{"id":"https://openalex.org/W4408292523","doi":"https://doi.org/10.1051/sands/2025003","title":"Threat ripple model: A model to characterize business-oriented attacks based on business dependencies","display_name":"Threat ripple model: A model to characterize business-oriented attacks based on business dependencies","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4408292523","doi":"https://doi.org/10.1051/sands/2025003"},"language":"en","primary_location":{"id":"doi:10.1051/sands/2025003","is_oa":true,"landing_page_url":"https://doi.org/10.1051/sands/2025003","pdf_url":"https://sands.edpsciences.org/articles/sands/pdf/forth/sands20240035.pdf","source":{"id":"https://openalex.org/S4387281467","display_name":"Security and Safety","issn_l":"2826-1275","issn":["2826-1275"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319748","host_organization_name":"EDP Sciences","host_organization_lineage":["https://openalex.org/P4310319748"],"host_organization_lineage_names":["EDP Sciences"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Safety","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://sands.edpsciences.org/articles/sands/pdf/forth/sands20240035.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076483974","display_name":"Shiliang Ao","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Shiliang Ao","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113587199","display_name":"Binxing Fang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Binxing Fang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011645461","display_name":"Xinguang Xiao","orcid":"https://orcid.org/0000-0002-8252-9973"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xinguang Xiao","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5052156908","display_name":"H Zhang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hongli Zhang","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5076483974"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.05908405,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"4","issue":null,"first_page":"2025003","last_page":"2025003"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9804999828338623,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9240999817848206,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/business-model","display_name":"Business model","score":0.6004014015197754},{"id":"https://openalex.org/keywords/ripple","display_name":"Ripple","score":0.5092641115188599},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.48523664474487305},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.28326743841171265},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1309506595134735},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.0695355236530304}],"concepts":[{"id":"https://openalex.org/C4216890","wikidata":"https://www.wikidata.org/wiki/Q815823","display_name":"Business model","level":2,"score":0.6004014015197754},{"id":"https://openalex.org/C2779599953","wikidata":"https://www.wikidata.org/wiki/Q1776117","display_name":"Ripple","level":3,"score":0.5092641115188599},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.48523664474487305},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.28326743841171265},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1309506595134735},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0695355236530304},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C165801399","wikidata":"https://www.wikidata.org/wiki/Q25428","display_name":"Voltage","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1051/sands/2025003","is_oa":true,"landing_page_url":"https://doi.org/10.1051/sands/2025003","pdf_url":"https://sands.edpsciences.org/articles/sands/pdf/forth/sands20240035.pdf","source":{"id":"https://openalex.org/S4387281467","display_name":"Security and Safety","issn_l":"2826-1275","issn":["2826-1275"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319748","host_organization_name":"EDP Sciences","host_organization_lineage":["https://openalex.org/P4310319748"],"host_organization_lineage_names":["EDP Sciences"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Safety","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:25d3524eee0a4d859ad3b1beac73235b","is_oa":true,"landing_page_url":"https://doaj.org/article/25d3524eee0a4d859ad3b1beac73235b","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Safety, Vol 4, p 2025003 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1051/sands/2025003","is_oa":true,"landing_page_url":"https://doi.org/10.1051/sands/2025003","pdf_url":"https://sands.edpsciences.org/articles/sands/pdf/forth/sands20240035.pdf","source":{"id":"https://openalex.org/S4387281467","display_name":"Security and