{"id":"https://openalex.org/W3166105079","doi":"https://doi.org/10.1145/3456727.3463834","title":"Sentinel","display_name":"Sentinel","publication_year":2021,"publication_date":"2021-06-06","ids":{"openalex":"https://openalex.org/W3166105079","doi":"https://doi.org/10.1145/3456727.3463834","mag":"3166105079"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3456727.3463834","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103523253","display_name":"Cornel Constantinescu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Cornel Constantinescu","raw_affiliation_strings":["IBM Research"],"affiliations":[{"raw_affiliation_string":"IBM Research","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034689606","display_name":"S. Seshadri","orcid":"https://orcid.org/0009-0002-2117-5769"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sangeetha Seshadri","raw_affiliation_strings":["IBM Research"],"affiliations":[{"raw_affiliation_string":"IBM Research","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.268,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.449703,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":66,"max":72},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9931,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.98225296},{"id":"https://openalex.org/keywords/flagging","display_name":"Flagging","score":0.8208535}],"concepts":[{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.98225296},{"id":"https://openalex.org/C2777548347","wikidata":"https://www.wikidata.org/wiki/Q5456937","display_name":"Flagging","level":2,"score":0.8208535},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6990317},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.65623736},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5276657},{"id":"https://openalex.org/C3018397939","wikidata":"https://www.wikidata.org/wiki/Q3644502","display_name":"Open source","level":3,"score":0.46872127},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4347903},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.36113548},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3510158},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3313608},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3456727.3463834","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","score":0.76,"id":"https://metadata.un.org/sdg/16"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":2,"referenced_works":["https://openalex.org/W2764249719","https://openalex.org/W2893176864"],"related_works":["https://openalex.org/W642986199","https://openalex.org/W611259847","https://openalex.org/W4393527151","https://openalex.org/W2946613364","https://openalex.org/W2807886874","https://openalex.org/W2354785495","https://openalex.org/W2320858910","https://openalex.org/W2113326855","https://openalex.org/W174528541","https://openalex.org/W1697346018"],"abstract_inverted_index":{"Ransomware":[0],"is":[1,14],"software":[2],"that":[3,88],"uses":[4],"encryption":[5],"to":[6,9,29],"disable":[7],"access":[8],"data":[10,48],"until":[11],"a":[12,83],"ransom":[13],"paid":[15],"and":[16,39,58,66,80],"such":[17],"attacks":[18,35,45,56,94],"have":[19],"increased":[20],"steeply":[21],"in":[22],"recent":[23],"times.":[24],"The":[25],"best":[26],"current":[27],"practice":[28],"minimize":[30],"the":[31,60,91],"impact":[32],"of":[33,73],"ransomware":[34,55,75,93],"include":[36],"periodic":[37],"backups":[38,52],"airgapped":[40],"immutable":[41],"copies.":[42],"However,":[43],"undetected":[44],"can":[46],"corrupt":[47],"before":[49],"backups,":[50],"making":[51],"unusable.":[53],"Detecting":[54],"quickly":[57],"flagging":[59],"damaged":[61],"content":[62],"enables":[63],"fast":[64],"recovery":[65],"business":[67],"continuity.":[68],"We":[69],"present":[70],"some":[71],"features":[72],"our":[74],"attack":[76],"detection":[77],"algorithms":[78],"prototyped":[79],"run":[81],"on":[82],"sandboxed":[84],"but":[85],"realistic":[86],"environment":[87],"successfully":[89],"detected":[90],"live":[92],"from":[95],"open":[96],"source":[97],"repositories.":[98]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3166105079","counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-02-19T21:59:48.994126","created_date":"2021-06-22"}