{"id":"https://openalex.org/W3023019814","doi":"https://doi.org/10.1109/ojcoms.2020.2989925","title":"Incidents Information Sharing Platform for Distributed Attack Detection","display_name":"Incidents Information Sharing Platform for Distributed Attack Detection","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3023019814","doi":"https://doi.org/10.1109/ojcoms.2020.2989925","mag":"3023019814"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcoms.2020.2989925","pdf_url":"https://ieeexplore.ieee.org/ielx7/8782661/8816718/09079479.pdf","source":{"id":"https://openalex.org/S4210202420","display_name":"IEEE Open Journal of the Communications Society","issn_l":"2644-125X","issn":["2644-125X"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310319808","https://openalex.org/P4310316002"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers","IEEE Communications Society"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/8782661/8816718/09079479.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103128408","display_name":"Konstantina Fotiadou","orcid":"https://orcid.org/0000-0002-2073-7961"},"institutions":[],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Konstantina Fotiadou","raw_affiliation_strings":["Power Operations Ltd., Swindon, U.K."],"affiliations":[{"raw_affiliation_string":"Power Operations Ltd., Swindon, U.K.","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023985839","display_name":"Terpsichori-Helen Velivassaki","orcid":"https://orcid.org/0000-0002-0362-4607"},"institutions":[{"id":"https://openalex.org/I4210166692","display_name":"SingularLogic (Greece)","ror":"https://ror.org/05xere368","country_code":"GR","type":"company","lineage":["https://openalex.org/I4210166692"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Terpsichori-Helen Velivassaki","raw_affiliation_strings":["SingularLogic, Attica, Greece"],"affiliations":[{"raw_affiliation_string":"SingularLogic, Attica, Greece","institution_ids":["https://openalex.org/I4210166692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071289606","display_name":"Artemis Voulkidis","orcid":"https://orcid.org/0000-0002-7580-3938"},"institutions":[],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Artemis Voulkidis","raw_affiliation_strings":["Power Operations Ltd., Swindon, U.K."],"affiliations":[{"raw_affiliation_string":"Power Operations Ltd., Swindon, U.K.","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032918860","display_name":"Konstantinos Railis","orcid":"https://orcid.org/0000-0003-4444-0748"},"institutions":[],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Konstantinos Railis","raw_affiliation_strings":["Power Operations Ltd., Swindon, U.K."],"affiliations":[{"raw_affiliation_string":"Power Operations Ltd., Swindon, U.K.","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039352682","display_name":"Panagiotis Trakadas","orcid":"https://orcid.org/0000-0002-5146-5954"},"institutions":[{"id":"https://openalex.org/I200777214","display_name":"National and Kapodistrian University of Athens","ror":"https://ror.org/04gnjpq42","country_code":"GR","type":"funder","lineage":["https://openalex.org/I200777214"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Panagiotis Trakadas","raw_affiliation_strings":["National and Kapodistrian University of Athens, Athens, Greece"],"affiliations":[{"raw_affiliation_string":"National and Kapodistrian University of Athens, Athens, Greece","institution_ids":["https://openalex.org/I200777214"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028371094","display_name":"Theod\u03bfre Zahariadis","orcid":"https://orcid.org/0000-0002-2408-4582"},"institutions":[{"id":"https://openalex.org/I200777214","display_name":"National and Kapodistrian University of Athens","ror":"https://ror.org/04gnjpq42","country_code":"GR","type":"funder","lineage":["https://openalex.org/I200777214"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Theodore Zahariadis","raw_affiliation_strings":["National and Kapodistrian University of Athens, Athens, Greece"],"affiliations":[{"raw_affiliation_string":"National and Kapodistrian University of Athens, Athens, Greece","institution_ids":["https://openalex.org/I200777214"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":1750,"currency":"USD","value_usd":1750},"apc_paid":{"value":1750,"currency":"USD","value_usd":1750},"fwci":1.659,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":14,"citation_normalized_percentile":{"value":0.878148,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":88,"max":89},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/information-sharing","display_name":"Information Sharing","score":0.5217548}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7510147},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.64387137},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6098423},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.5607413},{"id":"https://openalex.org/C2777381055","wikidata":"https://www.wikidata.org/wiki/Q308922","display_name":"Damages","level":2,"score":0.534519},{"id":"https://openalex.org/C2776854237","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information