Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity Knowledge Graphs Article Swipe
YOU?
·
· 2021
· Open Access
·
· DOI: https://doi.org/10.1109/bigdata52589.2021.9671867
Today there is a significant amount of fake cybersecurity related intelligence on the internet. To filter out such information, we build a system to capture the provenance information and represent it along with the captured Cyber Threat Intelligence (CTI). In the cybersecurity domain, such CTI is stored in Cybersecurity Knowledge Graphs (CKG). We enhance the exiting CKG model to incorporate intelligence provenance and fuse provenance graphs with CKG. This process includes modifying traditional approaches to entity and relation extraction. CTI data is considered vital in securing our cyberspace. Knowledge graphs containing CTI information along with its provenance can provide expertise to dependent Artificial Intelligence (AI) systems and human analysts.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1109/bigdata52589.2021.9671867
- OA Status
- green
- Cited By
- 15
- References
- 30
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4206245037
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4206245037Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1109/bigdata52589.2021.9671867Digital Object Identifier
- Title
-
Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity Knowledge GraphsWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2021Year of publication
- Publication date
-
2021-12-15Full publication date if available
- Authors
-
Shaswata Mitra, Aritran Piplai, Sudip Mittal, Anupam JoshiList of authors in order
- Landing page
-
https://doi.org/10.1109/bigdata52589.2021.9671867Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.13016/m2otqh-m4wzDirect OA link when available
- Concepts
-
Cyberspace, Computer science, The Internet, Computer security, Relation (database), Process (computing), World Wide Web, Data mining, Operating systemTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
15Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 4, 2024: 6, 2023: 4, 2022: 1Per-year citation counts (last 5 years)
- References (count)
-
30Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4206245037 |
|---|---|
| doi | https://doi.org/10.1109/bigdata52589.2021.9671867 |
| ids.doi | https://doi.org/10.13016/m2otqh-m4wz |
| ids.openalex | https://openalex.org/W4206245037 |
| fwci | 3.31699779 |
| type | article |
| title | Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity Knowledge Graphs |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | 3323 |
| biblio.first_page | 3316 |
| topics[0].id | https://openalex.org/T11719 |
| topics[0].field.id | https://openalex.org/fields/18 |
| topics[0].field.display_name | Decision Sciences |
| topics[0].score | 0.9957000017166138 |
| topics[0].domain.id | https://openalex.org/domains/2 |
| topics[0].domain.display_name | Social Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1803 |
| topics[0].subfield.display_name | Management Science and Operations Research |
| topics[0].display_name | Data Quality and Management |
| topics[1].id | https://openalex.org/T10028 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9937999844551086 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1702 |
| topics[1].subfield.display_name | Artificial Intelligence |
| topics[1].display_name | Topic Modeling |
| topics[2].id | https://openalex.org/T11273 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9923999905586243 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1702 |
| topics[2].subfield.display_name | Artificial Intelligence |
| topics[2].display_name | Advanced Graph Neural Networks |
| funders[0].id | https://openalex.org/F4320306078 |
| funders[0].ror | https://ror.org/0447fe631 |
| funders[0].display_name | U.S. Department of Defense |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C2781241145 |
| concepts[0].level | 3 |
| concepts[0].score | 0.766815185546875 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q204606 |
| concepts[0].display_name | Cyberspace |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.6948487162590027 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C110875604 |
| concepts[2].level | 2 |
| concepts[2].score | 0.5658988356590271 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q75 |
| concepts[2].display_name | The Internet |
| concepts[3].id | https://openalex.org/C38652104 |
| concepts[3].level | 1 |
| concepts[3].score | 0.5265634059906006 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[3].display_name | Computer security |
| concepts[4].id | https://openalex.org/C25343380 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5243337750434875 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q277521 |
| concepts[4].display_name | Relation (database) |
| concepts[5].id | https://openalex.org/C98045186 |
| concepts[5].level | 2 |
| concepts[5].score | 0.5033852458000183 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q205663 |
| concepts[5].display_name | Process (computing) |
| concepts[6].id | https://openalex.org/C136764020 |
| concepts[6].level | 1 |
