{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:25:28Z","timestamp":1750220728494,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,5,15]],"date-time":"2020-05-15T00:00:00Z","timestamp":1589500800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,5,15]]},"DOI":"10.1145\/3404663.3404675","type":"proceedings-article","created":{"date-parts":[[2020,7,10]],"date-time":"2020-07-10T22:10:11Z","timestamp":1594419011000},"page":"51-57","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["An Approach of Security Model to Mitigate Risk of Cyberattacks on Public Institutions in Ecuador"],"prefix":"10.1145","author":[{"given":"Segundo Mois\u00e9s T.","family":"Toapanta","sequence":"first","affiliation":[{"name":"Department Computer Science, Salesian Polytechnic University, Guayaquil, Ecuador"}]},{"given":"Peter S. Mu\u00f1oz","family":"Campuzano","sequence":"additional","affiliation":[{"name":"Department Computer Science, Salesian Polytechnic University, Guayaquil, Ecuador"}]},{"given":"Dario Fernando Huilcapi","family":"S.","sequence":"additional","affiliation":[{"name":"Department Computer Science, Salesian Polytechnic University, Guayaquil, Ecuador"}]},{"given":"Luis Enrique Mafla","family":"Gallegos","sequence":"additional","affiliation":[{"name":"National Polytechnic School, Quito Ecuador"}]}],"member":"320","published-online":{"date-parts":[[2020,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyz001"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.25046\/aj040315"},{"key":"e_1_3_2_1_3_1","volume-title":"Conf. VLSI Syst. VLSI-SoC","volume":"106","author":"Keliris A.","year":"2019","unstructured":"A. Keliris , C. Konstantinou , M. Sazos , and M. Maniatakos , \" Low-budget Energy Sector Cyberattacks via Open Source Exploitation,\" IEEE\/IFIP Int . Conf. VLSI Syst. VLSI-SoC , vol. 2018-Octob, pp. 101-- 106 , 2019 . DOI 10.1109\/VLSI-SOC.2018.8644775 A. Keliris, C. Konstantinou, M. Sazos, and M. Maniatakos, \"Low-budget Energy Sector Cyberattacks via Open Source Exploitation,\" IEEE\/IFIP Int. Conf. VLSI Syst. VLSI-SoC, vol. 2018-Octob, pp. 101--106, 2019. DOI 10.1109\/VLSI-SOC.2018.8644775"},{"key":"e_1_3_2_1_4_1","volume-title":"Conf. Autom. Sci. Eng.","volume":"993","author":"Rashid N.","year":"2018","unstructured":"N. Rashid , J. Wan , G. Quir\u00f3s , A. Canedo , and M. A. Al Faruque , \" Modeling and simulation of cyberattacks for resilient cyber-physical systems,\" IEEE Int . Conf. Autom. Sci. Eng. , vol. 2017-Augus, pp. 988-- 993 , 2018 . DOI 10.1109\/COASE.2017.8256231 N. Rashid, J. Wan, G. Quir\u00f3s, A. Canedo, and M. A. Al Faruque, \"Modeling and simulation of cyberattacks for resilient cyber-physical systems,\" IEEE Int. Conf. Autom. Sci. Eng., vol. 2017-Augus, pp. 988--993, 2018. DOI 10.1109\/COASE.2017.8256231"},{"key":"e_1_3_2_1_5_1","volume-title":"Practical employment of granular computing to complex application layer cyberattack detection,\" Complexity","author":"Kozik R.","year":"2019","unstructured":"R. Kozik , M. Pawlicki , M. Chora\u015b , and W. Pedrycz , \" Practical employment of granular computing to complex application layer cyberattack detection,\" Complexity , vol. 2019 , no. i, 2019 . DOI 10.1155\/2019\/5826737 R. Kozik, M. Pawlicki, M. Chora\u015b, and W. Pedrycz, \"Practical employment of granular computing to complex application layer cyberattack detection,\" Complexity, vol. 2019, no. i, 2019. DOI 10.1155\/2019\/5826737"},{"key":"e_1_3_2_1_6_1","first-page":"1","volume-title":"Gen. Meet.","volume":"51677160","author":"Wang C.","year":"2018","unstructured":"C. Wang and Y. Hou , \" Preventive defensive strategies for power systems under persistent malicious cyberattacks,\" IEEE Power Energy Soc . Gen. Meet. , vol. 2018-Janua, no. 51677160 , pp. 1 -- 5 , 2018 . DOI 10.1109\/PESGM.2017.8274421 C. Wang and Y. Hou, \"Preventive defensive strategies for power systems under persistent malicious cyberattacks,\" IEEE Power Energy Soc. Gen. Meet., vol. 2018-Janua, no. 51677160, pp. 1--5, 2018. DOI 10.1109\/PESGM.2017.8274421"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyy002"},{"issue":"1","key":"e_1_3_2_1_8_1","first-page":"10","article-title":"A deep learning framework for predicting cyber attacks rates","volume":"2019","author":"Fang X.","year":"2019","unstructured":"X. Fang , M. Xu , S. Xu , and P. Zhao , \" A deep learning framework for predicting cyber attacks rates ,\" Eurasip J. Inf. Secur. , vol. 2019 , no. 1 , 2019 . DOI 10 .1186\/S13635-019-0090-6 X. Fang, M. Xu, S. Xu, and P. Zhao, \"A deep learning framework for predicting cyber attacks rates,\" Eurasip J. Inf. Secur., vol. 2019, no. 1, 2019. DOI 10.1186\/S13635-019-0090-6","journal-title":"Eurasip J. Inf. Secur."},{"issue":"1","key":"e_1_3_2_1_9_1","first-page":"37","article-title":"Optimizing time allocation for network defence","volume":"1","author":"Caulfield T.","year":"2015","unstructured":"T. Caulfield and A. Fielder , \" Optimizing time allocation for network defence ,\" J. Cybersecurity , vol. 1 , no. 1 , pp. 37 -- 51 , 2015 . DOI 10.1093\/CYBSEC\/TYV002 T. Caulfield and A. Fielder, \"Optimizing time allocation for network defence,\" J. Cybersecurity, vol. 1, no. 1, pp. 37--51, 2015. DOI 10.1093\/CYBSEC\/TYV002","journal-title":"J. Cybersecurity"},{"key":"e_1_3_2_1_10_1","first-page":"262","volume-title":"Comput. Commun. Work.","author":"Zhou Y.","year":"2018","unstructured":"Y. Zhou , M. Han , L. Liu , J. S. He , and Y. Wang , \" Deep learning approach for cyberattack detection,\" INFOCOM 2018 - IEEE Conf . Comput. Commun. Work. , pp. 262 -- 267 , 2018 . DOI 10.1109\/INFCOMW.2018.8407032 Y. Zhou, M. Han, L. Liu, J. S. He, and Y. Wang, \"Deep learning approach for cyberattack detection,\" INFOCOM 2018 - IEEE Conf. Comput. Commun. Work., pp. 262--267, 2018. DOI 10.1109\/INFCOMW.2018.8407032"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1080\/00051144.2017.1407022"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1108\/MAJ-09-2018-2004"},{"key":"e_1_3_2_1_13_1","first-page":"4798","volume-title":"Conf. Big Data, Big Data 2018","author":"Herald N. E.","year":"2019","unstructured":"N. E. Herald and M. W. David , \" A Framework for Making Effective Responses to Cyberattacks,\" Proc. - 2018 IEEE Int . Conf. Big Data, Big Data 2018 , pp. 4798 -- 4805 , 2019 . DOI 10.1109\/BIGDATA.2018.8622537 N. E. Herald and M. W. David, \"A Framework for Making Effective Responses to Cyberattacks,\" Proc. - 2018 IEEE Int. Conf. Big Data, Big Data 2018, pp. 4798--4805, 2019. DOI 10.1109\/BIGDATA.2018.8622537"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.3390\/app9010082"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2018EDL8068"},{"key":"e_1_3_2_1_16_1","first-page":"49","volume-title":"Conf. Intell. Secur. Informatics, ISI 2018","author":"Moskal S.","year":"2018","unstructured":"S. Moskal , S. J. Yang , and M. E. Kuhl , \" Extracting and evaluating similar and unique cyber attack strategies from intrusion alerts,\" 2018 IEEE Int . Conf. Intell. Secur. Informatics, ISI 2018 , pp. 49 -- 54 , 2018 . DOI 10.1109\/ISI.2018.8587402 S. Moskal, S. J. Yang, and M. E. Kuhl, \"Extracting and evaluating similar and unique cyber attack strategies from intrusion alerts,\" 2018 IEEE Int. Conf. Intell. Secur. Informatics, ISI 2018, pp. 49--54, 2018. DOI 10.1109\/ISI.2018.8587402"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2920326"},{"key":"e_1_3_2_1_18_1","volume-title":"Current State of","author":"Sen R.","year":"2018","unstructured":"R. Sen , \"Challenges to Cybersecurity : Current State of ,\" vol. 43 , 2018 . DOI 10.17705\/1CAIS.04302 R. Sen, \"Challenges to Cybersecurity: Current State of,\" vol. 43, 2018. DOI 10.17705\/1CAIS.04302"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"A. R. Mathew \"Cyber Insurance \" no. 6 pp. 4447--4451 2019. DOI 10.35940\/IJEAT.F8976.088619  A. R. Mathew \"Cyber Insurance \" no. 6 pp. 4447--4451 2019. DOI 10.35940\/IJEAT.F8976.088619","DOI":"10.35940\/ijeat.F8976.088619"},{"key":"e_1_3_2_1_20_1","first-page":"37","volume-title":"November","author":"Caulfield T.","year":"2015","unstructured":"T. Caulfield and A. Fielder , \" Optimizing time allocation for network defence,\" vol. 1, no . November , pp. 37 -- 51 , 2015 . DOI 10.1093\/CYBSEC\/TYV002 T. Caulfield and A. Fielder, \"Optimizing time allocation for network defence,\" vol. 1, no. November, pp. 37--51, 2015. DOI 10.1093\/CYBSEC\/TYV002"},{"key":"e_1_3_2_1_21_1","first-page":"86","volume-title":"Symp. Comput. Netw. Work. CANDARW 2018","author":"Kawamura T.","year":"2018","unstructured":"T. Kawamura , M. Fukushi , Y. Hirano , Y. Fujita , and Y. Hamamoto , \" A network-based event detection module using NTP for cyber attacks on IoT,\" Proc. - 2018 6th Int . Symp. Comput. Netw. Work. CANDARW 2018 , pp. 86 -- 91 , 2018 . DOI 10.1109\/CANDARW.2018.00025 T. Kawamura, M. Fukushi, Y. Hirano, Y. Fujita, and Y. Hamamoto, \"A network-based event detection module using NTP for cyber attacks on IoT,\" Proc. - 2018 6th Int. Symp. Comput. Netw. Work. CANDARW 2018, pp. 86--91, 2018. DOI 10.1109\/CANDARW.2018.00025"},{"key":"e_1_3_2_1_22_1","volume-title":"Cybersecurity and cyber defence: national level strategic approach","author":"Control J.","year":"2018","unstructured":"J. Control , D. Galinec , D. Mo\u017enik , and B. Guberina , \" Cybersecurity and cyber defence: national level strategic approach ,\" vol. 1144 , 2018 . DOI 10.1080\/00051144.2017.1407022 J. Control, D. Galinec, D. Mo\u017enik, and B. Guberina, \"Cybersecurity and cyber defence: national level strategic approach,\" vol. 1144, 2018. DOI 10.1080\/00051144.2017.1407022"},{"issue":"0","key":"e_1_3_2_1_23_1","first-page":"0","article-title":"Modelling the effects of certain cyber-attack methods on urban autonomous transport systems, case study of Budapest","volume":"0","author":"Szalay Z.","year":"2019","unstructured":"\u00c1. T\u00f6r\u00f6k, Z. Szalay , G. Uti , and B. Vereb\u00e9lyi , \" Modelling the effects of certain cyber-attack methods on urban autonomous transport systems, case study of Budapest ,\" J. Ambient Intell. Humaniz. Comput. , vol. 0 , no. 0 , p. 0 , 2019 . DOI 10.1007\/S12652-019-01264-8 \u00c1. T\u00f6r\u00f6k, Z. Szalay, G. Uti, and B. Vereb\u00e9lyi, \"Modelling the effects of certain cyber-attack methods on urban autonomous transport systems, case study of Budapest,\" J. Ambient Intell. Humaniz. Comput., vol. 0, no. 0, p. 0, 2019. DOI 10.1007\/S12652-019-01264-8","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"issue":"8","key":"e_1_3_2_1_24_1","first-page":"11","article-title":"Method for Determination of Cyber Threats Based on Machine Learning for Real-Time Information System","volume":"10","author":"Tolubko V.","year":"2018","unstructured":"V. Tolubko , \" Method for Determination of Cyber Threats Based on Machine Learning for Real-Time Information System ,\" Int. J. Intell. Syst. Appl. , vol. 10 , no. 8 , pp. 11 -- 18 , 2018 . DOI 10.5815\/IJISA.2018.08.02 V. Tolubko et al., \"Method for Determination of Cyber Threats Based on Machine Learning for Real-Time Information System,\" Int. J. Intell. Syst. Appl., vol. 10, no. 8, pp. 11--18, 2018. DOI 10.5815\/IJISA.2018.08.02","journal-title":"Int. J. Intell. Syst. Appl."}],"event":{"name":"ICISDM 2020: 2020 the 4th International Conference on Information System and Data Mining","acronym":"ICISDM 2020","location":"Hawaii HI USA"},"container-title":["Proceedings of the 2020 the 4th International Conference on Information System and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3404663.3404675","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3404663.3404675","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:18Z","timestamp":1750199898000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3404663.3404675"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,15]]},"references-count":24,"alternative-id":["10.1145\/3404663.3404675","10.1145\/3404663"],"URL":"https:\/\/doi.org\/10.1145\/3404663.3404675","relation":{},"subject":[],"published":{"date-parts":[[2020,5,15]]},"assertion":[{"value":"2020-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}