{"id":"https://openalex.org/W4414595720","doi":"https://doi.org/10.1007/s10922-025-09975-4","title":"Unified Quantitative Evaluation of System Severity: Leveraging Time to Compromise and Cost-Benefit Analysis for Enhanced vulnerability Risk Assessment","display_name":"Unified Quantitative Evaluation of System Severity: Leveraging Time to Compromise and Cost-Benefit Analysis for Enhanced vulnerability Risk Assessment","publication_year":2025,"publication_date":"2025-09-12","ids":{"openalex":"https://openalex.org/W4414595720","doi":"https://doi.org/10.1007/s10922-025-09975-4"},"language":"en","primary_location":{"id":"doi:10.1007/s10922-025-09975-4","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s10922-025-09975-4","pdf_url":null,"source":{"id":"https://openalex.org/S67072002","display_name":"Journal of Network and Systems Management","issn_l":"1064-7570","issn":["1064-7570","1573-7705"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Network and Systems Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100623717","display_name":"Jyoti Jyoti","orcid":null},"institutions":[{"id":"https://openalex.org/I70971781","display_name":"Dr. B. R. Ambedkar National Institute of Technology Jalandhar","ror":"https://ror.org/03xt0bg88","country_code":"IN","type":"education","lineage":["https://openalex.org/I70971781"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Jyoti","raw_affiliation_strings":["Department of Computer Science and Engineering, Dr BR Ambedkar National Institute of Technology, Jalandhar, Punjab, 144011, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Dr BR Ambedkar National Institute of Technology, Jalandhar, Punjab, 144011, India","institution_ids":["https://openalex.org/I70971781"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108943881","display_name":"Urvashi Bansal","orcid":null},"institutions":[{"id":"https://openalex.org/I70971781","display_name":"Dr. B. R. Ambedkar National Institute of Technology Jalandhar","ror":"https://ror.org/03xt0bg88","country_code":"IN","type":"education","lineage":["https://openalex.org/I70971781"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Urvashi Bansal","raw_affiliation_strings":["Department of Computer Science and Engineering, Dr BR Ambedkar National Institute of Technology, Jalandhar, Punjab, 144011, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Dr BR Ambedkar National Institute of Technology, Jalandhar, Punjab, 144011, India","institution_ids":["https://openalex.org/I70971781"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077283062","display_name":"Geeta Sikka","orcid":"https://orcid.org/0000-0003-4795-1842"},"institutions":[{"id":"https://openalex.org/I44635919","display_name":"National Institute of Technology Delhi","ror":"https://ror.org/032twef21","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210152752","https://openalex.org/I44635919"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Geeta Sikka","raw_affiliation_strings":["Department of Computer Science and Engineering, National Institute of Technology, Delhi, Delhi, 110036, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, National Institute of Technology, Delhi, Delhi, 110036, India","institution_ids":["https://openalex.org/I44635919"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052416182","display_name":"Lalit Kumar Awasthi","orcid":"https://orcid.org/0000-0001-8396-9025"},"institutions":[{"id":"https://openalex.org/I57085157","display_name":"Sardar Patel University","ror":"https://ror.org/05kfstc28","country_code":"IN","type":"education","lineage":["https://openalex.org/I57085157"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Lalit Kumar Awasthi","raw_affiliation_strings":["Department of Computer Science and Engineering, Sardar Patel University, Mandi, 175001, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Sardar Patel University, Mandi, 175001, India","institution_ids":["https://openalex.org/I57085157"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102757544","display_name":"Harsh Kumar Verma","orcid":"https://orcid.org/0000-0003-4826-6150"},"institutions":[{"id":"https://openalex.org/I70971781","display_name":"Dr. B. R. Ambedkar National Institute of Technology Jalandhar","ror":"https://ror.org/03xt0bg88","country_code":"IN","type":"education","lineage":["https://openalex.org/I70971781"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Harsh Kumar Verma","raw_affiliation_strings":["Department of Computer Science and Engineering, Dr BR Ambedkar National Institute of Technology, Jalandhar, Punjab, 144011, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Dr BR Ambedkar National Institute of Technology, Jalandhar, Punjab, 144011, India","institution_ids":["https://openalex.org/I70971781"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100623717"],"corresponding_institution_ids":["https://openalex.org/I70971781"],"apc_list":{"value":2190,"currency":"EUR","value_usd":2790},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.39358089,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"33","issue":"4","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.9150999784469604},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6960999965667725},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5799999833106995},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.5688999891281128},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4945000112056732},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.45989999175071716},{"id":"https://openalex.org/keywords/vulnerability-management","display_name":"Vulnerability management","score":0.4165000021457672},{"id":"https://openalex.org/keywords/risk-assessment","display_name":"Risk assessment","score":0.38749998807907104}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.9150999784469604},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8564000129699707},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6960999965667725},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6209999918937683},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5799999833106995},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.5778999924659729},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.5688999891281128},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4945000112056732},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.45989999175071716},{"id":"https://openalex.org/C172776598","wikidata":"https://www.wikidata.org/wiki/Q7943570","display_name":"Vulnerability management","level":4,"score":0.4165000021457672},{"id":"https://openalex.org/C12174686","wikidata":"https://www.wikidata.org/wiki/Q1058438","display_name":"Risk assessment","level":2,"score":0.38749998807907104},{"id":"https://openalex.org/C189430467","wikidata":"https://www.wikidata.org/wiki/Q7293293","display_name":"Ranking (information retrieval)","level":2,"score":0.3824999928474426},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.3779999911785126},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.375900000333786},{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.364300012588501},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.28450000286102295},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.28450000286102295},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.2768999934196472},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.2623000144958496},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.26019999384880066},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.25189998745918274}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s10922-025-09975-4","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s10922-025-09975-4","pdf_url":null,"source":{"id":"https://openalex.org/S67072002","display_name":"Journal of Network and Systems Management","issn_l":"1064-7570","issn":["1064-7570","1573-7705"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Network and Systems Management","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W82848659","https://openalex.org/W180604521","https://openalex.org/W1508191694","https://openalex.org/W1515452738","https://openalex.org/W1943711857","https://openalex.org/W1970903699","https://openalex.org/W1992578681","https://openalex.org/W2009495439","https://openalex.org/W2042743998","https://openalex.org/W2055844736","https://openalex.org/W2056152451","https://openalex.org/W2071513314","https://openalex.org/W2074648518","https://openalex.org/W2075556238","https://openalex.org/W2082666187","https://openalex.org/W2091046270","https://openalex.org/W2110908300","https://openalex.org/W2117210791","https://openalex.org/W2130373165","https://openalex.org/W2131875370","https://openalex.org/W2151369956","https://openalex.org/W2157841794","https://openalex.org/W2162142914","https://openalex.org/W2317787581","https://openalex.org/W2318930168","https://openalex.org/W2463489287","https://openalex.org/W2800109782","https://openalex.org/W2963622436","https://openalex.org/W3134018028","https://openalex.org/W3188982559","https://openalex.org/W3210360585","https://openalex.org/W4210318281","https://openalex.org/W4220744683","https://openalex.org/W4286633068","https://openalex.org/W4386575225","https://openalex.org/W4387969969","https://openalex.org/W4400985607"],"related_works":[],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2026-01-22T23:29:09.771500","created_date":"2025-10-10T00:00:00"}