| concepts[6].score | 0.29183968901634216 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q466 |
| concepts[6].display_name | World Wide Web |
| concepts[7].id | https://openalex.org/C124101348 |
| concepts[7].level | 1 |
| concepts[7].score | 0.22751006484031677 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q172491 |
| concepts[7].display_name | Data mining |
| concepts[8].id | https://openalex.org/C111919701 |
| concepts[8].level | 1 |
| concepts[8].score | 0.0 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[8].display_name | Operating system |
| keywords[0].id | https://openalex.org/keywords/cyberspace |
| keywords[0].score | 0.766815185546875 |
| keywords[0].display_name | Cyberspace |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.6948487162590027 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/the-internet |
| keywords[2].score | 0.5658988356590271 |
| keywords[2].display_name | The Internet |
| keywords[3].id | https://openalex.org/keywords/computer-security |
| keywords[3].score | 0.5265634059906006 |
| keywords[3].display_name | Computer security |
| keywords[4].id | https://openalex.org/keywords/relation |
| keywords[4].score | 0.5243337750434875 |
| keywords[4].display_name | Relation (database) |
| keywords[5].id | https://openalex.org/keywords/process |
| keywords[5].score | 0.5033852458000183 |
| keywords[5].display_name | Process (computing) |
| keywords[6].id | https://openalex.org/keywords/world-wide-web |
| keywords[6].score | 0.29183968901634216 |
| keywords[6].display_name | World Wide Web |
| keywords[7].id | https://openalex.org/keywords/data-mining |
| keywords[7].score | 0.22751006484031677 |
| keywords[7].display_name | Data mining |
| language | en |
| locations[0].id | doi:10.1109/bigdata52589.2021.9671867 |
| locations[0].is_oa | False |
| locations[0].source.id | https://openalex.org/S4363607718 |
| locations[0].source.issn | |
| locations[0].source.type | conference |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | 2021 IEEE International Conference on Big Data (Big Data) |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].license | |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | proceedings-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | 2021 IEEE International Conference on Big Data (Big Data) |
| locations[0].landing_page_url | https://doi.org/10.1109/bigdata52589.2021.9671867 |
| locations[1].id | pmh:oai:mdsoar.org:11603/25497 |
| locations[1].is_oa | False |
| locations[1].source.id | https://openalex.org/S4306402556 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | Maryland Shared Open Access Repository (USMAI Consortium) |
| locations[1].source.host_organization | |
| locations[1].source.host_organization_name | |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | Text |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | |
| locations[1].landing_page_url | http://hdl.handle.net/11603/25497 |
| locations[2].id | doi:10.13016/m2otqh-m4wz |
| locations[2].is_oa | True |
| locations[2].source.id | https://openalex.org/S4306402644 |
| locations[2].source.issn | |
| locations[2].source.type | repository |
| locations[2].source.is_oa | False |
| locations[2].source.issn_l | |
| locations[2].source.is_core | False |
| locations[2].source.is_in_doaj | False |
| locations[2].source.display_name | Digital Repository at the University of Maryland (University of Maryland College Park) |
| locations[2].source.host_organization | https://openalex.org/I66946132 |
| locations[2].source.host_organization_name | University of Maryland, College Park |
| locations[2].source.host_organization_lineage | https://openalex.org/I66946132 |
| locations[2].license | |
| locations[2].pdf_url | |
| locations[2].version | |
| locations[2].raw_type | article |
| locations[2].license_id | |
| locations[2].is_accepted | False |
| locations[2].is_published | |
| locations[2].raw_source_name | |
| locations[2].landing_page_url | https://doi.org/10.13016/m2otqh-m4wz |
| indexed_in | crossref, datacite |
| authorships[0].author.id | https://openalex.org/A5075202853 |
| authorships[0].author.orcid | https://orcid.org/0009-0002-9722-5312 |
| authorships[0].author.display_name | Shaswata Mitra |
| authorships[0].countries | US |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I99041443 |
| authorships[0].affiliations[0].raw_affiliation_string | Department of Computer Science & Engineering, Mississippi State University |
| authorships[0].institutions[0].id | https://openalex.org/I99041443 |
| authorships[0].institutions[0].ror | https://ror.org/0432jq872 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I4210141039, https://openalex.org/I99041443 |
| authorships[0].institutions[0].country_code | US |
| authorships[0].institutions[0].display_name | Mississippi State University |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Shaswata Mitra |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Department of Computer Science & Engineering, Mississippi State University |
| authorships[1].author.id | https://openalex.org/A5014855298 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-6437-1324 |
| authorships[1].author.display_name | Aritran Piplai |
