{"id":"https://openalex.org/W2399500480","doi":"https://doi.org/10.20965/jaciii.2014.p0093","title":"A Threat Assessment Method Based on Hierarchies and Modules","display_name":"A Threat Assessment Method Based on Hierarchies and Modules","publication_year":2014,"publication_date":"2014-01-20","ids":{"openalex":"https://openalex.org/W2399500480","doi":"https://doi.org/10.20965/jaciii.2014.p0093","mag":"2399500480"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.20965/jaciii.2014.p0093","pdf_url":null,"source":{"id":"https://openalex.org/S4511983","display_name":"Journal of Advanced Computational Intelligence and Intelligent Informatics","issn_l":"1883-8014","issn":["1883-8014","1343-0130"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4324309662","host_organization_name":"Fuji Technology Press Ltd.","host_organization_lineage":["https://openalex.org/P4324309662"],"host_organization_lineage_names":["Fuji Technology Press Ltd."],"type":"journal"},"license":"cc-by-nd","license_id":"https://openalex.org/licenses/cc-by-nd","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.20965/jaciii.2014.p0093","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108050766","display_name":"Fang Deng","orcid":"https://orcid.org/0000-0002-1111-7285"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fang Deng","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052747154","display_name":"Xinan Liu","orcid":"https://orcid.org/0000-0002-9837-7329"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xinan Liu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055648384","display_name":"Zhihong Peng","orcid":"https://orcid.org/0009-0005-3422-391X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhihong Peng","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5100333005","display_name":"Jie Chen","orcid":"https://orcid.org/0000-0003-2449-9793"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jie Chen","raw_affiliation_strings":[],"affiliations":[]}],"institution_assertions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":0,"currency":"USD","value_usd":0},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":66},"biblio":{"volume":"18","issue":"1","first_page":"93","last_page":"99"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.7121,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.7121,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13371","display_name":"Military Defense Systems Analysis","score":0.6894,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/threat-assessment","display_name":"Threat assessment","score":0.6642896},{"id":"https://openalex.org/keywords/sensor-fusion","display_name":"Sensor Fusion","score":0.4174781}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8466742},{"id":"https://openalex.org/C2778868856","wikidata":"https://www.wikidata.org/wiki/Q18394273","display_name":"Threat assessment","level":2,"score":0.6642896},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.59693575},{"id":"https://openalex.org/C201717286","wikidata":"https://www.wikidata.org/wiki/Q938185","display_name":"Rationality","level":2,"score":0.47644478},{"id":"https://openalex.org/C33954974","wikidata":"https://www.wikidata.org/wiki/Q486494","display_name":"Sensor fusion","level":2,"score":0.4174781},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.41492894},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.37793297},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.35146278},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33480498},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.20965/jaciii.2014.p0093","pdf_url":null,"source":{"id":"https://openalex.org/S4511983","display_name":"Journal of Advanced Computational Intelligence and Intelligent Informatics","issn_l":"1883-8014","issn":["1883-8014","1343-0130"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4324309662","host_organization_name":"Fuji Technology Press Ltd.","host_organization_lineage":["https://openalex.org/P4324309662"],"host_organization_lineage_names":["Fuji Technology Press Ltd."],"type":"journal"},"license":"cc-by-nd","license_id":"https://openalex.org/licenses/cc-by-nd","version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.20965/jaciii.2014.p0093","pdf_url":null,"source":{"id":"https://openalex.org/S4511983","display_name":"Journal of Advanced Computational Intelligence and Intelligent Informatics","issn_l":"1883-8014","issn":["1883-8014","1343-0130"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4324309662","host_organization_name":"Fuji Technology Press Ltd.","host_organization_lineage":["https://openalex.org/P4324309662"],"host_organization_lineage_names":["Fuji Technology Press Ltd."],"type":"journal"},"license":"cc-by-nd","license_id":"https://openalex.org/licenses/cc-by-nd","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.41,"display_name":"Partnerships for the goals"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":6,"referenced_works":["https://openalex.org/W2106637647","https://openalex.org/W2126318467","https://openalex.org/W2143799301","https://openalex.org/W2379443532","https://openalex.org/W4245256727","https://openalex.org/W4316253766"],"related_works":["https://openalex.org/W4388260134","https://openalex.org/W2501307252","https://openalex.org/W2386975405","https://openalex.org/W2375421581","https://openalex.org/W2370332065","https://openalex.org/W2364973163","https://openalex.org/W2360169511","https://openalex.org/W2359095791","https://openalex.org/W2352025053","https://openalex.org/W2351341309"],"abstract_inverted_index":{"With":[0],"the":[1,27,31,70,97],"development":[2],"of":[3,14,24,33,39,101],"low-level":[4],"data":[5,16],"fusion":[6],"technology,":[7],"threat":[8,34,47],"assessment,":[9],"which":[10],"is":[11,18,43,50,93],"a":[12,46],"part":[13],"high-level":[15],"fusion,":[17],"recognized":[19],"by":[20],"an":[21],"increasing":[22],"numbers":[23],"people.":[25],"However,":[26],"method":[28,49,60],"to":[29,55,95],"solve":[30,56],"problem":[32],"assessment":[35,48],"for":[36],"various":[37,74],"kinds":[38],"targets":[40,78],"and":[41,67,79,91,99],"attacks":[42,80],"unknown.":[44],"Hence,":[45],"proposed":[51],"in":[52],"this":[53,57,102],"paper":[54],"problem.":[58],"This":[59],"includes":[61],"tertiary":[62,71],"assessments:":[63],"information":[64],"classification,":[65],"reorganization,":[66],"summary.":[68],"In":[69],"assessments":[72],"model,":[73],"threats":[75],"with":[76,88],"multi-class":[77],"can":[81],"be":[82],"comprehensively":[83],"assessed.":[84],"A":[85],"case":[86],"study":[87],"specific":[89],"algorithms":[90],"scenarios":[92],"shown":[94],"prove":[96],"validity":[98],"rationality":[100],"method.":[103]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2399500480","counts_by_year":[],"updated_date":"2025-02-23T09:50:29.776824","created_date":"2016-06-24"}