{"id":"https://openalex.org/W1916491872","doi":"https://doi.org/10.1109/ecai.2015.7301204","title":"An information theoretic measure for secrecy loss in stochastic discrete event systems","display_name":"An information theoretic measure for secrecy loss in stochastic discrete event systems","publication_year":2015,"publication_date":"2015-06-01","ids":{"openalex":"https://openalex.org/W1916491872","doi":"https://doi.org/10.1109/ecai.2015.7301204","mag":"1916491872"},"language":"en","primary_location":{"id":"doi:10.1109/ecai.2015.7301204","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ecai.2015.7301204","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 7th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079744121","display_name":"Mariam Ibrahim","orcid":"https://orcid.org/0000-0001-5683-3317"},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]},{"id":"https://openalex.org/I230091363","display_name":"German Jordanian University","ror":"https://ror.org/02jgpyd84","country_code":"JO","type":"education","lineage":["https://openalex.org/I230091363"]}],"countries":["JO","US"],"is_corresponding":true,"raw_author_name":"Mariam Ibrahim","raw_affiliation_strings":["Dept. of Elec. & Comp. Eng, Iowa State University, Ames, IA","Dept. of Mechatronics Eng, German Jordanian University, Amman, Jordan"],"affiliations":[{"raw_affiliation_string":"Dept. of Elec. & Comp. Eng, Iowa State University, Ames, IA","institution_ids":["https://openalex.org/I173911158"]},{"raw_affiliation_string":"Dept. of Mechatronics Eng, German Jordanian University, Amman, Jordan","institution_ids":["https://openalex.org/I230091363"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063604106","display_name":"Jun Chen","orcid":"https://orcid.org/0000-0002-0934-8519"},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jun Chen","raw_affiliation_strings":["Dept. of Elec. & Comp. Eng, Iowa State University, Ames, IA"],"affiliations":[{"raw_affiliation_string":"Dept. of Elec. & Comp. Eng, Iowa State University, Ames, IA","institution_ids":["https://openalex.org/I173911158"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044031773","display_name":"Ratnesh Kumar","orcid":"https://orcid.org/0000-0003-3974-5790"},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ratnesh Kumar","raw_affiliation_strings":["Dept. of Elec. & Comp. Eng, Iowa State University, Ames, IA"],"affiliations":[{"raw_affiliation_string":"Dept. of Elec. & Comp. Eng, Iowa State University, Ames, IA","institution_ids":["https://openalex.org/I173911158"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5079744121"],"corresponding_institution_ids":["https://openalex.org/I173911158","https://openalex.org/I230091363"],"apc_list":null,"apc_paid":null,"fwci":0.3328,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.64186143,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"28","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9897000193595886,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9897000193595886,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9793999791145325,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11125","display_name":"Petri Nets in System Modeling","score":0.9711999893188477,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ambiguity","display_name":"Ambiguity","score":0.6980510950088501},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.6378764510154724},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.619391918182373},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5833122730255127},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5792732834815979},{"id":"https://openalex.org/keywords/observability","display_name":"Observability","score":0.5768844485282898},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5677470564842224},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.5227432250976562},{"id":"https://openalex.org/keywords/divergence","display_name":"Divergence (linguistics)","score":0.5135395526885986},{"id":"https://openalex.org/keywords/information-theory","display_name":"Information theory","score":0.4832044839859009},{"id":"https://openalex.org/keywords/markov-chain","display_name":"Markov chain","score":0.46934401988983154},{"id":"https://openalex.org/keywords/markov-process","display_name":"Markov process","score":0.46746447682380676},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.43737030029296875},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.41221678256988525},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3532567024230957},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3496021628379822},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2765346169471741},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.15231609344482422},{"id":"https://openalex.org/keywords/applied-mathematics","display_name":"Applied