Network computer security hidden dangers and vulnerability mining technology Article Swipe
YOU?
·
· 2020
· Open Access
·
· DOI: https://doi.org/10.1088/1757-899x/750/1/012155
With the development of computer technology and communication technology, computer network will increasingly become an important means of information exchange, and permeate into every field of social life. However, the network has the potential threat and the reality existence each kind of security question, therefore we must take the strong security policy to ensure the network security. The purpose of this paper is to study the network computer security hidden trouble and vulnerability mining technology. In this paper, the types of security hidden dangers are analyzed, and the vulnerability detection technology Fuzzing technology is deeply studied. Then, the inspection and test time is analyzed for the existing vulnerability detection tools. The experimental results prove that vulnerability detection technology can protect network security with high efficiency of vulnerability detection. In this paper, three vulnerability detection tools WS Fuzzer, Web Fuzz and Webvul Scan were used to analyze the detection time of open source system, personal blog, shopping mall and forum. The average detection time was 1.9s, 8.7s, 20.5s and 59.7s, respectively. It can be seen that the vulnerability mining technology has a certain practical role.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1088/1757-899x/750/1/012155
- OA Status
- diamond
- Cited By
- 5
- References
- 14
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W3013322370
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W3013322370Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1088/1757-899x/750/1/012155Digital Object Identifier
- Title
-
Network computer security hidden dangers and vulnerability mining technologyWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2020Year of publication
- Publication date
-
2020-02-01Full publication date if available
- Authors
-
Chao Wang, Tianyu Ren, Qun Li, Xiaohu Wang, Guangxin Guo, Jiahan DongList of authors in order
- Landing page
-
https://doi.org/10.1088/1757-899x/750/1/012155Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
diamondOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.1088/1757-899x/750/1/012155Direct OA link when available
- Concepts
-
Vulnerability (computing), Vulnerability management, Computer security, Vulnerability assessment, Computer science, Fuzz testing, Network security, Field (mathematics), Information security, Software, Programming language, Pure mathematics, Psychological resilience, Psychology, Mathematics, PsychotherapistTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
5Total citation count in OpenAlex
- Citations by year (recent)
-
2024: 2, 2023: 1, 2022: 1, 2021: 1Per-year citation counts (last 5 years)
- References (count)
-
14Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W3013322370 |
|---|---|
| doi | https://doi.org/10.1088/1757-899x/750/1/012155 |
| ids.doi | https://doi.org/10.1088/1757-899x/750/1/012155 |
| ids.mag | 3013322370 |
| ids.openalex | https://openalex.org/W3013322370 |
| fwci | 0.51579492 |
| type | article |
| title | Network computer security hidden dangers and vulnerability mining technology |
| biblio.issue | 1 |
| biblio.volume | 750 |
| biblio.last_page | 012155 |
| biblio.first_page | 012155 |
| topics[0].id | https://openalex.org/T11241 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9983000159263611 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1711 |
| topics[0].subfield.display_name | Signal Processing |
| topics[0].display_name | Advanced Malware Detection Techniques |
| topics[1].id | https://openalex.org/T10400 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9944000244140625 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1705 |
| topics[1].subfield.display_name | Computer Networks and Communications |
| topics[1].display_name | Network Security and Intrusion Detection |
| topics[2].id | https://openalex.org/T12034 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9908000230789185 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1710 |
| topics[2].subfield.display_name | Information Systems |
| topics[2].display_name | Digital and Cyber Forensics |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C95713431 |
| concepts[0].level | 2 |
| concepts[0].score | 0.8255510330200195 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q631425 |
| concepts[0].display_name | Vulnerability (computing) |
