{"id":"https://openalex.org/W3091184447","doi":"https://doi.org/10.1109/acsos-c51401.2020.00059","title":"Designing a Methodological Framework for the Empirical Evaluation of Self-Protecting Systems","display_name":"Designing a Methodological Framework for the Empirical Evaluation of Self-Protecting Systems","publication_year":2020,"publication_date":"2020-08-01","ids":{"openalex":"https://openalex.org/W3091184447","doi":"https://doi.org/10.1109/acsos-c51401.2020.00059","mag":"3091184447"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/acsos-c51401.2020.00059","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032453886","display_name":"Andrea Montemaggio","orcid":"https://orcid.org/0000-0002-0595-5928"},"institutions":[{"id":"https://openalex.org/I99041443","display_name":"Mississippi State University","ror":"https://ror.org/0432jq872","country_code":"US","type":"education","lineage":["https://openalex.org/I4210141039","https://openalex.org/I99041443"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Andrea Montemaggio","raw_affiliation_strings":["Center for Cyber Innovation, Mississippi State University, Mississippi State, MS"],"affiliations":[{"raw_affiliation_string":"Center for Cyber Innovation, Mississippi State University, Mississippi State, MS","institution_ids":["https://openalex.org/I99041443"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073885108","display_name":"Stefano Iannucci","orcid":"https://orcid.org/0000-0001-7485-9772"},"institutions":[{"id":"https://openalex.org/I99041443","display_name":"Mississippi State University","ror":"https://ror.org/0432jq872","country_code":"US","type":"education","lineage":["https://openalex.org/I4210141039","https://openalex.org/I99041443"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Stefano Iannucci","raw_affiliation_strings":["Computer Science and Engineering, Mississippi State University, Mississippi State, MS"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, Mississippi State University, Mississippi State, MS","institution_ids":["https://openalex.org/I99041443"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058240042","display_name":"Tanmay Bhowmik","orcid":"https://orcid.org/0000-0002-0456-161X"},"institutions":[{"id":"https://openalex.org/I99041443","display_name":"Mississippi State University","ror":"https://ror.org/0432jq872","country_code":"US","type":"education","lineage":["https://openalex.org/I4210141039","https://openalex.org/I99041443"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tanmay Bhowmik","raw_affiliation_strings":["Computer Science and Engineering, Mississippi State University, Mississippi State, MS"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, Mississippi State University, Mississippi State, MS","institution_ids":["https://openalex.org/I99041443"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063984980","display_name":"John A. Hamilton","orcid":null},"institutions":[{"id":"https://openalex.org/I99041443","display_name":"Mississippi State University","ror":"https://ror.org/0432jq872","country_code":"US","type":"education","lineage":["https://openalex.org/I4210141039","https://openalex.org/I99041443"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"John Hamilton","raw_affiliation_strings":["Center for Cyber Innovation, Mississippi State University, Mississippi State, MS"],"affiliations":[{"raw_affiliation_string":"Center for Cyber Innovation, Mississippi State University, Mississippi State, MS","institution_ids":["https://openalex.org/I99041443"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.601,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.644608,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":77,"max":79},"biblio":{"volume":null,"issue":null,"first_page":"218","last_page":"223"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/empirical-research","display_name":"Empirical Research","score":0.5018654}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7627584},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.71864223},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.56383044},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.503431},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.5018654},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49854922},{"id":"https://openalex.org/C2164484","wikidata":"https://www.wikidata.org/wiki/Q5170150","display_name":"Core (optical fiber)","level":2,"score":0.41409922},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3354833},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.083244234},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/acsos-c51401.2020.00059","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Responsible consumption and production","score":0.53,"id":"https://metadata.un.org/sdg/12"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":22,"referenced_works":["https://openalex.org/W1552366432","https://openalex.org/W1800991598","https://openalex.org/W1925725102","https://openalex.org/W1991160483","https://openalex.org/W2032897110","https://openalex.org/W2037027324","https://openalex.org/W2045856890","https://openalex.org/W2050282514","https://openalex.org/W2098875950","https://openalex.org/W2109972932","https://openalex.org/W2141289698","https://openalex.org/W2334230100","https://openalex.org/W2379726672","https://openalex.org/W2507972354","https://openalex.org/W261580403","https://openalex.org/W2619874920","https://openalex.org/W2773235317","https://openalex.org/W2800521404","https://openalex.org/W2899572060","https://openalex.org/W2972007171","https://openalex.org/W4237459332","https://openalex.org/W964452066"],"related_works":["https://openalex.org/W4254602698","https://openalex.org/W2906422846","https://openalex.org/W2394461323","https://openalex.org/W2390009783","https://openalex.org/W2361044160","https://openalex.org/W2357468538","https://openalex.org/W2355007334","https://openalex.org/W2349441905","https://openalex.org/W2133389611","https://openalex.org/W1577110157"],"abstract_inverted_index":{"Increasingly,":[0],"cyber":[1],"attacks":[2],"against":[3],"enterprises":[4],"and":[5,15,54,92,127,135],"governments":[6],"make":[7],"use":[8],"of":[9,19,41,48,85,94,117,124,143],"automated":[10],"tools.":[11],"For":[12],"this":[13,49,99,105],"reason,":[14],"given":[16],"the":[17,24,37,65,67,83,90,113,122,141],"importance":[18],"a":[20,30,86,109,144],"timely":[21],"protection,":[22],"in":[23,32],"last":[25],"decade":[26],"there":[27],"has":[28,61],"been":[29,62],"push":[31],"researching":[33],"methodologies":[34],"to":[35,78,103],"automate":[36],"full":[38],"defense":[39],"life-cycle":[40,50],"computer":[42],"systems.":[43],"The":[44],"two":[45],"core":[46],"phases":[47],"are":[51],"Intrusion":[52,55,95],"Detection":[53],"Response.":[56],"However,":[57],"while":[58],"some":[59],"progress":[60],"done":[63],"on":[64,121],"former,":[66],"latter":[68],"is":[69,76,132,138],"still":[70],"at":[71],"an":[72],"early":[73],"stage.":[74],"This":[75],"due":[77],"several":[79],"factors,":[80],"among":[81],"which":[82],"lack":[84],"standardized":[87],"methodology":[88],"for":[89,112],"validation":[91],"comparison":[93],"Response":[96],"methodologies.":[97],"In":[98],"paper,":[100],"we":[101],"attempt":[102],"fill":[104],"gap":[106],"by":[107,140],"introducing":[108],"methodological":[110],"framework":[111],"quantitative":[114],"empirical":[115],"evaluation":[116],"self-protecting":[118],"systems,":[119],"based":[120],"metrics":[123],"response":[125],"time":[126],"cost.":[128],"An":[129],"experimental":[130],"design":[131],"also":[133],"provided":[134],"its":[136],"applicability":[137],"illustrated":[139],"means":[142],"template":[145],"experiment.":[146]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3091184447","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":2}],"updated_date":"2025-01-08T15:55:07.185262","created_date":"2020-10-08"}