{"id":"https://openalex.org/W2890071159","doi":"https://doi.org/10.1145/3241403.3241460","title":"Combining real-time risk visualization and anomaly detection","display_name":"Combining real-time risk visualization and anomaly detection","publication_year":2018,"publication_date":"2018-09-19","ids":{"openalex":"https://openalex.org/W2890071159","doi":"https://doi.org/10.1145/3241403.3241460","mag":"2890071159"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3241403.3241460","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067273683","display_name":"Teemu V\u00e4is\u00e4nen","orcid":"https://orcid.org/0000-0002-9115-2127"},"institutions":[{"id":"https://openalex.org/I98381234","display_name":"University of Oulu","ror":"https://ror.org/03yj89h83","country_code":"FI","type":"funder","lineage":["https://openalex.org/I98381234"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Teemu V\u00e4is\u00e4nen","raw_affiliation_strings":["University of Oulu, Oulu, Finland"],"affiliations":[{"raw_affiliation_string":"University of Oulu, Oulu, Finland","institution_ids":["https://openalex.org/I98381234"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089864628","display_name":"Sami Noponen","orcid":"https://orcid.org/0000-0002-4798-3345"},"institutions":[{"id":"https://openalex.org/I87653560","display_name":"VTT Technical Research Centre of Finland","ror":"https://ror.org/04b181w54","country_code":"FI","type":"nonprofit","lineage":["https://openalex.org/I4210089493","https://openalex.org/I87653560"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Sami Noponen","raw_affiliation_strings":["VTT Technical Research Centre of Finland Ltd, Oulu, Finland"],"affiliations":[{"raw_affiliation_string":"VTT Technical Research Centre of Finland Ltd, Oulu, Finland","institution_ids":["https://openalex.org/I87653560"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017236951","display_name":"Outi-Marja Latvala","orcid":"https://orcid.org/0000-0001-8083-8986"},"institutions":[{"id":"https://openalex.org/I87653560","display_name":"VTT Technical Research Centre of Finland","ror":"https://ror.org/04b181w54","country_code":"FI","type":"nonprofit","lineage":["https://openalex.org/I4210089493","https://openalex.org/I87653560"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Outi-Marja Latvala","raw_affiliation_strings":["VTT Technical Research Centre of Finland Ltd, Oulu, Finland"],"affiliations":[{"raw_affiliation_string":"VTT Technical Research Centre of Finland Ltd, Oulu, Finland","institution_ids":["https://openalex.org/I87653560"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011164471","display_name":"Jarkko Kuusij\u00e4rvi","orcid":"https://orcid.org/0000-0002-9882-0888"},"institutions":[{"id":"https://openalex.org/I87653560","display_name":"VTT Technical Research Centre of Finland","ror":"https://ror.org/04b181w54","country_code":"FI","type":"nonprofit","lineage":["https://openalex.org/I4210089493","https://openalex.org/I87653560"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Jarkko Kuusij\u00e4rvi","raw_affiliation_strings":["VTT Technical Research Centre of Finland Ltd, Oulu, Finland"],"affiliations":[{"raw_affiliation_string":"VTT Technical Research Centre of Finland Ltd, Oulu, Finland","institution_ids":["https://openalex.org/I87653560"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.061,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":2,"citation_normalized_percentile":{"value":0.333445,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":70,"max":74},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.997,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.997,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9969,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9954,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.47470134}],"concepts":[{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.74649906},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6482728},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6434442},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.47470134},{"id":"https://openalex.org/C172367668","wikidata":"https://www.wikidata.org/wiki/Q6504956","display_name":"Data visualization","level":3,"score":0.47435844},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.32955188},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3241403.3241460","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":17,"referenced_works":["https://openalex.org/W1435867867","https://openalex.org/W1516293359","https://openalex.org/W1536432326","https://openalex.org/W1544152542","https://openalex.org/W1590508536","https://openalex.org/W1596835508","https://openalex.org/W2029876067","https://openalex.org/W2089280522","https://openalex.org/W2098415077","https://openalex.org/W2107771083","https://openalex.org/W2132068130","https://openalex.org/W2150546866","https://openalex.org/W2384562686","https://openalex.org/W2613221253","https://openalex.org/W2790637580","https://openalex.org/W2955981305","https://openalex.org/W4233898666"],"related_works":["https://openalex.org/W4377864969","https://openalex.org/W4300558037","https://openalex.org/W4290647774","https://openalex.org/W3210364259","https://openalex.org/W3207797160","https://openalex.org/W3189286258","https://openalex.org/W3030345572","https://openalex.org/W2912112202","https://openalex.org/W2806741695","https://openalex.org/W2667207928"],"abstract_inverted_index":{"Traditional":[0],"risk":[1,54],"management":[2,55],"produces":[3],"a":[4],"rather":[5],"static":[6],"listing":[7],"of":[8,15],"weaknesses,":[9],"probabilities":[10],"and":[11,53],"mitigations.":[12],"Large":[13],"share":[14],"cyber":[16],"security":[17],"risks":[18],"realize":[19],"through":[20],"computer":[21],"networks.":[22],"These":[23],"attacks":[24],"or":[25,59],"attack":[26],"attempts":[27],"produce":[28],"events":[29,52],"that":[30],"are":[31],"detected":[32],"by":[33],"various":[34],"monitoring":[35],"techniques":[36],"such":[37],"as":[38],"Intrusion":[39],"Detection":[40],"Systems":[41],"(IDS).":[42],"Often":[43],"the":[44],"link":[45],"between":[46],"detecting":[47],"these":[48],"potentially":[49],"dangerous":[50],"real-time":[51],"process":[56],"is":[57],"lacking,":[58],"completely":[60],"missing.":[61]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2890071159","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-03-19T19:49:18.061132","created_date":"2018-09-27"}