| authorships[1].countries | US |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I79272384 |
| authorships[1].affiliations[0].raw_affiliation_string | Dept. of Computer Science & Electrical Engineering, University of Maryland, Baltimore County |
| authorships[1].institutions[0].id | https://openalex.org/I79272384 |
| authorships[1].institutions[0].ror | https://ror.org/02qskvh78 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I79272384 |
| authorships[1].institutions[0].country_code | US |
| authorships[1].institutions[0].display_name | University of Maryland, Baltimore County |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Aritran Piplai |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Dept. of Computer Science & Electrical Engineering, University of Maryland, Baltimore County |
| authorships[2].author.id | https://openalex.org/A5074949168 |
| authorships[2].author.orcid | https://orcid.org/0000-0001-9151-8347 |
| authorships[2].author.display_name | Sudip Mittal |
| authorships[2].countries | US |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I99041443 |
| authorships[2].affiliations[0].raw_affiliation_string | Department of Computer Science & Engineering, Mississippi State University |
| authorships[2].institutions[0].id | https://openalex.org/I99041443 |
| authorships[2].institutions[0].ror | https://ror.org/0432jq872 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I4210141039, https://openalex.org/I99041443 |
| authorships[2].institutions[0].country_code | US |
| authorships[2].institutions[0].display_name | Mississippi State University |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Sudip Mittal |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Department of Computer Science & Engineering, Mississippi State University |
| authorships[3].author.id | https://openalex.org/A5020975010 |
| authorships[3].author.orcid | https://orcid.org/0000-0002-8641-3193 |
| authorships[3].author.display_name | Anupam Joshi |
| authorships[3].countries | US |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I79272384 |
| authorships[3].affiliations[0].raw_affiliation_string | Dept. of Computer Science & Electrical Engineering, University of Maryland, Baltimore County |
| authorships[3].institutions[0].id | https://openalex.org/I79272384 |
| authorships[3].institutions[0].ror | https://ror.org/02qskvh78 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I79272384 |
| authorships[3].institutions[0].country_code | US |
| authorships[3].institutions[0].display_name | University of Maryland, Baltimore County |
| authorships[3].author_position | last |
| authorships[3].raw_author_name | Anupam Joshi |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | Dept. of Computer Science & Electrical Engineering, University of Maryland, Baltimore County |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.13016/m2otqh-m4wz |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity Knowledge Graphs |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11719 |
| primary_topic.field.id | https://openalex.org/fields/18 |
| primary_topic.field.display_name | Decision Sciences |
| primary_topic.score | 0.9957000017166138 |
| primary_topic.domain.id | https://openalex.org/domains/2 |
| primary_topic.domain.display_name | Social Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1803 |
| primary_topic.subfield.display_name | Management Science and Operations Research |
| primary_topic.display_name | Data Quality and Management |
| related_works | https://openalex.org/W2368745349, https://openalex.org/W2372005904, https://openalex.org/W144012884, https://openalex.org/W3167675181, https://openalex.org/W2360897455, https://openalex.org/W2377660959, https://openalex.org/W4251169878, https://openalex.org/W2131575257, https://openalex.org/W2527886746, https://openalex.org/W3025849083 |
| cited_by_count | 15 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 4 |
| counts_by_year[1].year | 2024 |
| counts_by_year[1].cited_by_count | 6 |
| counts_by_year[2].year | 2023 |
| counts_by_year[2].cited_by_count | 4 |
| counts_by_year[3].year | 2022 |
| counts_by_year[3].cited_by_count | 1 |
| locations_count | 3 |
| best_oa_location.id | doi:10.13016/m2otqh-m4wz |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306402644 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Digital Repository at the University of Maryland (University of Maryland College Park) |
| best_oa_location.source.host_organization | https://openalex.org/I66946132 |
| best_oa_location.source.host_organization_name | University of Maryland, College Park |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I66946132 |
| best_oa_location.license | |
| best_oa_location.pdf_url | |
| best_oa_location.version | |
| best_oa_location.raw_type | article |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | https://doi.org/10.13016/m2otqh-m4wz |
| primary_location.id | doi:10.1109/bigdata52589.2021.9671867 |
| primary_location.is_oa | False |
| primary_location.source.id | https://openalex.org/S4363607718 |
| primary_location.source.issn | |