| concepts[1].id | https://openalex.org/C172776598 |
| concepts[1].level | 4 |
| concepts[1].score | 0.770106315612793 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q7943570 |
| concepts[1].display_name | Vulnerability management |
| concepts[2].id | https://openalex.org/C38652104 |
| concepts[2].level | 1 |
| concepts[2].score | 0.7382581233978271 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[2].display_name | Computer security |
| concepts[3].id | https://openalex.org/C167063184 |
| concepts[3].level | 3 |
| concepts[3].score | 0.6832779049873352 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q1400839 |
| concepts[3].display_name | Vulnerability assessment |
| concepts[4].id | https://openalex.org/C41008148 |
| concepts[4].level | 0 |
| concepts[4].score | 0.6678148508071899 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[4].display_name | Computer science |
| concepts[5].id | https://openalex.org/C111065885 |
| concepts[5].level | 3 |
| concepts[5].score | 0.6175322532653809 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q1189053 |
| concepts[5].display_name | Fuzz testing |
| concepts[6].id | https://openalex.org/C182590292 |
| concepts[6].level | 2 |
| concepts[6].score | 0.5995517373085022 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q989632 |
| concepts[6].display_name | Network security |
| concepts[7].id | https://openalex.org/C9652623 |
| concepts[7].level | 2 |
| concepts[7].score | 0.4605481028556824 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q190109 |
| concepts[7].display_name | Field (mathematics) |
| concepts[8].id | https://openalex.org/C527648132 |
| concepts[8].level | 2 |
| concepts[8].score | 0.4311937689781189 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q189900 |
| concepts[8].display_name | Information security |
| concepts[9].id | https://openalex.org/C2777904410 |
| concepts[9].level | 2 |
| concepts[9].score | 0.160271555185318 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q7397 |
| concepts[9].display_name | Software |
| concepts[10].id | https://openalex.org/C199360897 |
| concepts[10].level | 1 |
| concepts[10].score | 0.0 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q9143 |
| concepts[10].display_name | Programming language |
| concepts[11].id | https://openalex.org/C202444582 |
| concepts[11].level | 1 |
| concepts[11].score | 0.0 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q837863 |
| concepts[11].display_name | Pure mathematics |
| concepts[12].id | https://openalex.org/C137176749 |
| concepts[12].level | 2 |
| concepts[12].score | 0.0 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q4105337 |
| concepts[12].display_name | Psychological resilience |
| concepts[13].id | https://openalex.org/C15744967 |
| concepts[13].level | 0 |
| concepts[13].score | 0.0 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q9418 |
| concepts[13].display_name | Psychology |
| concepts[14].id | https://openalex.org/C33923547 |
| concepts[14].level | 0 |
| concepts[14].score | 0.0 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[14].display_name | Mathematics |
| concepts[15].id | https://openalex.org/C542102704 |
| concepts[15].level | 1 |
| concepts[15].score | 0.0 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q183257 |
| concepts[15].display_name | Psychotherapist |
| keywords[0].id | https://openalex.org/keywords/vulnerability |
| keywords[0].score | 0.8255510330200195 |
| keywords[0].display_name | Vulnerability (computing) |
| keywords[1].id | https://openalex.org/keywords/vulnerability-management |
| keywords[1].score | 0.770106315612793 |
| keywords[1].display_name | Vulnerability management |
| keywords[2].id | https://openalex.org/keywords/computer-security |
| keywords[2].score | 0.7382581233978271 |
| keywords[2].display_name | Computer security |
| keywords[3].id | https://openalex.org/keywords/vulnerability-assessment |
| keywords[3].score | 0.6832779049873352 |
| keywords[3].display_name | Vulnerability assessment |
| keywords[4].id | https://openalex.org/keywords/computer-science |
| keywords[4].score | 0.6678148508071899 |
| keywords[4].display_name | Computer science |
| keywords[5].id | https://openalex.org/keywords/fuzz-testing |
| keywords[5].score | 0.6175322532653809 |
| keywords[5].display_name | Fuzz testing |
| keywords[6].id | https://openalex.org/keywords/network-security |
| keywords[6].score | 0.5995517373085022 |
| keywords[6].display_name | Network security |
| keywords[7].id | https://openalex.org/keywords/field |