mathematics","score":0.1262926161289215}],"concepts":[{"id":"https://openalex.org/C2780522230","wikidata":"https://www.wikidata.org/wiki/Q1140419","display_name":"Ambiguity","level":2,"score":0.6980510950088501},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.6378764510154724},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.619391918182373},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5833122730255127},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5792732834815979},{"id":"https://openalex.org/C36299963","wikidata":"https://www.wikidata.org/wiki/Q1369844","display_name":"Observability","level":2,"score":0.5768844485282898},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5677470564842224},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.5227432250976562},{"id":"https://openalex.org/C207390915","wikidata":"https://www.wikidata.org/wiki/Q1230525","display_name":"Divergence (linguistics)","level":2,"score":0.5135395526885986},{"id":"https://openalex.org/C52622258","wikidata":"https://www.wikidata.org/wiki/Q131222","display_name":"Information theory","level":2,"score":0.4832044839859009},{"id":"https://openalex.org/C98763669","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov chain","level":2,"score":0.46934401988983154},{"id":"https://openalex.org/C159886148","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov process","level":2,"score":0.46746447682380676},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.43737030029296875},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.41221678256988525},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3532567024230957},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3496021628379822},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2765346169471741},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.15231609344482422},{"id":"https://openalex.org/C28826006","wikidata":"https://www.wikidata.org/wiki/Q33521","display_name":"Applied mathematics","level":1,"score":0.1262926161289215},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ecai.2015.7301204","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ecai.2015.7301204","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 7th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.699999988079071,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1947473960","https://openalex.org/W1983934219","https://openalex.org/W2002561382","https://openalex.org/W2009797918","https://openalex.org/W2048984089","https://openalex.org/W2052703101","https://openalex.org/W2054904172","https://openalex.org/W2078144659","https://openalex.org/W2097151854","https://openalex.org/W2108104925","https://openalex.org/W2131025344","https://openalex.org/W2131456244","https://openalex.org/W2132255584","https://openalex.org/W2146567535","https://openalex.org/W2146771420","https://openalex.org/W2157338290","https://openalex.org/W2162246502","https://openalex.org/W2771254667","https://openalex.org/W6674829165","https://openalex.org/W6703387486"],"related_works":["https://openalex.org/W2046459260","https://openalex.org/W2967463586","https://openalex.org/W2765830098","https://openalex.org/W1971989957","https://openalex.org/W2517338020","https://openalex.org/W3157641275","https://openalex.org/W4312300846","https://openalex.org/W4206221578","https://openalex.org/W3029572990","https://openalex.org/W291937575"],"abstract_inverted_index":{"While":[0],"cryptography":[1],"is":[2,98,122,136,155],"used":[3],"to":[4,19,62,76,124,137,157],"protect":[5],"the":[6,59,80,84,139,159],"content":[7],"of":[8,37,83,92,109,142],"secret":[9],"information":[10,68],"(message)":[11],"by":[12,30,39],"making":[13],"it":[14],"undecipherable,":[15],"behaviors":[16,61],"(as":[17],"opposed":[18],"information)":[20],"may":[21,26,71],"not":[22],"be":[23,28,63,73],"encrypted,":[24],"and":[25,86,150],"only":[27],"protected":[29],"partially":[31],"or":[32],"fully":[33],"hiding":[34],"through":[35],"creation":[36],"ambiguity":[38,57],"providing":[40],"covers":[41],"that":[42],"generate":[43],"indistinguishable":[44],"observations":[45],"from":[46],"secrets.":[47],"Having":[48],"a":[49,107,131],"cover":[50],"together":[51],"with":[52],"partial":[53],"observability":[54],"does":[55],"cause":[56],"about":[58,69],"system":[60],"kept":[64],"secret,":[65],"yet":[66],"some":[67],"secrets":[70,85],"still":[72],"leaked":[74],"due":[75],"statistical":[77,93],"difference":[78,94],"between":[79,95],"occurrence":[81],"probabilities":[82],"their":[87,101],"covers.":[88],"One":[89],"possible":[90],"quantification":[91],"two":[96],"distributions":[97],"based":[99],"on":[100],"Jenson-Shannon":[102],"divergence":[103],"(JSD).":[104],"We":[105],"propose":[106],"computation":[108,161],"JSD":[110],"for":[111,130],"systems":[112],"modeled":[113],"as":[114,144],"partially-observed":[115],"Markov":[116],"chains":[117],"(POMC).":[118],"Since":[119],"an":[120],"adversary":[121],"likely":[123],"discriminate":[125],"more":[126],"if":[127],"he/she":[128],"observes":[129],"longer":[132,149,151],"period,":[133],"our":[134],"goal":[135],"evaluate":[138],"worst-case":[140],"loss":[141],"secrecy":[143],"obtained":[145],"in":[146],"limit":[147],"over":[148],"observations.":[152],"Illustrative":[153],"example":[154],"provided":[156],"demonstrate":[158],"proposed":[160],"approach.":[162]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
