{"id":"https://openalex.org/W4414376989","doi":"https://doi.org/10.1007/s10207-025-01125-w","title":"Progressive attack graph: a technique for scalable and adaptive attack graph generation","display_name":"Progressive attack graph: a technique for scalable and adaptive attack graph generation","publication_year":2025,"publication_date":"2025-09-20","ids":{"openalex":"https://openalex.org/W4414376989","doi":"https://doi.org/10.1007/s10207-025-01125-w"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-025-01125-w","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-025-01125-w","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01125-w.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01125-w.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101415855","display_name":"A. Palma","orcid":"https://orcid.org/0000-0002-9104-9904"},"institutions":[{"id":"https://openalex.org/I861853513","display_name":"Sapienza University of Rome","ror":"https://ror.org/02be6w209","country_code":"IT","type":"education","lineage":["https://openalex.org/I861853513"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Alessandro Palma","raw_affiliation_strings":["Sapienza University of Rome, Rome, Italy"],"affiliations":[{"raw_affiliation_string":"Sapienza University of Rome, Rome, Italy","institution_ids":["https://openalex.org/I861853513"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5119685838","display_name":"Claudio Cicimurri","orcid":null},"institutions":[{"id":"https://openalex.org/I861853513","display_name":"Sapienza University of Rome","ror":"https://ror.org/02be6w209","country_code":"IT","type":"education","lineage":["https://openalex.org/I861853513"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Claudio Cicimurri","raw_affiliation_strings":["Sapienza University of Rome, Rome, Italy"],"affiliations":[{"raw_affiliation_string":"Sapienza University of Rome, Rome, Italy","institution_ids":["https://openalex.org/I861853513"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024565069","display_name":"Marco Angelini","orcid":"https://orcid.org/0000-0001-9051-6972"},"institutions":[{"id":"https://openalex.org/I42775652","display_name":"Link Campus University","ror":"https://ror.org/035mh1293","country_code":"IT","type":"education","lineage":["https://openalex.org/I42775652"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Marco Angelini","raw_affiliation_strings":["Link Campus University, Rome, Italy"],"affiliations":[{"raw_affiliation_string":"Link Campus University, Rome, Italy","institution_ids":["https://openalex.org/I42775652"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101415855"],"corresponding_institution_ids":["https://openalex.org/I861853513"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":{"value":2590,"currency":"EUR","value_usd":3190},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.36885709,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"24","issue":"5","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7357000112533569},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5508999824523926},{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.5135999917984009},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.43380001187324524},{"id":"https://openalex.org/keywords/adaptability","display_name":"Adaptability","score":0.40939998626708984},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4047999978065491},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.33959999680519104},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.336899995803833}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8626000285148621},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7357000112533569},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5508999824523926},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.5135999917984009},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.49799999594688416},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.43380001187324524},{"id":"https://openalex.org/C177606310","wikidata":"https://www.wikidata.org/wiki/Q5674297","display_name":"Adaptability","level":2,"score":0.40939998626708984},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4047999978065491},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.38769999146461487},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.33959999680519104},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3391000032424927},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.336899995803833},{"id":"https://openalex.org/C2777303404","wikidata":"https://www.wikidata.org/wiki/Q759757","display_name":"Convergence (economics)","level":2,"score":0.31119999289512634},{"id":"https://openalex.org/C201866948","wikidata":"https://www.wikidata.org/wiki/Q228206","display_name":"Random number generation","level":2,"score":0.3068000078201294},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3059999942779541},{"id":"https://openalex.org/C311688","wikidata":"https://www.wikidata.org/wiki/Q2393193","display_name":"Time complexity","level":2,"score":0.27459999918937683},{"id":"https://openalex.org/C188198153","wikidata":"https://www.wikidata.org/wiki/Q1613840","display_name":"Limiting","level":2,"score":0.27230000495910645},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.26969999074935913},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2648000121116638},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.2639000117778778},{"id":"https://openalex.org/C114289077","wikidata":"https://www.wikidata.org/wiki/Q3284399","display_name":"Statistical model","level":2,"score":0.257999986410141},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2556000053882599}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s10207-025-01125-w","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-025-01125-w","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01125-w.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},{"id":"pmh:oai:iris.uniroma1.it:11573/1746837","is_oa":true,"landing_page_url":"https://hdl.handle.net/11573/1746837","pdf_url":null,"source":{"id":"https://openalex.org/S4377196107","display_name":"IRIS Research product catalog (Sapienza University of Rome)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"doi:10.1007/s10207-025-01125-w","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-025-01125-w","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01125-w.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3419278692","display_name":null,"funder_award_id":"101103386","funder_id":"https://openalex.org/F4320318377","funder_display_name":"European Defence Fund"},{"id":"https://openalex.org/G4060470826","display_name":null,"funder_award_id":"101103386","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G507880695","display_name":null,"funder_award_id":"PE00000014","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G8051717526","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G8893660128","display_name":null,"funder_award_id":"PE0000001","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320318377","display_name":"European Defence Fund","ror":null},{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4414376989.pdf","grobid_xml":"https://content.openalex.org/works/W4414376989.grobid-xml"},"referenced_works_count":60,"referenced_works":["https://openalex.org/W191486739","https://openalex.org/W1526913711","https://openalex.org/W1558755690","https://openalex.org/W1987552279","https://openalex.org/W2087102863","https://openalex.org/W2089396968","https://openalex.org/W2100033648","https://openalex.org/W2100852567","https://openalex.org/W2121805588","https://openalex.org/W2128523796","https://openalex.org/W2153580689","https://openalex.org/W2191886897","https://openalex.org/W2303212871","https://openalex.org/W2317787581","https://openalex.org/W2331828547","https://openalex.org/W2514968539","https://openalex.org/W2584841233","https://openalex.org/W2605547456","https://openalex.org/W2613977673","https://openalex.org/W2622921428","https://openalex.org/W2742428107","https://openalex.org/W2753055686","https://openalex.org/W2783988830","https://openalex.org/W2784005036","https://openalex.org/W2810054394","https://openalex.org/W2811283511","https://openalex.org/W2887949427","https://openalex.org/W2901496284","https://openalex.org/W2902270076","https://openalex.org/W2907492528","https://openalex.org/W2944521607","https://openalex.org/W2962756421","https://openalex.org/W2977278162","https://openalex.org/W3015342250","https://openalex.org/W3015650867","https://openalex.org/W3021463363","https://openalex.org/W3046387889","https://openalex.org/W3086625638","https://openalex.org/W3134018028","https://openalex.org/W3156588337","https://openalex.org/W3188912055","https://openalex.org/W3211