sharing","level":2,"score":0.5217548},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.49406984},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.48951876},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.43676892},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.41342163},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.28390408},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.18793213},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.16827032},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcoms.2020.2989925","pdf_url":"https://ieeexplore.ieee.org/ielx7/8782661/8816718/09079479.pdf","source":{"id":"https://openalex.org/S4210202420","display_name":"IEEE Open Journal of the Communications Society","issn_l":"2644-125X","issn":["2644-125X"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310319808","https://openalex.org/P4310316002"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers","IEEE Communications Society"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":true,"landing_page_url":"https://zenodo.org/record/5045273","pdf_url":"https://zenodo.org/records/5045273/files/09079479.pdf","source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":["European Organization for Nuclear Research"],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false},{"is_oa":false,"landing_page_url":"https://doaj.org/article/2127f023bbb64554990fe16026ad7ad0","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcoms.2020.2989925","pdf_url":"https://ieeexplore.ieee.org/ielx7/8782661/8816718/09079479.pdf","source":{"id":"https://openalex.org/S4210202420","display_name":"IEEE Open Journal of the Communications Society","issn_l":"2644-125X","issn":["2644-125X"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310319808","https://openalex.org/P4310316002"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers","IEEE Communications Society"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":44,"referenced_works":["https://openalex.org/W1521415669","https://openalex.org/W1536680647","https://openalex.org/W1591801644","https://openalex.org/W172260869","https://openalex.org/W1964793108","https://openalex.org/W1976331960","https://openalex.org/W2002016471","https://openalex.org/W2050065884","https://openalex.org/W2095727900","https://openalex.org/W2103518983","https://openalex.org/W2134727960","https://openalex.org/W2136235822","https://openalex.org/W2136848157","https://openalex.org/W2143559571","https://openalex.org/W215707797","https://openalex.org/W2163605009","https://openalex.org/W2325440334","https://openalex.org/W2340896621","https://openalex.org/W2533698187","https://openalex.org/W2535642622","https://openalex.org/W2542459869","https://openalex.org/W2620661538","https://openalex.org/W2735766064","https://openalex.org/W2760313715","https://openalex.org/W2765449478","https://openalex.org/W2768800090","https://openalex.org/W2787947370","https://openalex.org/W2883778034","https://openalex.org/W2898539279","https://openalex.org/W2901773810","https://openalex.org/W2902455138","https://openalex.org/W2910068345","https://openalex.org/W2911200746","https://openalex.org/W2914521857","https://openalex.org/W2945315609","https://openalex.org/W2963045681","https://openalex.org/W2963288913","https://openalex.org/W2969495950","https://openalex.org/W2975649990","https://openalex.org/W3122864121","https://openalex.org/W3186276894","https://openalex.org/W410850256","https://openalex.org/W4214958790","https://openalex.org/W4288335160"],"related_works":["https://openalex.org/W3157271777","https://openalex.org/W2384741105","https://openalex.org/W2377372927","https://openalex.org/W2376886931","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W2061466315","https://openalex.org/W2010561419","https://openalex.org/W1977863481","https://openalex.org/W1495178644"],"abstract_inverted_index":{"Intrusion":[0],"detection":[1],"plays":[2],"a":[3,27],"critical":[4],"role":[5],"in":[6,108],"cyber-security":[7,84],"domain":[8],"since":[9],"malicious":[10],"attacks":[11],"cause":[12],"irreparable":[13],"damages":[14],"to":[15,33,110,139],"cyber-systems.":[16],"In":[17],"this":[18],"work,":[19],"we":[20,45,100],"propose":[21],"the":[22,42,88,95,102,106,131],"I2SP":[23,43],"prototype,":[24],"which":[25],"is":[26],"novel":[28,119],"Information":[29,90],"Sharing":[30,91],"Platform,":[31],"able":[32,138],"gather,":[34],"pre-process,":[35],"model,":[36],"and":[37],"distribute":[38],"network-traffic":[39,54],"information.":[40],"Within":[41],"prototype":[44],"build":[46],"several":[47],"challenging":[48],"deep":[49,120,133],"feature":[50,121,134],"learning":[51,122,135],"models":[52],"for":[53,63,124],"intrusion":[55,125],"detection.":[56,126],"The":[57],"learnt":[58],"representations":[59],"will":[60],"be":[61],"utilized":[62],"classifying":[64],"each":[65],"new":[66],"network":[67],"measurement":[68],"into":[69],"its":[70],"corresponding":[71],"threat":[72],"level.":[73],"We":[74],"evaluate":[75],"our":[76,98],"prototype's":[77],"performance":[78],"by":[79],"conducting":[80],"case":[81],"studies":[82],"using":[83],"data":[85],"extracted":[86],"from":[87],"Malware":[89],"Platform":[92],"(MISP)-API.":[93],"To":[94],"best":[96],"of":[97],"knowledge,":[99],"are":[101,137],"first":[103],"that":[104,116,130],"combine":[105],"MISP-API":[107],"order":[109],"construct":[111],"an":[112],"information":[113],"sharing":[114],"mechanism":[115],"supports":[117],"multiple":[118],"architectures":[123],"Experimental":[127],"results":[128],"justify":[129],"proposed":[132],"techniques":[136],"predict":[140],"accurately":[141],"MISP":[142],"threat-levels.":[143]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3023019814","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":2}],"updated_date":"2025-04-17T07:57:28.492330","created_date":"2020-05-13"}