| primary_location.source.type | conference |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | 2021 IEEE International Conference on Big Data (Big Data) |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.license | |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | proceedings-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | 2021 IEEE International Conference on Big Data (Big Data) |
| primary_location.landing_page_url | https://doi.org/10.1109/bigdata52589.2021.9671867 |
| publication_date | 2021-12-15 |
| publication_year | 2021 |
| referenced_works | https://openalex.org/W6712920262, https://openalex.org/W1590627031, https://openalex.org/W1997816329, https://openalex.org/W2042188227, https://openalex.org/W3111854523, https://openalex.org/W6678830454, https://openalex.org/W2283196293, https://openalex.org/W2184957013, https://openalex.org/W6682691769, https://openalex.org/W6661564250, https://openalex.org/W4239319433, https://openalex.org/W3200510377, https://openalex.org/W3163378277, https://openalex.org/W2997634552, https://openalex.org/W6751650314, https://openalex.org/W6635453672, https://openalex.org/W6762125437, https://openalex.org/W3112007611, https://openalex.org/W3112693483, https://openalex.org/W2993623323, https://openalex.org/W3110206688, https://openalex.org/W2886325293, https://openalex.org/W2887341494, https://openalex.org/W2487152776, https://openalex.org/W2804669368, https://openalex.org/W4294170691, https://openalex.org/W2400735867, https://openalex.org/W1593502373, https://openalex.org/W4394663333, https://openalex.org/W2127795553 |
| referenced_works_count | 30 |
| abstract_inverted_index.a | 3, 21 |
| abstract_inverted_index.In | 39 |
| abstract_inverted_index.To | 14 |
| abstract_inverted_index.We | 52 |
| abstract_inverted_index.in | 47, 84 |
| abstract_inverted_index.is | 2, 45, 81 |
| abstract_inverted_index.it | 30 |
| abstract_inverted_index.of | 6 |
| abstract_inverted_index.on | 11 |
| abstract_inverted_index.to | 23, 58, 74, 100 |
| abstract_inverted_index.we | 19 |
| abstract_inverted_index.CKG | 56 |
| abstract_inverted_index.CTI | 44, 79, 91 |
| abstract_inverted_index.and | 28, 62, 76, 106 |
| abstract_inverted_index.can | 97 |
| abstract_inverted_index.its | 95 |
| abstract_inverted_index.our | 86 |
| abstract_inverted_index.out | 16 |
| abstract_inverted_index.the | 12, 25, 33, 40, 54 |
| abstract_inverted_index.(AI) | 104 |
| abstract_inverted_index.CKG. | 67 |
| abstract_inverted_index.This | 68 |
| abstract_inverted_index.data | 80 |
| abstract_inverted_index.fake | 7 |
| abstract_inverted_index.fuse | 63 |
| abstract_inverted_index.such | 17, 43 |
| abstract_inverted_index.with | 32, 66, 94 |
| abstract_inverted_index.Cyber | 35 |
| abstract_inverted_index.Today | 0 |
| abstract_inverted_index.along | 31, 93 |
| abstract_inverted_index.build | 20 |
| abstract_inverted_index.human | 107 |
| abstract_inverted_index.model | 57 |
| abstract_inverted_index.there | 1 |
| abstract_inverted_index.vital | 83 |
| abstract_inverted_index.(CKG). | 51 |
| abstract_inverted_index.(CTI). | 38 |
| abstract_inverted_index.Graphs | 50 |
| abstract_inverted_index.Threat | 36 |
| abstract_inverted_index.amount | 5 |
| abstract_inverted_index.entity | 75 |
| abstract_inverted_index.filter | 15 |
| abstract_inverted_index.graphs | 65, 89 |
| abstract_inverted_index.stored | 46 |
| abstract_inverted_index.system | 22 |
| abstract_inverted_index.capture | 24 |
| abstract_inverted_index.domain, | 42 |
| abstract_inverted_index.enhance | 53 |
| abstract_inverted_index.exiting | 55 |
| abstract_inverted_index.process | 69 |
| abstract_inverted_index.provide | 98 |
| abstract_inverted_index.related | 9 |
| abstract_inverted_index.systems | 105 |
| abstract_inverted_index.captured | 34 |
| abstract_inverted_index.includes | 70 |
| abstract_inverted_index.relation | 77 |
| abstract_inverted_index.securing | 85 |
| abstract_inverted_index.Knowledge | 49, 88 |
| abstract_inverted_index.analysts. | 108 |
| abstract_inverted_index.dependent | 101 |
| abstract_inverted_index.expertise | 99 |
| abstract_inverted_index.internet. | 13 |
| abstract_inverted_index.modifying | 71 |
| abstract_inverted_index.represent | 29 |
| abstract_inverted_index.Artificial | 102 |
| abstract_inverted_index.approaches | 73 |
| abstract_inverted_index.considered | 82 |
| abstract_inverted_index.containing | 90 |
| abstract_inverted_index.provenance | 26, 61, 64, 96 |
| abstract_inverted_index.cyberspace. | 87 |
| abstract_inverted_index.extraction. | 78 |
| abstract_inverted_index.incorporate | 59 |
| abstract_inverted_index.information | 27, 92 |
| abstract_inverted_index.significant | 4 |
| abstract_inverted_index.traditional | 72 |
| abstract_inverted_index.Intelligence | 37, 103 |
| abstract_inverted_index.information, | 18 |
| abstract_inverted_index.intelligence | 10, 60 |
| abstract_inverted_index.Cybersecurity | 48 |
| abstract_inverted_index.cybersecurity | 8, 41 |
| cited_by_percentile_year.max | 98 |
| cited_by_percentile_year.min | 89 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 4 |
| citation_normalized_percentile.value | 0.93696275 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |