Temporal Understanding of Cybersecurity Threats Article Swipe
YOU?
·
· 2020
· Open Access
·
· DOI: https://doi.org/10.1109/bigdatasecurity-hpsc-ids49724.2020.00030
As cybersecurity-related threats continue to increase, understanding how the field is changing over time can give insight into combating new threats and understanding historical events. We show how to apply dynamic topic models to a set of cybersecurity documents to understand how the concepts found in them are changing over time. We correlate two different data sets, the first relates to specific exploits and the second relates to cybersecurity research. We use Wikipedia concepts to provide a basis for performing concept phrase extraction and show how using concepts to provide context improves the quality of the topic model. We represent the results of the dynamic topic model as a knowledge graph that could be used for inference or information discovery.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1109/bigdatasecurity-hpsc-ids49724.2020.00030
- OA Status
- green
- Cited By
- 3
- References
- 33
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W3037451859
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W3037451859Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1109/bigdatasecurity-hpsc-ids49724.2020.00030Digital Object Identifier
- Title
-
Temporal Understanding of Cybersecurity ThreatsWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2020Year of publication
- Publication date
-
2020-05-01Full publication date if available
- Authors
-
Jennifer Sleeman, Tim Finin, Milton HalemList of authors in order
- Landing page
-
https://doi.org/10.1109/bigdatasecurity-hpsc-ids49724.2020.00030Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.13016/m2v88o-bcfwDirect OA link when available
- Concepts
-
Computer science, Exploit, Data science, Inference, Field (mathematics), Phrase, Context (archaeology), Computer security, Set (abstract data type), Artificial intelligence, Pure mathematics, Biology, Paleontology, Programming language, MathematicsTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
3Total citation count in OpenAlex
- Citations by year (recent)
-
2023: 2, 2021: 1Per-year citation counts (last 5 years)
- References (count)
-
33Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W3037451859 |
|---|---|
| doi | https://doi.org/10.1109/bigdatasecurity-hpsc-ids49724.2020.00030 |
| ids.doi | https://doi.org/10.1109/bigdatasecurity-hpsc-ids49724.2020.00030 |
| ids.mag | 3037451859 |
| ids.openalex | https://openalex.org/W3037451859 |
| fwci | 0.55713977 |
| type | article |
| title | Temporal Understanding of Cybersecurity Threats |
| biblio.issue | |
| biblio.volume | 3 |
| biblio.last_page | 121 |
| biblio.first_page | 115 |
| topics[0].id | https://openalex.org/T11719 |
| topics[0].field.id | https://openalex.org/fields/18 |
| topics[0].field.display_name | Decision Sciences |
| topics[0].score | 0.9922999739646912 |
| topics[0].domain.id | https://openalex.org/domains/2 |
| topics[0].domain.display_name | Social Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1803 |
| topics[0].subfield.display_name | Management Science and Operations Research |
| topics[0].display_name | Data Quality and Management |
| topics[1].id | https://openalex.org/T10028 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9836999773979187 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1702 |
| topics[1].subfield.display_name | Artificial Intelligence |
| topics[1].display_name | Topic Modeling |
| topics[2].id | https://openalex.org/T10064 |
| topics[2].field.id | https://openalex.org/fields/31 |
| topics[2].field.display_name | Physics and Astronomy |
| topics[2].score | 0.9815000295639038 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/3109 |
| topics[2].subfield.display_name | Statistical and Nonlinear Physics |
| topics[2].display_name | Complex Network Analysis Techniques |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.8179326057434082 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C165696696 |
| concepts[1].level | 2 |
| concepts[1].score | 0.7142906785011292 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q11287 |
| concepts[1].display_name | Exploit |
| concepts[2].id | https://openalex.org/C2522767166 |
| concepts[2].level | 1 |
| concepts[2].score | 0.5909622311592102 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q2374463 |
| concepts[2].display_name | Data science |
| concepts[3].id | https://openalex.org/C2776214188 |
| concepts[3].level | 2 |
| concepts[3].score | 0.5760794878005981 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q408386 |
| concepts[3].display_name | Inference |
| concepts[4].id | https://openalex.org/C9652623 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5550143718719482 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q190109 |
| concepts[4].display_name | Field (mathematics) |
| concepts[5].id | https://openalex.org/C2776224158 |
| concepts[5].level | 2 |
| concepts[5].score | 0.5424029231071472 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q187931 |
| concepts[5].display_name | Phrase |
| concepts[6].id | https://openalex.org/C2779343474 |
| concepts[6].level | 2 |
| concepts[6].score | 0.5413787364959717 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q3109175 |
| concepts[6].display_name | Context (archaeology) |
| concepts[7].id | https://openalex.org/C38652104 |
| concepts[7].level | 1 |
| concepts[7].score | 0.47759294509887695 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[7].display_name | Computer security |
| concepts[8].id | https://openalex.org/C177264268 |
| concepts[8].level | 2 |
| concepts[8].score | 0.4547748267650604 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q1514741 |
| concepts[8].display_name | Set (abstract data type) |
| concepts[9].id | https://openalex.org/C154945302 |
| concepts[9].level | 1 |
| concepts[9].score | 0.1895391047000885 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[9].display_name | Artificial intelligence |
| concepts[10].id | https://openalex.org/C202444582 |
| concepts[10].level | 1 |
| concepts[10].score | 0.0 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q837863 |
| concepts[10].display_name | Pure mathematics |
| concepts[11].id | https://openalex.org/C86803240 |
| concepts[11].level | 0 |
| concepts[11].score | 0.0 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q420 |
| concepts[11].display_name | Biology |
| concepts[12].id | https://openalex.org/C151730666 |
| concepts[12].level | 1 |
| concepts[12].score | 0.0 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q7205 |
| concepts[12].display_name | Paleontology |
| concepts[13].id | https://openalex.org/C199360897 |
| concepts[13].level | 1 |
| concepts[13].score | 0.0 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q9143 |
| concepts[13].display_name | Programming language |
| concepts[14].id | https://openalex.org/C33923547 |
| concepts[14].level | 0 |
| concepts[14].score | 0.0 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[14].display_name | Mathematics |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.8179326057434082 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/exploit |
| keywords[1].score | 0.7142906785011292 |
| keywords[1].display_name | Exploit |
| keywords[2].id | https://openalex.org/keywords/data-science |
| keywords[2].score | 0.5909622311592102 |
| keywords[2].display_name | Data science |
| keywords[3].id | https://openalex.org/keywords/inference |
| keywords[3].score | 0.5760794878005981 |
| keywords[3].display_name | Inference |
| keywords[4].id | https://openalex.org/keywords/field |
| keywords[4].score | 0.5550143718719482 |
| keywords[4].display_name | Field (mathematics) |
| keywords[5].id | https://openalex.org/keywords/phrase |
| keywords[5].score | 0.5424029231071472 |
| keywords[5].display_name | Phrase |
| keywords[6].id | https://openalex.org/keywords/context |
| keywords[6].score | 0.5413787364959717 |
| keywords[6].display_name | Context (archaeology) |
| keywords[7].id | https://openalex.org/keywords/computer-security |
| keywords[7].score | 0.47759294509887695 |
| keywords[7].display_name | Computer security |
| keywords[8].id | https://openalex.org/keywords/set |
| keywords[8].score | 0.4547748267650604 |
| keywords[8].display_name | Set (abstract data type) |
| keywords[9].id | https://openalex.org/keywords/artificial-intelligence |
| keywords[9].score | 0.1895391047000885 |
| keywords[9].display_name | Artificial intelligence |
| language | en |
| locations[0].id | doi:10.1109/bigdatasecurity-hpsc-ids49724.2020.00030 |
| locations[0].is_oa | False |
| locations[0].source | |
| locations[0].license | |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | proceedings-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | 2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS) |
| locations[0].landing_page_url | https://doi.org/10.1109/bigdatasecurity-hpsc-ids49724.2020.00030 |
| locations[1].id | pmh:oai:mdsoar.org:11603/19214 |
| locations[1].is_oa | False |
| locations[1].source.id | https://openalex.org/S4306402556 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | Maryland Shared Open Access Repository (USMAI Consortium) |
| locations[1].source.host_organization | |
| locations[1].source.host_organization_name | |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | Text |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | |
| locations[1].landing_page_url | http://hdl.handle.net/11603/19214 |
| locations[2].id | doi:10.13016/m2v88o-bcfw |
| locations[2].is_oa | True |
| locations[2].source.id | https://openalex.org/S4306402644 |
| locations[2].source.issn | |
| locations[2].source.type | repository |
| locations[2].source.is_oa | False |
| locations[2].source.issn_l | |
| locations[2].source.is_core | False |
| locations[2].source.is_in_doaj | False |
| locations[2].source.display_name | Digital Repository at the University of Maryland (University of Maryland College Park) |
| locations[2].source.host_organization | https://openalex.org/I66946132 |
| locations[2].source.host_organization_name | University of Maryland, College Park |
| locations[2].source.host_organization_lineage | https://openalex.org/I66946132 |
| locations[2].license | |
| locations[2].pdf_url | |
| locations[2].version | |
| locations[2].raw_type | article |
| locations[2].license_id | |
| locations[2].is_accepted | False |
| locations[2].is_published | |
| locations[2].raw_source_name | |
| locations[2].landing_page_url | https://doi.org/10.13016/m2v88o-bcfw |
| indexed_in | crossref, datacite |
| authorships[0].author.id | https://openalex.org/A5020969830 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-8934-5587 |
| authorships[0].author.display_name | Jennifer Sleeman |
| authorships[0].countries | US |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I79272384 |
| authorships[0].affiliations[0].raw_affiliation_string | Computer Science and Electrical Eng., Univ. of Maryland, Baltimore County, Baltimore, MD, USA |
| authorships[0].institutions[0].id | https://openalex.org/I79272384 |
| authorships[0].institutions[0].ror | https://ror.org/02qskvh78 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I79272384 |
| authorships[0].institutions[0].country_code | US |
| authorships[0].institutions[0].display_name | University of Maryland, Baltimore County |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Jennifer Sleeman |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Computer Science and Electrical Eng., Univ. of Maryland, Baltimore County, Baltimore, MD, USA |
| authorships[1].author.id | https://openalex.org/A5009972149 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | Tim Finin |
| authorships[1].countries | US |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I79272384 |
| authorships[1].affiliations[0].raw_affiliation_string | Computer Science and Electrical Eng., Univ. of Maryland, Baltimore County, Baltimore, MD, USA |
| authorships[1].institutions[0].id | https://openalex.org/I79272384 |
| authorships[1].institutions[0].ror | https://ror.org/02qskvh78 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I79272384 |
| authorships[1].institutions[0].country_code | US |
| authorships[1].institutions[0].display_name | University of Maryland, Baltimore County |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Tim Finin |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Computer Science and Electrical Eng., Univ. of Maryland, Baltimore County, Baltimore, MD, USA |
| authorships[2].author.id | https://openalex.org/A5004628313 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-5614-3612 |
| authorships[2].author.display_name | Milton Halem |
| authorships[2].countries | US |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I79272384 |
| authorships[2].affiliations[0].raw_affiliation_string | Computer Science and Electrical Eng., Univ. of Maryland, Baltimore County, Baltimore, MD, USA |
| authorships[2].institutions[0].id | https://openalex.org/I79272384 |
| authorships[2].institutions[0].ror | https://ror.org/02qskvh78 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I79272384 |
| authorships[2].institutions[0].country_code | US |
| authorships[2].institutions[0].display_name | University of Maryland, Baltimore County |
| authorships[2].author_position | last |
| authorships[2].raw_author_name | Milton Halem |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Computer Science and Electrical Eng., Univ. of Maryland, Baltimore County, Baltimore, MD, USA |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.13016/m2v88o-bcfw |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Temporal Understanding of Cybersecurity Threats |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11719 |
| primary_topic.field.id | https://openalex.org/fields/18 |
| primary_topic.field.display_name | Decision Sciences |
| primary_topic.score | 0.9922999739646912 |
| primary_topic.domain.id | https://openalex.org/domains/2 |
| primary_topic.domain.display_name | Social Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1803 |
| primary_topic.subfield.display_name | Management Science and Operations Research |
| primary_topic.display_name | Data Quality and Management |
| related_works | https://openalex.org/W17155033, https://openalex.org/W3207760230, https://openalex.org/W1496222301, https://openalex.org/W1590307681, https://openalex.org/W3048799479, https://openalex.org/W2779961139, https://openalex.org/W3006507989, https://openalex.org/W4240241597, https://openalex.org/W2763500028, https://openalex.org/W4240288358 |
| cited_by_count | 3 |
| counts_by_year[0].year | 2023 |
| counts_by_year[0].cited_by_count | 2 |
| counts_by_year[1].year | 2021 |
| counts_by_year[1].cited_by_count | 1 |
| locations_count | 3 |
| best_oa_location.id | doi:10.13016/m2v88o-bcfw |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306402644 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Digital Repository at the University of Maryland (University of Maryland College Park) |
| best_oa_location.source.host_organization | https://openalex.org/I66946132 |
| best_oa_location.source.host_organization_name | University of Maryland, College Park |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I66946132 |
| best_oa_location.license | |
| best_oa_location.pdf_url | |
| best_oa_location.version | |
| best_oa_location.raw_type | article |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | https://doi.org/10.13016/m2v88o-bcfw |
| primary_location.id | doi:10.1109/bigdatasecurity-hpsc-ids49724.2020.00030 |
| primary_location.is_oa | False |
| primary_location.source | |
| primary_location.license | |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | proceedings-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | 2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS) |
| primary_location.landing_page_url | https://doi.org/10.1109/bigdatasecurity-hpsc-ids49724.2020.00030 |
| publication_date | 2020-05-01 |
| publication_year | 2020 |
| referenced_works | https://openalex.org/W2049693236, https://openalex.org/W3122797939, https://openalex.org/W6605516884, https://openalex.org/W6730313144, https://openalex.org/W6734296786, https://openalex.org/W1976339648, https://openalex.org/W2345270836, https://openalex.org/W2258956667, https://openalex.org/W2277141454, https://openalex.org/W6744835185, https://openalex.org/W4238948521, https://openalex.org/W1966741850, https://openalex.org/W2072644219, https://openalex.org/W2184720590, https://openalex.org/W4239319433, https://openalex.org/W6639619044, https://openalex.org/W6753198287, https://openalex.org/W6774693206, https://openalex.org/W102708294, https://openalex.org/W2610751324, https://openalex.org/W4229498508, https://openalex.org/W3010523270, https://openalex.org/W2594126889, https://openalex.org/W2759785137, https://openalex.org/W4231510805, https://openalex.org/W136069565, https://openalex.org/W2472414028, https://openalex.org/W1880262756, https://openalex.org/W2556724933, https://openalex.org/W2883150631, https://openalex.org/W2076818149, https://openalex.org/W2892748737, https://openalex.org/W4289743529 |
| referenced_works_count | 33 |
| abstract_inverted_index.a | 34, 76, 108 |
| abstract_inverted_index.As | 0 |
| abstract_inverted_index.We | 25, 51, 70, 98 |
| abstract_inverted_index.as | 107 |
| abstract_inverted_index.be | 113 |
| abstract_inverted_index.in | 45 |
| abstract_inverted_index.is | 10 |
| abstract_inverted_index.of | 36, 94, 102 |
| abstract_inverted_index.or | 117 |
| abstract_inverted_index.to | 4, 28, 33, 39, 60, 67, 74, 88 |
| abstract_inverted_index.and | 21, 63, 83 |
| abstract_inverted_index.are | 47 |
| abstract_inverted_index.can | 14 |
| abstract_inverted_index.for | 78, 115 |
| abstract_inverted_index.how | 7, 27, 41, 85 |
| abstract_inverted_index.new | 19 |
| abstract_inverted_index.set | 35 |
| abstract_inverted_index.the | 8, 42, 57, 64, 92, 95, 100, 103 |
| abstract_inverted_index.two | 53 |
| abstract_inverted_index.use | 71 |
| abstract_inverted_index.data | 55 |
| abstract_inverted_index.give | 15 |
| abstract_inverted_index.into | 17 |
| abstract_inverted_index.over | 12, 49 |
| abstract_inverted_index.show | 26, 84 |
| abstract_inverted_index.that | 111 |
| abstract_inverted_index.them | 46 |
| abstract_inverted_index.time | 13 |
| abstract_inverted_index.used | 114 |
| abstract_inverted_index.apply | 29 |
| abstract_inverted_index.basis | 77 |
| abstract_inverted_index.could | 112 |
| abstract_inverted_index.field | 9 |
| abstract_inverted_index.first | 58 |
| abstract_inverted_index.found | 44 |
| abstract_inverted_index.graph | 110 |
| abstract_inverted_index.model | 106 |
| abstract_inverted_index.sets, | 56 |
| abstract_inverted_index.time. | 50 |
| abstract_inverted_index.topic | 31, 96, 105 |
| abstract_inverted_index.using | 86 |
| abstract_inverted_index.model. | 97 |
| abstract_inverted_index.models | 32 |
| abstract_inverted_index.phrase | 81 |
| abstract_inverted_index.second | 65 |
| abstract_inverted_index.concept | 80 |
| abstract_inverted_index.context | 90 |
| abstract_inverted_index.dynamic | 30, 104 |
| abstract_inverted_index.events. | 24 |
| abstract_inverted_index.insight | 16 |
| abstract_inverted_index.provide | 75, 89 |
| abstract_inverted_index.quality | 93 |
| abstract_inverted_index.relates | 59, 66 |
| abstract_inverted_index.results | 101 |
| abstract_inverted_index.threats | 2, 20 |
| abstract_inverted_index.changing | 11, 48 |
| abstract_inverted_index.concepts | 43, 73, 87 |
| abstract_inverted_index.continue | 3 |
| abstract_inverted_index.exploits | 62 |
| abstract_inverted_index.improves | 91 |
| abstract_inverted_index.specific | 61 |
| abstract_inverted_index.Wikipedia | 72 |
| abstract_inverted_index.combating | 18 |
| abstract_inverted_index.correlate | 52 |
| abstract_inverted_index.different | 54 |
| abstract_inverted_index.documents | 38 |
| abstract_inverted_index.increase, | 5 |
| abstract_inverted_index.inference | 116 |
| abstract_inverted_index.knowledge | 109 |
| abstract_inverted_index.represent | 99 |
| abstract_inverted_index.research. | 69 |
| abstract_inverted_index.discovery. | 119 |
| abstract_inverted_index.extraction | 82 |
| abstract_inverted_index.historical | 23 |
| abstract_inverted_index.performing | 79 |
| abstract_inverted_index.understand | 40 |
| abstract_inverted_index.information | 118 |
| abstract_inverted_index.cybersecurity | 37, 68 |
| abstract_inverted_index.understanding | 6, 22 |
| abstract_inverted_index.cybersecurity-related | 1 |
| cited_by_percentile_year.max | 96 |
| cited_by_percentile_year.min | 89 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 3 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/4 |
| sustainable_development_goals[0].score | 0.4699999988079071 |
| sustainable_development_goals[0].display_name | Quality Education |
| citation_normalized_percentile.value | 0.70825265 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |