{"id":"https://openalex.org/W3083766999","doi":"https://doi.org/10.1002/sam.10065","title":"Gaussian process learning for cyber\u2010attack early warning","display_name":"Gaussian process learning for cyber\u2010attack early warning","publication_year":2009,"publication_date":"2009-12-30","ids":{"openalex":"https://openalex.org/W3083766999","doi":"https://doi.org/10.1002/sam.10065","mag":"3083766999"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1002/sam.10065","pdf_url":null,"source":{"id":"https://openalex.org/S40788348","display_name":"Statistical Analysis and Data Mining The ASA Data Science Journal","issn_l":"1932-1864","issn":["1932-1864","1932-1872"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100409994","display_name":"Jian Zhang","orcid":"https://orcid.org/0000-0002-7240-3541"},"institutions":[{"id":"https://openalex.org/I121820613","display_name":"Louisiana State University","ror":"https://ror.org/05ect4e57","country_code":"US","type":"funder","lineage":["https://openalex.org/I121820613"]},{"id":"https://openalex.org/I1298353152","display_name":"SRI International","ror":"https://ror.org/05s570m15","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I1298353152"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jian Zhang","raw_affiliation_strings":["Computer Science Department, Louisiana State University, Baton Rouge, LA 70803, USA","The majority of the work was done while the author was working at SRI International."],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Louisiana State University, Baton Rouge, LA 70803, USA","institution_ids":["https://openalex.org/I121820613"]},{"raw_affiliation_string":"The majority of the work was done while the author was working at SRI International.","institution_ids":["https://openalex.org/I1298353152"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022253423","display_name":"Phillip Porras","orcid":"https://orcid.org/0000-0003-4661-2443"},"institutions":[{"id":"https://openalex.org/I1298353152","display_name":"SRI International","ror":"https://ror.org/05s570m15","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I1298353152"]},{"id":"https://openalex.org/I4210099336","display_name":"Menlo School","ror":"https://ror.org/01240pn49","country_code":"US","type":"education","lineage":["https://openalex.org/I4210099336"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Phillip Porras","raw_affiliation_strings":["Computer Science Laboratory, SRI International Menlo Park, CA 94025, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science Laboratory, SRI International Menlo Park, CA 94025, USA","institution_ids":["https://openalex.org/I1298353152","https://openalex.org/I4210099336"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017986911","display_name":"Johannes Ullrich","orcid":"https://orcid.org/0000-0002-0471-7004"},"institutions":[],"countries":["US"],"is_corresponding":false,"raw_author_name":"Johannes Ullrich","raw_affiliation_strings":["SANS Technology Institute, Bethesda, MD 20814, USA"],"affiliations":[{"raw_affiliation_string":"SANS Technology Institute, Bethesda, MD 20814, USA","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100409994"],"corresponding_institution_ids":["https://openalex.org/I121820613","https://openalex.org/I1298353152"],"apc_list":{"value":3760,"currency":"USD","value_usd":3760},"apc_paid":null,"fwci":0.4,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":4,"citation_normalized_percentile":{"value":0.783587,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":77,"max":79},"biblio":{"volume":"3","issue":"1","first_page":"56","last_page":"68"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T12814","display_name":"Gaussian Processes and Bayesian Inference","score":0.9982,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12814","display_name":"Gaussian Processes and Bayesian Inference","score":0.9982,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11195","display_name":"Simulation Techniques and Applications","score":0.9812,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9046,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/relevance","display_name":"Relevance","score":0.75792927},{"id":"https://openalex.org/keywords/information-sharing","display_name":"Information Sharing","score":0.49612412}],"concepts":[{"id":"https://openalex.org/C158154518","wikidata":"https://www.wikidata.org/wiki/Q7310970","display_name":"Relevance (law)","level":2,"score":0.75792927},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.74826896},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.74070823},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.57334787},{"id":"https://openalex.org/C2776854237","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information sharing","level":2,"score":0.49612412},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.482988},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.48137003},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.45268595},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.36924624},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.12766454},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1002/sam.10065","pdf_url":null,"source":{"id":"https://openalex.org/S40788348","display_name":"Statistical Analysis and Data Mining The ASA Data Science Journal","issn_l":"1932-1864","issn":["1932-1864","1932-1872"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.56,"id":"https://metadata.un.org/sdg/13","display_name":"Climate action"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":9,"referenced_works":["https://openalex.org/W1987051268","https://openalex.org/W2042281163","https://openalex.org/W2091344975","https://openalex.org/W2117063635","https://openalex.org/W2152208379","https://openalex.org/W4211049957","https://openalex.org/W4232383088","https://openalex.org/W4251303575","https://openalex.org/W4300187280"],"related_works":["https://openalex.org/W4312814274","https://openalex.org/W4285370786","https://openalex.org/W41015297","https://openalex.org/W3207760230","https://openalex.org/W2358353312","https://openalex.org/W2353836703","https://openalex.org/W2296488620","https://openalex.org/W17155033","https://openalex.org/W1590307681","https://openalex.org/W1496222301"],"abstract_inverted_index":{"Abstract":[0],"Network":[1,24],"security":[2],"has":[3],"been":[4,54],"a":[5,21,69,92,122,144,162,209],"serious":[6],"concern":[7],"for":[8],"many":[9],"years.":[10],"For":[11,45],"example,":[12],"firewalls":[13],"often":[14],"record":[15],"thousands":[16],"of":[17,74,83,128,156,169,185],"exploit":[18],"attempts":[19],"on":[20,30,59,192],"daily":[22],"basis.":[23],"administrators":[25],"could":[26],"benefit":[27],"from":[28,175,182],"information":[29,37,50,58,199],"potential":[31],"aggressive":[32],"attack":[33,186,194],"sources,":[34],"as":[35,143],"such":[36,67],"can":[38,71],"help":[39],"to":[40,96,104,111,113,124,133,208,218,220],"proactively":[41],"defend":[42],"their":[43],"networks.":[44,148],"this":[46],"purpose,":[47],"several":[48],"large\u2010scale":[49],"sharing":[51,200],"systems":[52],"have":[53,151],"established,":[55],"in":[56,88,116,196,223],"which":[57],"cyberattacks":[60],"targeting":[61],"each":[62,105,129,134,140,170],"participant":[63],"network":[64,70,107,115,210,222],"is":[65,86,95,159,172,180],"shared":[66],"that":[68,100,114,178,204,221],"be":[72],"forewarned":[73],"attacks":[75],"observed":[76],"by":[77,211],"others.":[78],"However,":[79],"the":[80,98,117,126,147,157,176,183,193,197,224],"total":[81],"number":[82],"reported":[84],"attackers":[85,99,150,205],"huge":[87],"these":[89],"systems.":[90],"Thus,":[91],"challenging":[93],"problem":[94],"identify":[97],"are":[101,214],"most":[102,109],"relevant":[103,207],"individual":[106],"(i.e.":[108],"likely":[110,217],"come":[112,219],"near":[118],"future).":[119],"We":[120,188],"present":[121],"framework":[123,191,213],"estimate":[125],"relevance":[127,142,167],"attacker":[130,171],"with":[131],"respect":[132],"network.":[135],"In":[136],"particular,":[137],"we":[138],"model":[139],"attacker's":[141],"function":[145,168],"over":[146],"Different":[149],"different":[152],"functions.":[153],"The":[154,166],"distribution":[155],"functions":[158],"modeled":[160],"using":[161],"Gaussian":[163],"process":[164],"(GP).":[165],"then":[173],"inferred":[174],"GP,":[177],"itself":[179],"learned":[181],"collection":[184],"information.":[187],"test":[189],"our":[190,212],"reports":[195],"DShield":[198],"system.":[201],"Experiments":[202],"show":[203],"found":[206],"indeed":[215],"more":[216],"future.":[225],"Copyright":[226],"\u00a9":[227],"2009":[228],"Wiley":[229],"Periodicals,":[230],"Inc.":[231],"Statistical":[232],"Analysis":[233],"and":[234],"Data":[235],"Mining":[236],"3:":[237],"56\u201068,":[238],"2010":[239]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3083766999","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2025-04-18T20:51:07.956575","created_date":"2020-09-11"}