{"id":"https://openalex.org/W2766742690","doi":"https://doi.org/10.1007/s00779-017-1084-3","title":"Dynamically enabled defense effectiveness evaluation of a home Internet based on vulnerability analysis and attack layer measurement","display_name":"Dynamically enabled defense effectiveness evaluation of a home Internet based on vulnerability analysis and attack layer measurement","publication_year":2017,"publication_date":"2017-11-02","ids":{"openalex":"https://openalex.org/W2766742690","doi":"https://doi.org/10.1007/s00779-017-1084-3","mag":"2766742690"},"language":"en","primary_location":{"id":"doi:10.1007/s00779-017-1084-3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s00779-017-1084-3","pdf_url":"https://link.springer.com/content/pdf/10.1007/s00779-017-1084-3.pdf","source":{"id":"https://openalex.org/S58126648","display_name":"Personal and Ubiquitous Computing","issn_l":"1617-4909","issn":["1617-4909","1617-4917"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Personal and Ubiquitous Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s00779-017-1084-3.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Min Lei","orcid":"https://orcid.org/0000-0002-1232-2053"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]},{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]},{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Min Lei","raw_affiliation_strings":["Guizhou Provincial Key Laboratory of Public Big Data, Guizhou University, Guiyang, Guizhou, 550025, China","Information Security Center, Beijing University of Posts and Telecommunications, Beijing, 100876, China","Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing, 210044, China"],"affiliations":[{"raw_affiliation_string":"Guizhou Provincial Key Laboratory of Public Big Data, Guizhou University, Guiyang, Guizhou, 550025, China","institution_ids":["https://openalex.org/I178232147"]},{"raw_affiliation_string":"Information Security Center, Beijing University of Posts and Telecommunications, Beijing, 100876, China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing, 210044, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060773798","display_name":"Yang Yu","orcid":"https://orcid.org/0000-0002-5045-804X"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]},{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Yang","raw_affiliation_strings":["Guizhou Provincial Key Laboratory of Public Big Data, Guizhou University, Guiyang, Guizhou, 550025, China","Information Security Center, Beijing University of Posts and Telecommunications, Beijing, 100876, China"],"affiliations":[{"raw_affiliation_string":"Guizhou Provincial Key Laboratory of Public Big Data, Guizhou University, Guiyang, Guizhou, 550025, China","institution_ids":["https://openalex.org/I178232147"]},{"raw_affiliation_string":"Information Security Center, Beijing University of Posts and Telecommunications, Beijing, 100876, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008846998","display_name":"Nan Ma","orcid":"https://orcid.org/0000-0002-2302-7148"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]},{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Nan Ma","raw_affiliation_strings":["Guizhou Provincial Key Laboratory of Public Big Data, Guizhou University, Guiyang, Guizhou, 550025, China","Information Security Center, Beijing University of Posts and Telecommunications, Beijing, 100876, China"],"affiliations":[{"raw_affiliation_string":"Guizhou Provincial Key Laboratory of Public Big Data, Guizhou University, Guiyang, Guizhou, 550025, China","institution_ids":["https://openalex.org/I178232147"]},{"raw_affiliation_string":"Information Security Center, Beijing University of Posts and Telecommunications, Beijing, 100876, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037832021","display_name":"Huizhong Sun","orcid":"https://orcid.org/0000-0002-1232-2053"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]},{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huizhong Sun","raw_affiliation_strings":["Guizhou Provincial Key Laboratory of Public Big Data, Guizhou University, Guiyang, Guizhou, 550025, China","Information Security Center, Beijing University of Posts and Telecommunications, Beijing, 100876, China"],"affiliations":[{"raw_affiliation_string":"Guizhou Provincial Key Laboratory of Public Big Data, Guizhou University, Guiyang, Guizhou, 550025, China","institution_ids":["https://openalex.org/I178232147"]},{"raw_affiliation_string":"Information Security Center, Beijing University of Posts and Telecommunications, Beijing, 100876, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078649829","display_name":"Chunru Zhou","orcid":"https://orcid.org/0000-0002-9601-7282"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]},{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunru Zhou","raw_affiliation_strings":["Guizhou Provincial Key Laboratory of Public Big Data, Guizhou University, Guiyang, Guizhou, 550025, China","Information Security Center, Beijing University of Posts and Telecommunications, Beijing, 100876, China"],"affiliations":[{"raw_affiliation_string":"Guizhou Provincial Key Laboratory of Public Big Data, Guizhou University, Guiyang, Guizhou, 550025, China","institution_ids":["https://openalex.org/I178232147"]},{"raw_affiliation_string":"Information Security Center, Beijing University of Posts and Telecommunications, Beijing, 100876, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078634852","display_name":"Minyao Ma","orcid":"https://orcid.org/0000-0001-9793-8860"},"institutions":[{"id":"https://openalex.org/I4210087731","display_name":"Guizhou Education University","ror":"https://ror.org/002x6f380","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210087731"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Minyao Ma","raw_affiliation_strings":["School of Mathematics and Computer Science, Guizhou Education University, Guiyang, 550018, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics and Computer Science, Guizhou Education University, Guiyang, 