| keywords[7].score | 0.4605481028556824 |
| keywords[7].display_name | Field (mathematics) |
| keywords[8].id | https://openalex.org/keywords/information-security |
| keywords[8].score | 0.4311937689781189 |
| keywords[8].display_name | Information security |
| keywords[9].id | https://openalex.org/keywords/software |
| keywords[9].score | 0.160271555185318 |
| keywords[9].display_name | Software |
| language | en |
| locations[0].id | doi:10.1088/1757-899x/750/1/012155 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4210189194 |
| locations[0].source.issn | 1757-8981, 1757-899X |
| locations[0].source.type | conference |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 1757-8981 |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | IOP Conference Series Materials Science and Engineering |
| locations[0].source.host_organization | https://openalex.org/P4310320083 |
| locations[0].source.host_organization_name | IOP Publishing |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310320083, https://openalex.org/P4310311669 |
| locations[0].source.host_organization_lineage_names | IOP Publishing, Institute of Physics |
| locations[0].license | cc-by |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | IOP Conference Series: Materials Science and Engineering |
| locations[0].landing_page_url | https://doi.org/10.1088/1757-899x/750/1/012155 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5075922236 |
| authorships[0].author.orcid | https://orcid.org/0000-0003-3192-2780 |
| authorships[0].author.display_name | Chao Wang |
| authorships[0].affiliations[0].raw_affiliation_string | State Grid Beijing Electric Power Research Institute, Beijing 100075, China |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Chao Wang |
| authorships[0].is_corresponding | True |
| authorships[0].raw_affiliation_strings | State Grid Beijing Electric Power Research Institute, Beijing 100075, China |
| authorships[1].author.id | https://openalex.org/A5083767275 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | Tianyu Ren |
| authorships[1].affiliations[0].raw_affiliation_string | State Grid Beijing Electric Power Research Institute, Beijing 100075, China |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Tianyu Ren |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | State Grid Beijing Electric Power Research Institute, Beijing 100075, China |
| authorships[2].author.id | https://openalex.org/A5100426184 |
| authorships[2].author.orcid | https://orcid.org/0000-0003-2231-6615 |
| authorships[2].author.display_name | Qun Li |
| authorships[2].affiliations[0].raw_affiliation_string | State Grid Beijing Electric Power Research Institute, Beijing 100075, China |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Qun Li |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | State Grid Beijing Electric Power Research Institute, Beijing 100075, China |
| authorships[3].author.id | https://openalex.org/A5100730344 |
| authorships[3].author.orcid | https://orcid.org/0000-0003-0912-3050 |
| authorships[3].author.display_name | Xiaohu Wang |
| authorships[3].affiliations[0].raw_affiliation_string | State Grid Beijing Electric Power Research Institute, Beijing 100075, China |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Xiaohu Wang |
| authorships[3].is_corresponding | True |
| authorships[3].raw_affiliation_strings | State Grid Beijing Electric Power Research Institute, Beijing 100075, China |
| authorships[4].author.id | https://openalex.org/A5090061341 |
| authorships[4].author.orcid | https://orcid.org/0000-0001-9033-2129 |
| authorships[4].author.display_name | Guangxin Guo |
| authorships[4].affiliations[0].raw_affiliation_string | State Grid Beijing Electric Power Research Institute, Beijing 100075, China |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Guangxin Guo |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | State Grid Beijing Electric Power Research Institute, Beijing 100075, China |
| authorships[5].author.id | https://openalex.org/A5102508146 |
| authorships[5].author.orcid | |
| authorships[5].author.display_name | Jiahan Dong |
| authorships[5].affiliations[0].raw_affiliation_string | State Grid Beijing Electric Power Research Institute, Beijing 100075, China |
| authorships[5].author_position | last |
| authorships[5].raw_author_name | Jiahan Dong |
| authorships[5].is_corresponding | False |
| authorships[5].raw_affiliation_strings | State Grid Beijing Electric Power Research Institute, Beijing 100075, China |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.1088/1757-899x/750/1/012155 |
