{"id":"https://openalex.org/W2142399367","doi":"https://doi.org/10.1093/comjnl/bxt149","title":"A New Approach for Network Vulnerability Analysis","display_name":"A New Approach for Network Vulnerability Analysis","publication_year":2014,"publication_date":"2014-01-05","ids":{"openalex":"https://openalex.org/W2142399367","doi":"https://doi.org/10.1093/comjnl/bxt149","mag":"2142399367"},"language":"en","primary_location":{"id":"doi:10.1093/comjnl/bxt149","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxt149","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069363273","display_name":"Hai L. Vu","orcid":"https://orcid.org/0000-0001-6984-2060"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"H. L. Vu","raw_affiliation_strings":["Centre for Adv. Internet Archit., Swinburne Univ. of Technol., Melbourne, Vic"],"affiliations":[{"raw_affiliation_string":"Centre for Adv. Internet Archit., Swinburne Univ. of Technol., Melbourne, Vic","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085238821","display_name":"Kenneth K. Khaw","orcid":null},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"K. K. Khaw","raw_affiliation_strings":["Faculty of ICT, Swinburne University of Technology, P.O. Box 218, Melbourne, VIC 3122, Australia","Fac. of ICT Swinburne, Univ. of Technol., Melbourne, VIC"],"affiliations":[{"raw_affiliation_string":"Faculty of ICT, Swinburne University of Technology, P.O. Box 218, Melbourne, VIC 3122, Australia","institution_ids":["https://openalex.org/I57093077"]},{"raw_affiliation_string":"Fac. of ICT Swinburne, Univ. of Technol., Melbourne, VIC","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035107113","display_name":"Tsong Yueh Chen","orcid":"https://orcid.org/0000-0003-3578-0994"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"T. Y. Chen","raw_affiliation_strings":["Faculty of ICT, Swinburne University of Technology, P.O. Box 218, Melbourne, VIC 3122, Australia","Centre for Adv. Internet Archit., Swinburne Univ. of Technol., Melbourne, Vic"],"affiliations":[{"raw_affiliation_string":"Faculty of ICT, Swinburne University of Technology, P.O. Box 218, Melbourne, VIC 3122, Australia","institution_ids":["https://openalex.org/I57093077"]},{"raw_affiliation_string":"Centre for Adv. Internet Archit., Swinburne Univ. of Technol., Melbourne, Vic","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5069363273"],"corresponding_institution_ids":[],"apc_list":{"value":2635,"currency":"GBP","value_usd":3232},"apc_paid":null,"fwci":0.7889,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.8295609,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"58","issue":"4","first_page":"878","last_page":"891"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8458662033081055},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7373518943786621},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.7043553590774536},{"id":"https://openalex.org/keywords/vulnerability-management","display_name":"Vulnerability management","score":0.6684111952781677},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6455060243606567},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.6172643899917603},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.5311492681503296},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4277814030647278},{"id":"https://openalex.org/keywords/metric","display_name":"Metric (unit)","score":0.4201548397541046},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.35515284538269043}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8458662033081055},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7373518943786621},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.7043553590774536},{"id":"https://openalex.org/C172776598","wikidata":"https://www.wikidata.org/wiki/Q7943570","display_name":"Vulnerability management","level":4,"score":0.6684111952781677},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6455060243606567},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.6172643899917603},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.5311492681503296},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4277814030647278},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.4201548397541046},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.35515284538269043},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1093/comjnl/bxt149","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxt149","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},{"id":"pmh:oai:researchbank.swinburne.edu.au:ce53d158-6a14-4c4c-841c-749eddded11c/1","is_oa":false,"landing_page_url":"http://hdl.handle.net/1959.3/392951","pdf_url":null,"source":{"id":"https://openalex.org/S4306401157","display_name":"Swinburne Research Bank (Swinburne University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I57093077","host_organization_name":"Swinburne University of Technology","host_organization_lineage":["https://openalex.org/I57093077"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"The Computer Journal, Vol. 58, no. 4 (2015), pp. 878-891","raw_type":""}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.550000011920929}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W2054127354","https://openalex.org/W2100033648","https://openalex.org/W2101194746","https://openalex.org/W2104588447","https://openalex.org/W2121805588"],"related_works":["https://openalex.org/W922414892","https://openalex.org/W4200107511","https://openalex.org/W2393340519","https://openalex.org/W4298219515","https://openalex.org/W2021298062","https://openalex.org/W2185499427","https://openalex.org/W1883246888","https://openalex.org/W2891427086","https://openalex.org/W3118510577","https://openalex.org/W2371301679"],"abstract_inverted_index":{"Despite":[0],"a":[1,63,99,122,161,165,181],"significant":[2],"increase":[3],"in":[4,25,86,96,169],"security":[5,120],"of":[6,112,121,139,164,180],"modern":[7],"information":[8],"systems,":[9],"cyber":[10],"attacks":[11],"have":[12],"become":[13],"more":[14],"sophisticated":[15],"as":[16],"attackers":[17],"combine":[18],"multiple":[19],"vulnerabilities":[20,43,149],"to":[21,56,76,79,89,102,107,117,134],"penetrate":[22],"networks":[23],"resulting":[24],"devastating":[26],"consequences.":[27],"In":[28],"the":[29,87,110,118,152],"past,":[30],"attack":[31,60,130,154],"graphs":[32,61],"had":[33],"been":[34],"important":[35],"tools":[36],"for":[37,62],"analyzing":[38],"and":[39,51,71,78,106,145,172],"understanding":[40],"how":[41],"various":[42],"could":[44],"be":[45,68,84],"combined":[46],"through":[47,177],"many":[48],"potential":[49],"interactions":[50],"connections":[52],"between":[53],"network":[54,88,104,182],"components":[55],"compromise":[57],"security.":[58],"Full":[59],"realistic":[64],"network,":[65],"however,":[66],"can":[67],"very":[69],"large":[70],"complex,":[72],"making":[73],"it":[74,91],"difficult":[75],"analyze":[77,103],"decide":[80],"what":[81],"changes":[82],"should":[83],"made":[85],"make":[90],"sufficiently":[92],"secure.":[93],"We":[94],"propose":[95],"this":[97,170],"paper":[98,171],"novel":[100],"approach":[101,158],"vulnerability":[105,166],"identify":[108],"all":[109,136],"combinations":[111],"exploits":[113],"that":[114,128,183],"are":[115],"critical":[116,148],"overall":[119],"network.":[123],"Unlike":[124],"previous":[125],"graph-based":[126],"algorithms":[127],"generate":[129],"trees":[131],"(or":[132],"graphs)":[133],"cover":[135],"possible":[137],"sequences":[138],"vulnerabilities,":[140],"our":[141],"method":[142],"directly":[143],"analyzes":[144],"eliminates":[146],"less":[147],"without":[150],"building":[151],"actual":[153],"graph.":[155],"The":[156],"proposed":[157],"relies":[159],"on":[160],"unique":[162],"evaluation":[163],"metric":[167],"defined":[168],"its":[173],"effectiveness":[174],"is":[175],"demonstrated":[176],"an":[178],"example":[179],"provides":[184],"voice":[185],"over":[186],"IP":[187],"services.":[188]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2013,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