888892","https://openalex.org/W4206266728","https://openalex.org/W4210667830","https://openalex.org/W4229020733","https://openalex.org/W4236894168","https://openalex.org/W4242741415","https://openalex.org/W4246495001","https://openalex.org/W4255375128","https://openalex.org/W4281618615","https://openalex.org/W4288057795","https://openalex.org/W4288057803","https://openalex.org/W4310762541","https://openalex.org/W4313256807","https://openalex.org/W4316661052","https://openalex.org/W4378587114","https://openalex.org/W4385730917","https://openalex.org/W4391511364","https://openalex.org/W4399177367","https://openalex.org/W4402212989"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"In":[1],"modern":[2],"computer":[3,38],"networks":[4,295],"where":[5],"sophisticated":[6],"cyber":[7,13,28],"attacks":[8,36],"occur":[9],"daily,":[10],"a":[11,22,118,290],"timely":[12],"risk":[14,29],"assessment":[15,30],"becomes":[16],"paramount.":[17],"Attack":[18],"Graph":[19],"(AG)":[20],"constitutes":[21],"highly":[23],"effective":[24],"solution":[25],"for":[26,78,232],"performing":[27],"in":[31,62,99,121,218,306],"the":[32,51,56,74,85,111,123,127,135,138,159,170,178,181,191,197,214,219,228,240,246,269,276,279,301],"context":[33],"of":[34,55,88,137,180,184,201,213,221,278,296,303,308],"multi-step":[35],"on":[37,294],"networks.":[39],"However,":[40],"its":[41],"construction":[42],"is":[43,189],"hindered":[44],"by":[45,163,204,242],"significant":[46],"scalability":[47,309],"challenges":[48],"arising":[49],"from":[50,262],"inherent":[52],"combinatorial":[53],"complexity":[54],"process.":[57],"This":[58],"sequential":[59],"methodology":[60],"results":[61],"prolonged":[63],"delays":[64],"before":[65,134],"analytical":[66],"capabilities":[67,161,277],"can":[68,125],"be":[69],"leveraged.":[70],"Moreover,":[71],"due":[72],"to":[73,95,101,195,238,258,267,312],"extended":[75],"time":[76],"required":[77],"AG":[79,113,139,171,230],"generation,":[80],"existing":[81],"techniques":[82],"poorly":[83],"capture":[84],"dynamic":[86],"evolution":[87],"network":[89],"structures,":[90],"thereby":[91],"limiting":[92],"their":[93],"ability":[94],"provide":[96],"real-time":[97,132,160],"adaptability":[98],"response":[100],"environmental":[102],"changes.":[103],"To":[104,145,274],"mitigate":[105],"these":[106],"problems,":[107],"this":[108,147],"paper":[109],"rethinks":[110],"classic":[112],"analysis":[114,133,153,247],"through":[115],"StatAG":[116],",":[117],"novel":[119],"workflow":[120],"which":[122],"analyst":[124],"query":[126],"system":[128],"anytime,":[129],"thus":[130],"enabling":[131,272],"completion":[136],"generation":[140,172,231,241],"with":[141,155,173,245],"quantifiable":[142],"statistical":[143,156,182,225],"significance.":[144],"achieve":[146],"goal,":[148],"we":[149,166,235,282],"leverage":[150],"progressive":[151,164,229],"data":[152],"combined":[154],"analysis.":[157],"Beyond":[158],"enabled":[162],"computation,":[165],"further":[167],"speed":[168],"up":[169],"two":[174],"algorithms":[175],"that":[176],"accelerate":[177,239],"convergence":[179],"significance":[183,226],"generated":[185,264],"AG.":[186],"The":[187,207],"former":[188],"about":[190],"weighted":[192],"path":[193,315],"sampling":[194],"avoid":[196],"possible":[198],"high":[199],"number":[200,220],"collisions":[202],"introduced":[203],"random":[205],"walks.":[206],"latter":[208],"proposes":[209],"an":[210,284],"approximated":[211],"version":[212],"Kolmogorov-Smirnov":[215],"distance":[216],"linear":[217],"attack":[222,265,314],"paths.":[223],"While":[224],"enables":[227],"every":[233],"analysis,":[234],"present":[236,289],"SteerAG":[237,249],"steering":[243,270],"it":[244],"query.":[248],"leverages":[250],"Machine":[251],"Learning":[252],"(ML)":[253],"models,":[254],"specifically":[255],"decision":[256],"trees,":[257],"learn":[259],"vulnerability":[260],"features":[261],"already":[263],"paths":[266],"derive":[268],"rules":[271],"acceleration.":[273],"show":[275],"proposed":[280],"workflow,":[281],"perform":[283],"extensive":[285],"quantitative":[286],"validation":[287],"and":[288,310],"realistic":[291],"case":[292],"study":[293],"unprecedented":[297],"size.":[298],"It":[299],"demonstrates":[300],"advantages":[302],"our":[304],"approach":[305],"terms":[307],"fitting":[311],"common":[313],"analyses.":[316]},"counts_by_year":[],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
