{"id":"https://openalex.org/W2041560042","doi":"https://doi.org/10.4018/jdm.2003040101","title":"A Possibility Theory Framework for Security Evaluation in National Infrastructure Protection","display_name":"A Possibility Theory Framework for Security Evaluation in National Infrastructure Protection","publication_year":2003,"publication_date":"2003-04-01","ids":{"openalex":"https://openalex.org/W2041560042","doi":"https://doi.org/10.4018/jdm.2003040101","mag":"2041560042"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.4018/jdm.2003040101","pdf_url":null,"source":{"id":"https://openalex.org/S73024538","display_name":"Journal of Database Management","issn_l":"1063-8016","issn":["1063-8016","1533-8010"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004474203","display_name":"Richard Baskerville","orcid":"https://orcid.org/0000-0003-2860-5215"},"institutions":[{"id":"https://openalex.org/I96163493","display_name":"University of Atlanta","ror":"https://ror.org/04e2ah412","country_code":"US","type":"education","lineage":["https://openalex.org/I96163493"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Richard L. Baskerville","raw_affiliation_strings":["University of Atlanta, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"University of Atlanta, USA#TAB#","institution_ids":["https://openalex.org/I96163493"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063670442","display_name":"Victor Portougal","orcid":null},"institutions":[{"id":"https://openalex.org/I154130895","display_name":"University of Auckland","ror":"https://ror.org/03b94tp07","country_code":"NZ","type":"education","lineage":["https://openalex.org/I154130895"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Victor Portougal","raw_affiliation_strings":["University of Auckland, New Zealand"],"affiliations":[{"raw_affiliation_string":"University of Auckland, New Zealand","institution_ids":["https://openalex.org/I154130895"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.89,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.975067,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":85,"max":86},"biblio":{"volume":"14","issue":"2","first_page":"1","last_page":"13"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9901,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9901,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9046,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.4508141},{"id":"https://openalex.org/keywords/safeguard","display_name":"Safeguard","score":0.4316324}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.71713203},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.64841485},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.6400211},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.550904},{"id":"https://openalex.org/C2778627824","wikidata":"https://www.wikidata.org/wiki/Q178561","display_name":"Battle","level":2,"score":0.5248085},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.5092715},{"id":"https://openalex.org/C2777855551","wikidata":"https://www.wikidata.org/wiki/Q12310021","display_name":"Subject (documents)","level":2,"score":0.45956522},{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.4508141},{"id":"https://openalex.org/C2780771206","wikidata":"https://www.wikidata.org/wiki/Q3271761","display_name":"Safeguard","level":2,"score":0.4316324},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.38435325},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.28828335},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.25850123},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.15716729},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.12089375},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.08186439},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C161191863","wikidata":"https://www.wikidata.org/wiki/Q199655","display_name":"Library science","level":1,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.4018/jdm.2003040101","pdf_url":null,"source":{"id":"https://openalex.org/S73024538","display_name":"Journal of Database Management","issn_l":"1063-8016","issn":["1063-8016","1533-8010"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.63}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4310892428","https://openalex.org/W4247822198","https://openalex.org/W3159280571","https://openalex.org/W3154625549","https://openalex.org/W2777401565","https://openalex.org/W2508914475","https://openalex.org/W2248314326","https://openalex.org/W2120971814","https://openalex.org/W1974991139","https://openalex.org/W10189584"],"abstract_inverted_index":{"Simple":[0],"probability":[1,68],"theory":[2,33],"is":[3,53,94,106,129],"not":[4],"a":[5,66,81],"good":[6],"basis":[7],"for":[8,86,108,136],"security":[9,103,128],"in":[10,80],"the":[11,74,123],"case":[12],"of":[13,46,69,76,91,115,133],"high-stakes":[14,87],"information":[15,102,109,126],"resources":[16,19,110],"where":[17],"these":[18],"are":[20,112],"subject":[21],"to":[22,28,36,95,101],"attacks":[23,63],"upon":[24],"national":[25],"infrastructure":[26],"or":[27],"battle":[29],"space":[30],"illumination.":[31],"Probability":[32],"induces":[34],"us":[35],"believe":[37],"that":[38,105,111,125],"one":[39],"cannot":[40],"totally":[41],"rule":[42],"out":[43],"all":[44],"probabilities":[45],"an":[47,97,131],"intrusion.":[48],"An":[49],"alternative":[50,98],"theoretical":[51,82],"base":[52],"possibility":[54,75],"theory.":[55],"While":[56],"persistent,":[57],"well-supported,":[58],"and":[59],"highly":[60],"professional":[61,117],"intrusion":[62,77],"will":[64],"have":[65],"higher":[67],"success,":[70],"operating":[71],"instead":[72],"against":[73],"places":[78],"defenders":[79],"framework":[83],"more":[84],"suitable":[85,107],"protection.":[88],"The":[89],"purpose":[90],"this":[92],"paper":[93],"introduce":[96],"quantitative":[99],"approach":[100,120],"evaluation":[104],"potential":[113],"targets":[114],"intensive":[116],"attacks.":[118],"This":[119],"operates":[121],"from":[122],"recognition":[124],"resource":[127],"only":[130],"opinion":[132],"officials":[134],"responsible":[135],"security.":[137]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2041560042","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2024-12-15T10:43:30.989473","created_date":"2016-06-24"}