{"id":"https://openalex.org/W4390984908","doi":"https://doi.org/10.1007/s43926-023-00054-1","title":"Determining critical nodes in optimal cost attacks on networked infrastructures","display_name":"Determining critical nodes in optimal cost attacks on networked infrastructures","publication_year":2024,"publication_date":"2024-01-18","ids":{"openalex":"https://openalex.org/W4390984908","doi":"https://doi.org/10.1007/s43926-023-00054-1"},"language":"en","primary_location":{"id":"doi:10.1007/s43926-023-00054-1","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-023-00054-1","pdf_url":"https://link.springer.com/content/pdf/10.1007/s43926-023-00054-1.pdf","source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007/s43926-023-00054-1.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103430533","display_name":"Ishfaq Ahmad","orcid":null},"institutions":[{"id":"https://openalex.org/I189196454","display_name":"The University of Texas at Arlington","ror":"https://ror.org/019kgqr73","country_code":"US","type":"education","lineage":["https://openalex.org/I189196454"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ishfaq Ahmad","raw_affiliation_strings":["Computer Science and Engineering, The University of Texas at Arlington, Arlington, TX, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, The University of Texas at Arlington, Arlington, TX, USA","institution_ids":["https://openalex.org/I189196454"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055231531","display_name":"Addison Clark","orcid":"https://orcid.org/0000-0003-1313-3921"},"institutions":[{"id":"https://openalex.org/I189196454","display_name":"The University of Texas at Arlington","ror":"https://ror.org/019kgqr73","country_code":"US","type":"education","lineage":["https://openalex.org/I189196454"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Addison Clark","raw_affiliation_strings":["Computer Science and Engineering, The University of Texas at Arlington, Arlington, TX, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, The University of Texas at Arlington, Arlington, TX, USA","institution_ids":["https://openalex.org/I189196454"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018861633","display_name":"Muhammad Ali","orcid":"https://orcid.org/0000-0001-5641-8033"},"institutions":[{"id":"https://openalex.org/I189196454","display_name":"The University of Texas at Arlington","ror":"https://ror.org/019kgqr73","country_code":"US","type":"education","lineage":["https://openalex.org/I189196454"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Muhammad Ali","raw_affiliation_strings":["Computer Science and Engineering, The University of Texas at Arlington, Arlington, TX, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, The University of Texas at Arlington, Arlington, TX, USA","institution_ids":["https://openalex.org/I189196454"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108569282","display_name":"Hansheng Lei","orcid":null},"institutions":[{"id":"https://openalex.org/I2802326326","display_name":"The University of Texas Rio Grande Valley","ror":"https://ror.org/02p5xjf12","country_code":"US","type":"education","lineage":["https://openalex.org/I2802326326"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hansheng Lei","raw_affiliation_strings":["The University of Texas at Rio Grande, Brownsville, TX, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"The University of Texas at Rio Grande, Brownsville, TX, USA","institution_ids":["https://openalex.org/I2802326326"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047717212","display_name":"David D. Ferris","orcid":"https://orcid.org/0000-0002-4250-3023"},"institutions":[{"id":"https://openalex.org/I1280414376","display_name":"United States Air Force Research Laboratory","ror":"https://ror.org/02e2egq70","country_code":"US","type":"facility","lineage":["https://openalex.org/I1280414376","https://openalex.org/I1330347796","https://openalex.org/I4210102105","https://openalex.org/I4389425425"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"David Ferris","raw_affiliation_strings":["Air Force Research Labs, Rome, NY, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Air Force Research Labs, Rome, NY, USA","institution_ids":["https://openalex.org/I1280414376"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088781157","display_name":"Alexander Aved","orcid":"https://orcid.org/0000-0002-7015-7359"},"institutions":[{"id":"https://openalex.org/I1280414376","display_name":"United States Air Force Research