{"id":"https://openalex.org/W4205648375","doi":"https://doi.org/10.1109/milcom52596.2021.9652921","title":"Cyber Vulnerability Implantation Revisited","display_name":"Cyber Vulnerability Implantation Revisited","publication_year":2021,"publication_date":"2021-11-29","ids":{"openalex":"https://openalex.org/W4205648375","doi":"https://doi.org/10.1109/milcom52596.2021.9652921"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom52596.2021.9652921","pdf_url":null,"source":{"id":"https://openalex.org/S4363608114","display_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004675497","display_name":"Johan Sigholm","orcid":null},"institutions":[{"id":"https://openalex.org/I101466613","display_name":"Swedish Defence University","ror":"https://ror.org/04mj8af82","country_code":"SE","type":"education","lineage":["https://openalex.org/I101466613"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Johan Sigholm","raw_affiliation_strings":["Dept. of Military Studies, Swedish Defence University, Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"Dept. of Military Studies, Swedish Defence University, Stockholm, Sweden","institution_ids":["https://openalex.org/I101466613"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067254910","display_name":"Emil Larsson","orcid":null},"institutions":[],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Emil Larsson","raw_affiliation_strings":["CISO, Assemblin, Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"CISO, Assemblin, Stockholm, Sweden","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.404,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.447141,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":72,"max":76},"biblio":{"volume":null,"issue":null,"first_page":"464","last_page":"469"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9996,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9971,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability","score":0.62348974}],"concepts":[{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.62348974},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5764169},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32266894}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom52596.2021.9652921","pdf_url":null,"source":{"id":"https://openalex.org/S4363608114","display_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.43}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":14,"referenced_works":["https://openalex.org/W1947736446","https://openalex.org/W1976413307","https://openalex.org/W1976898684","https://openalex.org/W2055784661","https://openalex.org/W2066252163","https://openalex.org/W2168534555","https://openalex.org/W2273409753","https://openalex.org/W2590695271","https://openalex.org/W2860610442","https://openalex.org/W2895807258","https://openalex.org/W3044183949","https://openalex.org/W3045635763","https://openalex.org/W4205214468","https://openalex.org/W4211072556"],"related_works":["https://openalex.org/W4402327032","https://openalex.org/W4396701345","https://openalex.org/W4396696052","https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2382290278","https://openalex.org/W2376932109","https://openalex.org/W2358668433","https://openalex.org/W2001405890"],"abstract_inverted_index":{"In":[0],"this":[1],"paper":[2],"we":[3,86],"revisit":[4],"a":[5,21,24,40,55,84,138,151,186,193,223],"study":[6,42],"presented":[7],"at":[8,96],"MILCOM":[9],"2014.":[10],"Our":[11],"goal":[12],"then":[13,45],"was":[14,57],"to":[15,28,32,59,113,122,164,233,241],"determine":[16],"the":[17,44,61,71,75,89,93,145,158,166,172,189,206,209,235],"utility":[18,210],"of":[19,64,74,92,95,128,141,154,168,196,211],"implanting":[20],"vulnerability":[22,94,213],"into":[23],"cybersecurity":[25],"software":[26,170],"protocol":[27,77],"an":[29,34,51,65,217],"actor":[30],"planning":[31,194],"execute":[33],"offensive":[35,52],"cyber":[36,53,183,207],"operation.":[37],"Based":[38],"on":[39,205],"case":[41],"describing":[43],"recently":[46],"discovered":[47],"Heartbleed":[48],"bug":[49],"as":[50,83,200],"operation,":[54],"model":[56,131,159,227],"devised":[58],"estimate":[60],"adoption":[62,72,91,107,167],"rate":[63,73],"implanted":[66,182],"flaw":[67],"in":[68,185,219],"OpenSSL.":[69],"Using":[70],"cryptographic":[76],"Transport":[78],"Layer":[79],"Security":[80],"version":[81],"1.2":[82],"proxy,":[85],"predicted":[87],"that":[88,133,180],"global":[90],"least":[97],"50%":[98],"would":[99,108],"take":[100,109],"approximately":[101],"three":[102],"years,":[103],"while":[104],"surpassing":[105],"75%":[106],"four":[110],"years.":[111,198],"Compared":[112],"subsequently":[114],"collected":[115],"real-world":[116],"data,":[117],"these":[118],"forecasts":[119],"turned":[120],"out":[121],"be":[123,162,231,242],"surprisingly":[124],"accurate.":[125],"An":[126],"evaluation":[127],"our":[129,176,226],"proposed":[130],"shows":[132],"it":[134,149],"yields":[135],"results":[136],"with":[137],"root-mean-square":[139],"error":[140],"only":[142],"1.2%":[143],"over":[144],"forecasting":[146],"period.":[147],"Thus,":[148],"has":[150],"significant":[152],"degree":[153],"predictive":[155],"power.":[156],"Although":[157],"may":[160],"not":[161],"generalizable":[163],"describe":[165],"any":[169],"protocol,":[171],"finding":[173],"helps":[174],"validate":[175],"previously":[177],"drawn":[178],"conclusion":[179],"exploiting":[181],"vulnerabilities,":[184],"scenario":[187],"like":[188],"one":[190],"presented,":[191],"requires":[192],"horizon":[195],"multiple":[197],"However,":[199],"society":[201],"becomes":[202],"further":[203],"dependent":[204],"domain,":[208],"intentional":[212],"implantation":[214],"is":[215],"likely":[216],"exercise":[218],"diminishing":[220],"returns.":[221],"For":[222],"defender,":[224],"however,":[225],"development":[228],"process":[229],"could":[230],"useful":[232],"forecast":[234],"time":[236],"required":[237],"for":[238],"flawed":[239],"protocols":[240],"phased":[243],"out.":[244]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4205648375","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2025-01-18T04:51:19.713547","created_date":"2022-01-25"}