{"id":"https://openalex.org/W2150802402","doi":"https://doi.org/10.1109/dsn.2012.6263942","title":"Time-efficient and cost-effective network hardening using attack graphs","display_name":"Time-efficient and cost-effective network hardening using attack graphs","publication_year":2012,"publication_date":"2012-06-01","ids":{"openalex":"https://openalex.org/W2150802402","doi":"https://doi.org/10.1109/dsn.2012.6263942","mag":"2150802402"},"language":"en","primary_location":{"id":"doi:10.1109/dsn.2012.6263942","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsn.2012.6263942","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066709657","display_name":"Massimiliano Albanese","orcid":"https://orcid.org/0000-0002-2675-5810"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Massimiliano Albanese","raw_affiliation_strings":["Center for Secure Information Systems, George Mason University, Fairfax, VA, USA"],"affiliations":[{"raw_affiliation_string":"Center for Secure Information Systems, George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010727123","display_name":"Sushil Jajodia","orcid":"https://orcid.org/0000-0003-3210-558X"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]},{"id":"https://openalex.org/I44896327","display_name":"Mitre (United States)","ror":"https://ror.org/03ks2a131","country_code":"US","type":"company","lineage":["https://openalex.org/I44896327"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sushil Jajodia","raw_affiliation_strings":["Center for Secure Information Systems, George Mason University, Fairfax, VA, USA","MITRE Corporation, McLean, VA, USA"],"affiliations":[{"raw_affiliation_string":"Center for Secure Information Systems, George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]},{"raw_affiliation_string":"MITRE Corporation, McLean, VA, USA","institution_ids":["https://openalex.org/I44896327"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050515149","display_name":"Steven Noel","orcid":"https://orcid.org/0000-0002-8540-0702"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Steven Noel","raw_affiliation_strings":["Center for Secure Information Systems, George Mason University, Fairfax, VA, USA"],"affiliations":[{"raw_affiliation_string":"Center for Secure Information Systems, George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5066709657"],"corresponding_institution_ids":["https://openalex.org/I162714631"],"apc_list":null,"apc_paid":null,"fwci":17.6152,"has_fulltext":false,"cited_by_count":98,"citation_normalized_percentile":{"value":0.98991435,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"12"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7073268890380859},{"id":"https://openalex.org/keywords/hardening","display_name":"Hardening (computing)","score":0.7066577672958374},{"id":"https://openalex.org/keywords/interdependence","display_name":"Interdependence","score":0.6853607296943665},{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.6843523979187012},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3987838923931122},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3968072831630707},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.371643602848053},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.17891216278076172}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7073268890380859},{"id":"https://openalex.org/C44255700","wikidata":"https://www.wikidata.org/wiki/Q978423","display_name":"Hardening (computing)","level":3,"score":0.7066577672958374},{"id":"https://openalex.org/C185874996","wikidata":"https://www.wikidata.org/wiki/Q269699","display_name":"Interdependence","level":2,"score":0.6853607296943665},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.6843523979187012},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3987838923931122},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3968072831630707},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.371643602848053},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.17891216278076172},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C104062141","wikidata":"https://www.wikidata.org/wiki/Q2601295","display_name":"Extremal black hole","level":3,"score":0.0},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C159176650","wikidata":"https://www.wikidata.org/wiki/Q43261","display_name":"Horizon","level":2,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/dsn.2012.6263942","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsn.2012.6263942","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012)","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.660.2954","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.660.2954","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://csis.gmu.edu/noel/pubs/2012_DSN.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.46000000834465027,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1505851021","https://openalex.org/W1518431406","https://openalex.org/W1550792582","https://openalex.org/W1965332127","https://openalex.org/W2044152003","https://openalex.org/W2054127354","https://openalex.org/W2083658929","https://openalex.org/W2104588447","https://openalex.org/W2117694832","https://openalex.org/W2121805588","https://openalex.org/W2122269808","https://openalex.org/W2139401142","https://openalex.org/W2141289698","https://openalex.org/W2151369956","https://openalex.org/W2157554212","https://openalex.org/W4248986893","https://openalex.org/W4249173680","https://openalex.org/W4392331926","https://openalex.org/W6632983184"],"related_works":["https://openalex.org/W2749324135","https://openalex.org/W2139079562","https://openalex.org/W2515419187","https://openalex.org/W2077352188","https://openalex.org/W2507130582","https://openalex.org/W2042575648","https://openalex.org/W2009238965","https://openalex.org/W2908433117","https://openalex.org/W2373690040","https://openalex.org/W4283269414"],"abstract_inverted_index":{"Attack":[0],"graph":[1],"analysis":[2],"has":[3],"been":[4,33],"established":[5],"as":[6,55,70],"a":[7,58,63,74,78,117,133],"powerful":[8],"tool":[9],"for":[10,21,39,46,56,88],"analyzing":[11],"network":[12,18],"vulnerability.":[13],"However,":[14],"previous":[15],"approaches":[16],"to":[17,86],"hardening":[19,30,90,108,128],"look":[20],"exact":[22],"solutions":[23],"and":[24,98,115],"thus":[25],"do":[26],"not":[27],"scale.":[28],"Further,":[29],"elements":[31],"have":[32,66],"treated":[34],"independently,":[35],"which":[36,146],"is":[37],"inappropriate":[38],"real":[40],"environments.":[41],"For":[42],"example,":[43],"the":[44,53,67,92,105,124,141,144],"cost":[45,118],"patching":[47,57,62],"many":[48],"systems":[49],"may":[50,65,80],"be":[51,96],"nearly":[52],"same":[54,68],"single":[59],"one.":[60],"Or":[61],"vulnerability":[64],"effect":[69],"blocking":[71,77],"traffic":[72],"with":[73,140],"firewall,":[75],"while":[76],"port":[79],"deny":[81],"legitimate":[82],"service.":[83],"By":[84],"failing":[85],"account":[87,123],"such":[89],"interdependencies,":[91],"resulting":[93],"recommendations":[94],"can":[95],"unrealistic":[97],"far":[99],"from":[100],"optimal.":[101],"Instead,":[102],"we":[103,147],"formalize":[104],"notion":[106],"of":[107,112,126,143],"strategy":[109],"in":[110],"terms":[111],"allowable":[113],"actions,":[114],"define":[116],"model":[119],"that":[120,137],"takes":[121],"into":[122],"impact":[125],"interdependent":[127],"actions.":[129],"We":[130],"also":[131],"introduce":[132],"near-optimal":[134],"approximation":[135],"algorithm":[136],"scales":[138],"linearly":[139],"size":[142],"graphs,":[145],"validate":[148],"experimentally.":[149]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":8},{"year":2018,"cited_by_count":8},{"year":2017,"cited_by_count":17},{"year":2016,"cited_by_count":12},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":12},{"year":2013,"cited_by_count":7},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