| open_access.oa_status | diamond |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Network computer security hidden dangers and vulnerability mining technology |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11241 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9983000159263611 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1711 |
| primary_topic.subfield.display_name | Signal Processing |
| primary_topic.display_name | Advanced Malware Detection Techniques |
| related_works | https://openalex.org/W2062583373, https://openalex.org/W2393340519, https://openalex.org/W2390459954, https://openalex.org/W2004278744, https://openalex.org/W4220885008, https://openalex.org/W2057803998, https://openalex.org/W2993489091, https://openalex.org/W2366522092, https://openalex.org/W4360997342, https://openalex.org/W2358649166 |
| cited_by_count | 5 |
| counts_by_year[0].year | 2024 |
| counts_by_year[0].cited_by_count | 2 |
| counts_by_year[1].year | 2023 |
| counts_by_year[1].cited_by_count | 1 |
| counts_by_year[2].year | 2022 |
| counts_by_year[2].cited_by_count | 1 |
| counts_by_year[3].year | 2021 |
| counts_by_year[3].cited_by_count | 1 |
| locations_count | 1 |
| best_oa_location.id | doi:10.1088/1757-899x/750/1/012155 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4210189194 |
| best_oa_location.source.issn | 1757-8981, 1757-899X |
| best_oa_location.source.type | conference |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 1757-8981 |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | IOP Conference Series Materials Science and Engineering |
| best_oa_location.source.host_organization | https://openalex.org/P4310320083 |
| best_oa_location.source.host_organization_name | IOP Publishing |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310320083, https://openalex.org/P4310311669 |
| best_oa_location.source.host_organization_lineage_names | IOP Publishing, Institute of Physics |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | IOP Conference Series: Materials Science and Engineering |
| best_oa_location.landing_page_url | https://doi.org/10.1088/1757-899x/750/1/012155 |
| primary_location.id | doi:10.1088/1757-899x/750/1/012155 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4210189194 |
| primary_location.source.issn | 1757-8981, 1757-899X |
| primary_location.source.type | conference |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 1757-8981 |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | IOP Conference Series Materials Science and Engineering |
| primary_location.source.host_organization | https://openalex.org/P4310320083 |
| primary_location.source.host_organization_name | IOP Publishing |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310320083, https://openalex.org/P4310311669 |
| primary_location.source.host_organization_lineage_names | IOP Publishing, Institute of Physics |
| primary_location.license | cc-by |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | IOP Conference Series: Materials Science and Engineering |
| primary_location.landing_page_url | https://doi.org/10.1088/1757-899x/750/1/012155 |
| publication_date | 2020-02-01 |
| publication_year | 2020 |
| referenced_works | https://openalex.org/W1993388711, https://openalex.org/W2795166306, https://openalex.org/W2885518306, https://openalex.org/W2952117785, https://openalex.org/W2781494548, https://openalex.org/W2604976248, https://openalex.org/W2556903150, https://openalex.org/W2555538332, https://openalex.org/W2626801099, https://openalex.org/W2345727918, https://openalex.org/W2580388383, https://openalex.org/W2761120070, https://openalex.org/W2509458264, https://openalex.org/W3104194539 |
| referenced_works_count | 14 |
| abstract_inverted_index.a | 181 |
| abstract_inverted_index.In | 76, 129 |
| abstract_inverted_index.It | 171 |
| abstract_inverted_index.WS | 136 |
| abstract_inverted_index.an | 15 |
| abstract_inverted_index.be | 173 |
| abstract_inverted_index.is | 63, 94, 103 |
| abstract_inverted_index.of | 4, 18, 26, 42, 60, 81, 126, 150 |
| abstract_inverted_index.to | 53, 64, 145 |
| abstract_inverted_index.we | 46 |
| abstract_inverted_index.The | 58, 111, 160 |
| abstract_inverted_index.Web | 138 |
| abstract_inverted_index.and | 7, 21, 36, 72, 87, 100, 140, 158, 168 |
| abstract_inverted_index.are | 85 |
| abstract_inverted_index.can | 119, 172 |
| abstract_inverted_index.for | 105 |
| abstract_inverted_index.has | 32, 180 |
| abstract_inverted_index.the | 2, 30, 33, 37, 49, 55, 66, 79, 88, 98, 106, 147, 176 |