Safety","issn_l":"2826-1275","issn":["2826-1275"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319748","host_organization_name":"EDP Sciences","host_organization_lineage":["https://openalex.org/P4310319748"],"host_organization_lineage_names":["EDP Sciences"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Safety","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4408292523.pdf"},"referenced_works_count":28,"referenced_works":["https://openalex.org/W2039427951","https://openalex.org/W2111145992","https://openalex.org/W2184891156","https://openalex.org/W2306331806","https://openalex.org/W2404532944","https://openalex.org/W2513641609","https://openalex.org/W2543927760","https://openalex.org/W2550453031","https://openalex.org/W2572772209","https://openalex.org/W2622607890","https://openalex.org/W2912536826","https://openalex.org/W2915350869","https://openalex.org/W2997160215","https://openalex.org/W3005361609","https://openalex.org/W3015271677","https://openalex.org/W3037379068","https://openalex.org/W3039999425","https://openalex.org/W3104753031","https://openalex.org/W3170971908","https://openalex.org/W3201080953","https://openalex.org/W3208113910","https://openalex.org/W4234540472","https://openalex.org/W4235846400","https://openalex.org/W4296657882","https://openalex.org/W4353004788","https://openalex.org/W4378420960","https://openalex.org/W6744657385","https://openalex.org/W6787742256"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4229441739","https://openalex.org/W4303411445","https://openalex.org/W4207040089","https://openalex.org/W2384455639","https://openalex.org/W1519622926","https://openalex.org/W3109306766","https://openalex.org/W4286587111"],"abstract_inverted_index":{"Traditional":[0],"attack":[1,64,193,200,273],"descriptions":[2],"and":[3,33,219,221,267,275,296],"threat":[4,99,207,225,240,253,268,286,293,297],"modeling":[5,287],"are":[6,80],"discussed":[7],"directly":[8,67],"from":[9,101,195],"the":[10,31,36,41,49,53,63,90,113,117,126,142,150,154,171,180,185,189,192,217,229,235,246,249,252,255,278],"perspective":[11],"of":[12,51,72,112,141,153,182,191,232,248,251],"attacking":[13,52,159],"infrastructure,":[14],"i.e.":[15],",":[16],"platforms,":[17],"using":[18,263],"malicious":[19,73],"code.":[20],"For":[21,163],"example,":[22],"it":[23,122,258],"is":[24,120,123,168,242],"believed":[25],"that":[26,39,125,215,227,284],"exploiting":[27],"vulnerabilities":[28],"to":[29,116,135,148,169,187,197,244,270,276],"access":[30],"system,":[32],"then":[34],"invading":[35],"target":[37,136,155],"platform":[38,218],"support":[40,139],"specified":[42,118],"business":[43,103,107,119,127,138,143,196],"through":[44,160],"lateral":[45,161],"movement":[46],"can":[47,83,289],"achieve":[48],"purpose":[50],"business.":[54],"The":[55,239],"most":[56],"classic":[57],"Cyber":[58],"Kill":[59],"Chain":[60],"model":[61,214,226,241,266,269,277],"expresses":[62],"process":[65],"almost":[66],"as":[68,89],"a":[69,102,106,224],"life":[70],"cycle":[71],"code":[74],"execution,":[75],"but":[76],"in":[77,146,184,254],"fact":[78],"there":[79],"many":[81,175],"ways":[82],"be":[84,203,290],"utilized":[85],"by":[86,205],"adversary,":[87],"such":[88],"dependencies":[91],"among":[92,237],"businesses.":[93,238],"In":[94,105],"this":[95,199,281],"paper,":[96],"we":[97],"discuss":[98],"transmission":[100,250],"perspective.":[104],"dependency":[108,236],"sequence,":[109],"if":[110],"any":[111],"businesses":[114,183],"prior":[115],"abnormal,":[121],"unlikely":[124],"will":[128,178],"operate":[129],"normally":[130],"either.":[131],"This":[132,209],"leads":[133],"adversary":[134,164],"various":[137],"platforms":[140],"dependent":[144],"sequence":[145],"order":[147],"disrupt":[149],"normal":[151],"operation":[152],"business,":[156,198,220],"rather":[157],"than":[158],"movement.":[162],"organizations":[165],"whose":[166],"goal":[167],"paralyze":[170],"architecture":[172,186,213,256,265],"which":[173],"includes":[174],"systems,":[176],"they":[177],"utilize":[179],"interrelationships":[181],"make":[188],"effects":[190],"transmit":[194],"pattern":[201],"cannot":[202],"described":[204],"traditional":[206],"models.":[208],"paper":[210,282],"constructs":[211,223],"an":[212,260],"integrates":[216],"also":[222],"reflects":[228],"ripple":[230],"effect":[231,298],"threats":[233],"utilizing":[234],"able":[243],"characterize":[245,271],"logic":[247],"after":[257],"encounters":[259],"attack.":[261],"By":[262],"our":[264,285],"real":[272],"event":[274,294],"financial":[279],"scenario,":[280],"indicates":[283],"approach":[288],"used":[291],"for":[292],"assessment":[295],"inference.":[299]},"counts_by_year":[],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2025-03-11T00:00:00"}