550018, China","institution_ids":["https://openalex.org/I4210087731"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I139759216","https://openalex.org/I178232147","https://openalex.org/I200845125"],"apc_list":{"value":2490,"currency":"EUR","value_usd":3090},"apc_paid":{"value":2490,"currency":"EUR","value_usd":3090},"fwci":0.6578,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.74545722,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"22","issue":"1","first_page":"153","last_page":"162"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7975283265113831},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.7224799394607544},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6888327598571777},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.6448488831520081},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6364036202430725},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.5967000722885132},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.08766469359397888}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7975283265113831},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.7224799394607544},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6888327598571777},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.6448488831520081},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6364036202430725},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.5967000722885132},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.08766469359397888},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s00779-017-1084-3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s00779-017-1084-3","pdf_url":"https://link.springer.com/content/pdf/10.1007/s00779-017-1084-3.pdf","source":{"id":"https://openalex.org/S58126648","display_name":"Personal and Ubiquitous Computing","issn_l":"1617-4909","issn":["1617-4909","1617-4917"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Personal and Ubiquitous Computing","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1007/s00779-017-1084-3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s00779-017-1084-3","pdf_url":"https://link.springer.com/content/pdf/10.1007/s00779-017-1084-3.pdf","source":{"id":"https://openalex.org/S58126648","display_name":"Personal and Ubiquitous Computing","issn_l":"1617-4909","issn":["1617-4909","1617-4917"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Personal and Ubiquitous Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.6700000166893005,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G1007721318","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320327518","funder_display_name":"Priority Academic Program Development of Jiangsu Higher Education Institutions"}],"funders":[{"id":"https://openalex.org/F4320327518","display_name":"Priority Academic Program Development of Jiangsu Higher Education Institutions","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2766742690.pdf","grobid_xml":"https://content.openalex.org/works/W2766742690.grobid-xml"},"referenced_works_count":15,"referenced_works":["https://openalex.org/W1536076478","https://openalex.org/W1979493600","https://openalex.org/W1991882944","https://openalex.org/W2029815481","https://openalex.org/W2098707435","https://openalex.org/W2159743395","https://openalex.org/W2387983307","https://openalex.org/W2486125865","https://openalex.org/W2536888212","https://openalex.org/W2546607553","https://openalex.org/W2560195950","https://openalex.org/W2600390930","https://openalex.org/W2601353362","https://openalex.org/W2612715417","https://openalex.org/W2616646314"],"related_works":["https://openalex.org/W1883246888","https://openalex.org/W2725637128","https://openalex.org/W2897593657","https://openalex.org/W3006507989","https://openalex.org/W4251184983","https://openalex.org/W2371430952","https://openalex.org/W2381740503","https://openalex.org/W2370114625","https://openalex.org/W2947584067","https://openalex.org/W3118510577"],"abstract_inverted_index":{"Smart":[0],"devices":[1],"in":[2],"a":[3,17,61,92,110],"home":[4,47,192,218],"Internet,":[5],"such":[6],"as":[7],"routers":[8],"and":[9,81],"cameras,":[10],"suffer":[11],"malicious":[12],"attacks":[13],"from":[14],"hackers":[15],"on":[16,50,100],"daily":[18],"basis.":[19],"Defenders":[20],"should":[21,87],"change":[22,172,177],"system":[23,79,173,208,220],"states":[24,209],"dynamically":[25],"to":[26],"improve":[27],"the":[28,51,83,96,101,120,128,149,162,169,176,191,196,201,207,217],"system\u2019s":[29],"defense":[30,36,70,123,223],"ability.":[31,71,224],"To":[32,136],"quantify":[33],"evaluation":[34],"of":[35,85,112,151,188],"effectiveness,":[37],"this":[38,140],"paper":[39,141],"proposes":[40],"an":[41,113],"improved":[42],"vulnerability":[43,62,66,202],"scoring":[44],"method":[45,73,94,108],"for":[46,95],"Internets":[48],"based":[49,99],"Information":[52],"Security":[53,55],"Technology":[54],"Vulnerability":[56],"Classification":[57],"Guide,":[58],"which":[59,168],"calculates":[60],"score.":[63],"A":[64],"higher":[65],"score":[67],"indicates":[68],"weaker":[69],"This":[72,107,158],"only":[74],"considers":[75],"defense.":[76],"In":[77],"actual":[78],"attack":[80,97,114,130],"defense,":[82],"actions":[84],"attackers":[86,184],"also":[88,160],"be":[89],"considered.":[90],"Therefore,":[91],"measurement":[93],"layer":[98,115,131],"Markov":[102],"chain":[103],"(MC)":[104],"is":[105,124,180],"proposed.":[106],"builds":[109],"model":[111,159],"that":[116,148,199],"can":[117],"assess":[118],"whether":[119],"defender\u2019s":[121],"dynamic":[122],"effective":[125],"by":[126],"calculating":[127],"factor":[129],"detection":[132],"probability":[133,187],"P":[134],"d.":[135],"optimize":[137],"computing":[138],"process,":[139],"introduces":[142],"stochastic":[143],"Petri":[144],"nets":[145],"(SPN)":[146],"so":[147],"parameters":[150],"MC":[152],"transition":[153],"matrix":[154],"are":[155,204,210],"easily":[156],"gained.":[157],"obtains":[161],"minimum":[163],"time":[164,178],"period":[165,179],"\u0394t,":[166,183],"during":[167],"defender":[170],"must":[171],"states.":[174],"If":[175],"greater":[181],"than":[182],"increase":[185],"their":[186],"hacking":[189],"into":[190],"Internet":[193,219],"system.":[194],"Finally,":[195],"study":[197],"concludes":[198],"if":[200],"scores":[203],"lower":[205],"after":[206],"changed,":[211],"\u0394t":[212],"will":[213],"become":[214],"longer,":[215],"meaning":[216],"has":[221],"enhanced":[222]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
