_oa': True, 'landing_page_url': 'https://doi.org/10.4314/njt.v36i4.26', 'pdf_url': 'https://www.ajol.info/index.php/njt/article/download/164981/154477', 'source': {'id': 'https://openalex.org/S2764753315', 'display_name': 'Nigerian Journal of Technology', 'issn_l': '0331-8443', 'issn': ['0331-8443', '2467-8821'], 'is_oa': True, 'is_in_doaj': True, 'is_indexed_in_scopus': True, 'is_core': False, 'host_organization': 'https://openalex.org/P4310311022', 'host_organization_name': 'University of Nigeria', 'host_organization_lineage': ['https://openalex.org/P4310311022'], 'host_organization_lineage_names': ['University of Nigeria'], 'type': 'journal'}, 'license': 'cc-by-nc-nd', 'license_id': 'https://openalex.org/licenses/cc-by-nc-nd', 'version': 'publishedVersion', 'is_accepted': True, 'is_published': True}, 'sustainable_development_goals': [{'id': 'https://metadata.un.org/sdg/16', 'display_name': 'Peace, justice, and strong institutions', 'score': 0.45}], 'grants': [], 'datasets': [], 'versions': [], 'referenced_works_count': 23, 'referenced_works': ['https://openalex.org/W110007310', 'https://openalex.org/W1489574895', 'https://openalex.org/W1565569213', 'https://openalex.org/W1966566715', 'https://openalex.org/W1972757409', 'https://openalex.org/W2028492316', 'https://openalex.org/W2044152003', 'https://openalex.org/W2058112964', 'https://openalex.org/W2065890363', 'https://openalex.org/W2100198871', 'https://openalex.org/W2108682287', 'https://openalex.org/W2117636524', 'https://openalex.org/W2157153057', 'https://openalex.org/W2514365227', 'https://openalex.org/W2592102543', 'https://openalex.org/W2614042168', 'https://openalex.org/W2614184875', 'https://openalex.org/W272502477', 'https://openalex.org/W2971018632', 'https://openalex.org/W3144390425', 'https://openalex.org/W42697507', 'https://openalex.org/W4352779', 'https://openalex.org/W61279194'], 'related_works': ['https://openalex.org/W52952196', 'https://openalex.org/W4387856047', 'https://openalex.org/W4386125109', 'https://openalex.org/W3167675181', 'https://openalex.org/W2562211673', 'https://openalex.org/W2405741346', 'https://openalex.org/W2368745349', 'https://openalex.org/W2135507518', 'https://openalex.org/W2131575257', 'https://openalex.org/W2093290584'], 'abstract_inverted_index': {'A': [0], 'zero': [1, 31, 205, 246], 'day': [2, 206], 'vulnerability': [3], 'is': [4, 18, 35, 111, 127], 'an': [5, 155, 217], 'unknown': [6], 'exploit': [7], 'that': [8, 44, 234], 'divulges': [9], 'security': [10, 77, 101, 116, 162, 237], 'flaws': [11], 'in': [12, 130, 185], 'software': [13, 121, 126], 'before': [14], 'such': [15], 'a': [16, 26, 30, 36, 46, 107, 167, 231], 'flaw': [17], 'publicly': [19], 'reported': [20], 'or': [21], 'announced.': [22], 'But': [23], 'how': [24], 'should': [25], 'nation': [27, 168], 'react': [28], 'to': [29, 149, 153], 'day?': [32], 'This': [33], 'question': [34], 'concern': [37], 'for': [38, 49, 141, 188, 216, 227], 'most': [39], 'national': [40, 165, 228, 240], 'governments,': [41], 'and': [42, 59, 69, 73, 118, 122, 134, 178, 191, 194, 208, 230], 'one': [43], 'requires': [45], 'systematic': [47], 'approach': [48], 'its': [50, 131], 'resolution.': [51], 'The': [52, 220], 'securities': [53], 'of': [54, 57, 75, 78, 87, 106, 114, 137, 144, 163, 176, 181, 204, 238], 'critical': [55, 79, 164, 239], 'infrastructure': [56, 241], 'nations': [58], 'states': [60], 'have': [61, 158], 'been': [62, 82], 'severally': [63], 'violated': [64], 'by': [65, 100, 213], 'cybercriminals.': [66], 'Nation-state': [67], 'espionage': [68], 'the': [70, 76, 84, 112, 135, 142, 161, 173, 179, 182, 186, 202, 210, 224, 236], 'possible': [71, 91], 'disruption': [72], 'circumvention': [74], 'networks': [80], 'has': [81], 'on': [83], 'increase.': [85], 'Most': [86], 'these': [88], 'violations': [89], 'are': [90, 97], 'through': [92, 172], 'detectable': [93, 108], 'operational': [94, 109], 'bypasses,': [95], 'which': [96], 'rather': [98], 'ignored': [99], 'administrators.': [102], 'One': [103], 'common': [104], 'instance': [105], 'bypass': [110], 'non-application': [113], 'periodic': [115, 138], 'updates': [117, 139], 'upgrades': [119], 'from': [120], 'hardware': [123], 'vendors.': [124], 'Every': [125], 'not': [128], 'necessarily': [129], 'final': [132], 'state,': [133], 'application': [136], 'allow': [140], 'patching': [143], 'vulnerable': [145], 'systems,': [146], 'making': [147], 'them': [148], 'be': [150, 170], 'secure': [151], 'enough': [152], 'withstand': [154], 'exploit.': [156], 'To': [157, 196], 'control': [159], 'over': [160], 'assets,': [166], 'must': [169], '"cyber-ready"': [171], 'proper': [174], 'management': [175], 'vulnerabilities': [177], 'deployment': [180], 'rightful': [183], 'technology': [184], 'cyberspace': [187], 'hunting,': [189], 'detecting': [190], 'preventing': [192], 'cyber-attacks': [193], 'espionage.': [195], 'this': [197, 199, 214], 'effect,': [198], 'paper': [200, 221], 'discusses': [201], 'implications': [203], 'exploits': [207], 'highlights': [209], 'dangers': [211], 'posed': [212], 'cankerworm': [215], 'unprepared': [218], 'nation.': [219], 'also': [222], 'adopts': [223], 'defence-in-depth': [225], 'strategy': [226], 'readiness': [229], 'foolproof': [232], 'system': [233], 'enforces': [235], 'at': [242], 'all': [243], 'levels.Keywords:': [244], 'exploits,': [245], 'day,': [247], 'vulnerability,': [248], 'cyberspace,': [249], 'cyber-warfare': [250]}, 'cited_by_api_url': 'https://api.openalex.org/works?filter=cites:W2779961139', 'counts_by_year': [{'year': 2024, 'cited_by_count': 1}, {'year': 2023, 'cited_by_count': 1}, {'year': 2022, 'cited_by_count': 1}, {'year': 2021, 'cited_by_count': 1}], 'updated_date': '2025-01-18T02:12:27.762754', 'created_date': '2018-01-05'}