Laboratory","ror":"https://ror.org/02e2egq70","country_code":"US","type":"facility","lineage":["https://openalex.org/I1280414376","https://openalex.org/I1330347796","https://openalex.org/I4210102105","https://openalex.org/I4389425425"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alex Aved","raw_affiliation_strings":["Air Force Research Labs, Rome, NY, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Air Force Research Labs, Rome, NY, USA","institution_ids":["https://openalex.org/I1280414376"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5103430533"],"corresponding_institution_ids":["https://openalex.org/I189196454"],"apc_list":{"value":990,"currency":"EUR","value_usd":1067},"apc_paid":{"value":990,"currency":"EUR","value_usd":1067},"fwci":1.3044,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.79561236,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":"4","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.680090069770813},{"id":"https://openalex.org/keywords/damages","display_name":"Damages","score":0.6552149057388306},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6514272093772888},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.6412984132766724},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.47498220205307007},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4721004366874695},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.42089781165122986},{"id":"https://openalex.org/keywords/harm","display_name":"Harm","score":0.4184657335281372}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.680090069770813},{"id":"https://openalex.org/C2777381055","wikidata":"https://www.wikidata.org/wiki/Q308922","display_name":"Damages","level":2,"score":0.6552149057388306},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6514272093772888},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.6412984132766724},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.47498220205307007},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4721004366874695},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.42089781165122986},{"id":"https://openalex.org/C2777363581","wikidata":"https://www.wikidata.org/wiki/Q15098235","display_name":"Harm","level":2,"score":0.4184657335281372},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/s43926-023-00054-1","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-023-00054-1","pdf_url":"https://link.springer.com/content/pdf/10.1007/s43926-023-00054-1.pdf","source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},{"id":"pmh:oai:scholarworks.utrgv.edu:ies_fac-1037","is_oa":true,"landing_page_url":"https://scholarworks.utrgv.edu/ies_fac/38","pdf_url":null,"source":{"id":"https://openalex.org/S4306402611","display_name":"ScholarWorks @ UTRGV (The University of Texas Rio Grande Valley)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2802326326","host_organization_name":"The University of Texas Rio Grande Valley","host_organization_lineage":["https://openalex.org/I2802326326"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Informatics and Engineering Systems Faculty Publications and Presentations","raw_type":"text"},{"id":"pmh:oai:doaj.org/article:49da2231ef76459dbf839564c8af26a4","is_oa":true,"landing_page_url":"https://doaj.org/article/49da2231ef76459dbf839564c8af26a4","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Discover Internet of Things, Vol 4, Iss 1, Pp 1-21 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s43926-023-00054-1","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-023-00054-1","pdf_url":"https://link.springer.com/content/pdf/10.1007/s43926-023-00054-1.pdf","source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6000000238418579}],"awards":[{"id":"https://openalex.org/G8279543984","display_name":null,"funder_award_id":"SA2018-UP-025","funder_id":"https://openalex.org/F4320338294","funder_display_name":"Air Force Research Laboratory"}],"funders":[{"id":"https://openalex.org/F4320338294","display_name":"Air Force Research Laboratory","ror":"https://ror.org/02e2egq70"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4390984908.pdf"},"referenced_works_count":25,"referenced_works":["https://openalex.org/W1650742658","https://openalex.org/W1934657228","https://openalex.org/W1968164782","https://openalex.org/W1968686485","https://openalex.org/W1985909783","https://openalex.org/W2008620264","https://openalex.org/W2065769502","https://openalex.org/W2118130602","https://openalex.org/W2121035174","https://openalex.org/W2129653531","https://openalex.org/W2137007447","https://openalex.org/W2153561032","https://openalex.org/W2159863842","https://openalex.org/W2160280191","https://openalex.org/W2260752211","https://openalex.org/W2346195346","https://openalex.org/W2348110992","https://openalex.org/W2892495368","https://openalex.org/W2921931885","https://openalex.org/W2945265991","https://openalex.org/W3091426098","https://openalex.org/W3100955983","https://openalex.org/W3164769453","https://openalex.org/W4289334519","https://openalex.org/W4315562685"],"related_works":["https://openalex.org/W4205240985","https://openalex.org/W2314597598","https://openalex.org/W1527183021","https://openalex.org/W3122766811","https://openalex.org/W2159917235","https://openalex.org/W2125431935","https://openalex.org/W4380356160","https://openalex.org/W4366371413","https://openalex.org/W4297199789","https://openalex.org/W2380314794"],"abstract_inverted_index":{"Abstract":[0],"A":[1,82],"wide":[2,10],"range":[3],"of":[4,98,108,121,144,224,245,264,285,295,305,310],"critical":[5,119,146,178],"infrastructures":[6,43],"are":[7,34,170],"connected":[8],"via":[9],"area":[11],"networks":[12],"as":[13,15,28,65],"well":[14],"the":[16,89,95,105,117,122,125,128,134,142,145,150,153,162,175,191,201,207,221,227,231,249,258,272,281,286,303],"Internet-of-Thing":[17],"(IoT).":[18],"Apart":[19],"from":[20],"natural":[21],"disasters,":[22],"these":[23,42],"infrastructures,":[24],"providing":[25],"services":[26],"such":[27],"electricity,":[29],"water,":[30],"gas,":[31],"and":[32,53,55,72,77,155,164,194],"Internet,":[33],"vulnerable":[35],"to":[36,41,87,93,103,115,132,166,174,270,313],"terrorist":[37],"attacks.":[38],"Clearly,":[39],"damages":[40],"can":[44,62],"have":[45],"dire":[46],"consequences":[47],"on":[48],"economics,":[49],"health":[50],"services,":[51],"security":[52,143],"safety,":[54],"various":[56,298],"business":[57],"sectors.":[58],"An":[59],"infrastructure":[60],"network":[61],"be":[63,114,131],"represented":[64],"a":[66,181,197,235,252,261],"directed":[67],"graph":[68],"in":[69,140,149,308],"which":[70,168],"nodes":[71,120,169,179],"edges":[73],"denote":[74],"operation":[75],"entities":[76],"dependencies":[78],"between":[79,152],"entities,":[80],"respectively.":[81],"knowledgeable":[83],"attacker":[84,154,163,237],"who":[85],"plans":[86],"harm":[88],"system":[90],"would":[91,113,130,238],"aim":[92],"use":[94],"minimum":[96],"amount":[97,107,263],"effort,":[99],"cost,":[100],"or":[101,215,256],"resources":[102,139],"yield":[104],"maximum":[106],"damage.":[109,265],"Their":[110],"best":[111],"strategy":[112,129],"attack":[116,204,222,233,254],"most":[118,171],"infrastructure.":[123],"From":[124],"defender\u2019s":[126],"side,":[127],"minimize":[133],"potential":[135],"damage":[136,250],"by":[137,275],"investing":[138],"bolstering":[141],"nodes.":[147],"Thus,":[148],"struggle":[151],"defender,":[156],"it":[157],"becomes":[158],"important":[159],"for":[160,199,251,260,283],"both":[161],"defender":[165],"identify":[167],"critically":[172],"significant":[173],"system.":[176],"Identifying":[177],"is":[180],"complex":[182],"optimization":[183],"problem.":[184],"In":[185],"this":[186],"paper,":[187],"we":[188],"first":[189],"present":[190],"problem":[192,241],"model":[193,212,242],"then":[195],"propose":[196],"solution":[198],"computing":[200],"optimal":[202,232],"cost":[203,223,259],"while":[205,279],"considering":[206,220],"failure":[208],"propagation.":[209],"The":[210,289,300],"proposed":[211,228],"represents":[213],"one":[214,244],"multiple":[216],"interconnected":[217],"infrastructures.":[218],"While":[219],"each":[225,284],"node,":[226],"method":[229],"computes":[230],"that":[234],"rational":[236],"make.":[239],"Our":[240,266],"simulates":[243],"two":[246],"goals:":[247],"maximizing":[248],"given":[253,262],"budget":[255],"minimizing":[257],"technique":[267,307],"obtains":[268],"solutions":[269,315],"optimize":[271],"objective":[273],"functions":[274],"utilizing":[276],"integer-linear":[277],"programming":[278],"observing":[280],"constraints":[282],"specified":[287],"goals.":[288],"paper":[290],"reports":[291],"an":[292],"extensive":[293],"set":[294],"experiments":[296],"using":[297],"graphs.":[299],"results":[301],"show":[302],"efficacy":[304],"our":[306],"terms":[309],"its":[311],"ability":[312],"obtain":[314],"with":[316],"fast":[317],"turnaround":[318],"times.":[319]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2}],"updated_date":"2026-05-13T08:25:38.343686","created_date":"2025-10-10T00:00:00"}