| abstract_inverted_index.was | 164 |
| abstract_inverted_index.Fuzz | 139 |
| abstract_inverted_index.Scan | 142 |
| abstract_inverted_index.With | 1 |
| abstract_inverted_index.each | 40 |
| abstract_inverted_index.high | 124 |
| abstract_inverted_index.into | 23 |
| abstract_inverted_index.kind | 41 |
| abstract_inverted_index.mall | 157 |
| abstract_inverted_index.must | 47 |
| abstract_inverted_index.open | 151 |
| abstract_inverted_index.seen | 174 |
| abstract_inverted_index.take | 48 |
| abstract_inverted_index.test | 101 |
| abstract_inverted_index.that | 115, 175 |
| abstract_inverted_index.this | 61, 77, 130 |
| abstract_inverted_index.time | 102, 149, 163 |
| abstract_inverted_index.used | 144 |
| abstract_inverted_index.were | 143 |
| abstract_inverted_index.will | 12 |
| abstract_inverted_index.with | 123 |
| abstract_inverted_index.1.9s, | 165 |
| abstract_inverted_index.20.5s | 167 |
| abstract_inverted_index.8.7s, | 166 |
| abstract_inverted_index.Then, | 97 |
| abstract_inverted_index.blog, | 155 |
| abstract_inverted_index.every | 24 |
| abstract_inverted_index.field | 25 |
| abstract_inverted_index.life. | 28 |
| abstract_inverted_index.means | 17 |
| abstract_inverted_index.paper | 62 |
| abstract_inverted_index.prove | 114 |
| abstract_inverted_index.role. | 184 |
| abstract_inverted_index.study | 65 |
| abstract_inverted_index.three | 132 |
| abstract_inverted_index.tools | 135 |
| abstract_inverted_index.types | 80 |
| abstract_inverted_index.59.7s, | 169 |
| abstract_inverted_index.Webvul | 141 |
| abstract_inverted_index.become | 14 |
| abstract_inverted_index.deeply | 95 |
| abstract_inverted_index.ensure | 54 |
| abstract_inverted_index.forum. | 159 |
| abstract_inverted_index.hidden | 70, 83 |
| abstract_inverted_index.mining | 74, 178 |
| abstract_inverted_index.paper, | 78, 131 |
| abstract_inverted_index.policy | 52 |
| abstract_inverted_index.social | 27 |
| abstract_inverted_index.source | 152 |
| abstract_inverted_index.strong | 50 |
| abstract_inverted_index.threat | 35 |
| abstract_inverted_index.tools. | 110 |
| abstract_inverted_index.Fuzzer, | 137 |
| abstract_inverted_index.Fuzzing | 92 |
| abstract_inverted_index.analyze | 146 |
| abstract_inverted_index.average | 161 |
| abstract_inverted_index.certain | 182 |
| abstract_inverted_index.dangers | 84 |
| abstract_inverted_index.network | 11, 31, 56, 67, 121 |
| abstract_inverted_index.protect | 120 |
| abstract_inverted_index.purpose | 59 |
| abstract_inverted_index.reality | 38 |
| abstract_inverted_index.results | 113 |
| abstract_inverted_index.system, | 153 |
| abstract_inverted_index.trouble | 71 |
| abstract_inverted_index.Abstract | 0 |
| abstract_inverted_index.However, | 29 |
| abstract_inverted_index.analyzed | 104 |
| abstract_inverted_index.computer | 5, 10, 68 |
| abstract_inverted_index.existing | 107 |
| abstract_inverted_index.permeate | 22 |
| abstract_inverted_index.personal | 154 |
| abstract_inverted_index.security | 43, 51, 69, 82, 122 |
| abstract_inverted_index.shopping | 156 |
| abstract_inverted_index.studied. | 96 |
| abstract_inverted_index.analyzed, | 86 |
| abstract_inverted_index.detection | 90, 109, 117, 134, 148, 162 |
| abstract_inverted_index.exchange, | 20 |
| abstract_inverted_index.existence | 39 |
| abstract_inverted_index.important | 16 |
| abstract_inverted_index.potential | 34 |
| abstract_inverted_index.practical | 183 |
| abstract_inverted_index.question, | 44 |
| abstract_inverted_index.security. | 57 |
| abstract_inverted_index.therefore | 45 |
| abstract_inverted_index.detection. | 128 |
| abstract_inverted_index.efficiency | 125 |
| abstract_inverted_index.inspection | 99 |
| abstract_inverted_index.technology | 6, 91, 93, 118, 179 |
| abstract_inverted_index.development | 3 |
| abstract_inverted_index.information | 19 |
| abstract_inverted_index.technology, | 9 |
| abstract_inverted_index.technology. | 75 |
| abstract_inverted_index.experimental | 112 |
| abstract_inverted_index.increasingly | 13 |
| abstract_inverted_index.communication | 8 |
| abstract_inverted_index.respectively. | 170 |
| abstract_inverted_index.vulnerability | 73, 89, 108, 116, 127, 133, 177 |
| cited_by_percentile_year.max | 96 |
| cited_by_percentile_year.min | 89 |
| corresponding_author_ids | https://openalex.org/A5075922236, https://openalex.org/A5100730344 |
| countries_distinct_count | 0 |
| institutions_distinct_count | 6 |
| citation_normalized_percentile.value | 0.59701493 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |