{"id":"https://openalex.org/W2895295682","doi":"https://doi.org/10.1007/978-3-030-01851-1_29","title":"An Efficient Algorithm for Network Vulnerability Analysis Under Malicious Attacks","display_name":"An Efficient Algorithm for Network Vulnerability Analysis Under Malicious Attacks","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2895295682","doi":"https://doi.org/10.1007/978-3-030-01851-1_29","mag":"2895295682"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-01851-1_29","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-01851-1_29","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084753554","display_name":"Toni Mancini","orcid":"https://orcid.org/0000-0003-3355-2170"},"institutions":[{"id":"https://openalex.org/I861853513","display_name":"Sapienza University of Rome","ror":"https://ror.org/02be6w209","country_code":"IT","type":"education","lineage":["https://openalex.org/I861853513"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Toni Mancini","raw_affiliation_strings":["Computer Science Department, Sapienza University of Rome, Rome, Italy"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Sapienza University of Rome, Rome, Italy","institution_ids":["https://openalex.org/I861853513"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052419841","display_name":"Federico Mari","orcid":"https://orcid.org/0000-0003-4289-9301"},"institutions":[{"id":"https://openalex.org/I861853513","display_name":"Sapienza University of Rome","ror":"https://ror.org/02be6w209","country_code":"IT","type":"education","lineage":["https://openalex.org/I861853513"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Federico Mari","raw_affiliation_strings":["Computer Science Department, Sapienza University of Rome, Rome, Italy"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Sapienza University of Rome, Rome, Italy","institution_ids":["https://openalex.org/I861853513"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085357809","display_name":"Igor Melatti","orcid":"https://orcid.org/0000-0002-6273-6190"},"institutions":[{"id":"https://openalex.org/I861853513","display_name":"Sapienza University of Rome","ror":"https://ror.org/02be6w209","country_code":"IT","type":"education","lineage":["https://openalex.org/I861853513"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Igor Melatti","raw_affiliation_strings":["Computer Science Department, Sapienza University of Rome, Rome, Italy"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Sapienza University of Rome, Rome, Italy","institution_ids":["https://openalex.org/I861853513"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028335233","display_name":"Ivano Salvo","orcid":"https://orcid.org/0000-0003-3111-701X"},"institutions":[{"id":"https://openalex.org/I861853513","display_name":"Sapienza University of Rome","ror":"https://ror.org/02be6w209","country_code":"IT","type":"education","lineage":["https://openalex.org/I861853513"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Ivano Salvo","raw_affiliation_strings":["Computer Science Department, Sapienza University of Rome, Rome, Italy"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Sapienza University of Rome, Rome, Italy","institution_ids":["https://openalex.org/I861853513"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010524910","display_name":"Enrico Tronci","orcid":"https://orcid.org/0000-0002-0377-3119"},"institutions":[{"id":"https://openalex.org/I861853513","display_name":"Sapienza University of Rome","ror":"https://ror.org/02be6w209","country_code":"IT","type":"education","lineage":["https://openalex.org/I861853513"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Enrico Tronci","raw_affiliation_strings":["Computer Science Department, Sapienza University of Rome, Rome, Italy"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Sapienza University of Rome, Rome, Italy","institution_ids":["https://openalex.org/I861853513"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5084753554"],"corresponding_institution_ids":["https://openalex.org/I861853513"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":1.6244,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.84213981,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"302","last_page":"312"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.927536129951477},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6581124067306519},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.58944171667099},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.49159273505210876},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4720913767814636},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.46553221344947815},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4495925307273865},{"id":"https://openalex.org/keywords/algorithm-design","display_name":"Algorithm design","score":0.4331624507904053},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.42365363240242004},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.4113858938217163},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.395706444978714},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.12792611122131348}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.927536129951477},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6581124067306519},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.58944171667099},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.49159273505210876},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4720913767814636},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.46553221344947815},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4495925307273865},{"id":"https://openalex.org/C106516650","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm design","level":2,"score":0.4331624507904053},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.42365363240242004},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.4113858938217163},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.395706444978714},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.12792611122131348},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-030-01851-1_29","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-01851-1_29","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:iris.uniroma1.it:11573/1184394","is_oa":false,"landing_page_url":"http://hdl.handle.net/11573/1184394","pdf_url":null,"source":{"id":"https://openalex.org/S4377196107","display_name":"IRIS Research product catalog (Sapienza University of Rome)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W98354153","https://openalex.org/W252848119","https://openalex.org/W1545244165","https://openalex.org/W1591532012","https://openalex.org/W1591939288","https://openalex.org/W1909495822","https://openalex.org/W1968766531","https://openalex.org/W1973245608","https://openalex.org/W1973971748","https://openalex.org/W1975035718","https://openalex.org/W1978520001","https://openalex.org/W1986538507","https://openalex.org/W1999929714","https://openalex.org/W2002900603","https://openalex.org/W2012338934","https://openalex.org/W2026786457","https://openalex.org/W2027587777","https://openalex.org/W2033346794","https://openalex.org/W2043005199","https://openalex.org/W2078667951","https://openalex.org/W2083658929","https://openalex.org/W2095072447","https://openalex.org/W2133494553","https://openalex.org/W2147322318","https://openalex.org/W2148837283","https://openalex.org/W2152121662","https://openalex.org/W2156954980","https://openalex.org/W2229536649","https://openalex.org/W2248858308","https://openalex.org/W2506585881","https://openalex.org/W2565382276","https://openalex.org/W2566646675","https://openalex.org/W2583964271","https://openalex.org/W2607220870","https://openalex.org/W2803654607","https://openalex.org/W2885434610","https://openalex.org/W2887291747","https://openalex.org/W2907780442","https://openalex.org/W4229927789","https://openalex.org/W4232840679"],"related_works":["https://openalex.org/W1969520404","https://openalex.org/W2996870081","https://openalex.org/W2512471015","https://openalex.org/W2776339097","https://openalex.org/W2140877831","https://openalex.org/W2525240380","https://openalex.org/W2365555924","https://openalex.org/W2381675874","https://openalex.org/W2926217729","https://openalex.org/W3048223321","https://openalex.org/W2325170445","https://openalex.org/W2071376663","https://openalex.org/W2056934050","https://openalex.org/W2949790443","https://openalex.org/W2606747248","https://openalex.org/W2604998296","https://openalex.org/W2348101391","https://openalex.org/W2942223572","https://openalex.org/W2916805891","https://openalex.org/W2166414367"],"abstract_inverted_index":null,"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
