{"id":"https://openalex.org/W4413180676","doi":"https://doi.org/10.1109/gcwkshp64532.2024.11101134","title":"A DTN-based Security Deduction Method Using Attack-Driven Network State Transition","display_name":"A DTN-based Security Deduction Method Using Attack-Driven Network State Transition","publication_year":2024,"publication_date":"2024-12-08","ids":{"openalex":"https://openalex.org/W4413180676","doi":"https://doi.org/10.1109/gcwkshp64532.2024.11101134"},"language":"en","primary_location":{"id":"doi:10.1109/gcwkshp64532.2024.11101134","is_oa":false,"landing_page_url":"https://doi.org/10.1109/gcwkshp64532.2024.11101134","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE Globecom Workshops (GC Wkshps)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100374892","display_name":"Su Li","orcid":"https://orcid.org/0000-0003-0816-4715"},"institutions":[{"id":"https://openalex.org/I180662265","display_name":"China Mobile (China)","ror":"https://ror.org/05gftfe97","country_code":"CN","type":"company","lineage":["https://openalex.org/I180662265"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Li Su","raw_affiliation_strings":["China Mobile Research Institute,Beijing,China"],"affiliations":[{"raw_affiliation_string":"China Mobile Research Institute,Beijing,China","institution_ids":["https://openalex.org/I180662265"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100730991","display_name":"Ke Wang","orcid":"https://orcid.org/0000-0001-5788-1396"},"institutions":[{"id":"https://openalex.org/I180662265","display_name":"China Mobile (China)","ror":"https://ror.org/05gftfe97","country_code":"CN","type":"company","lineage":["https://openalex.org/I180662265"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ke Wang","raw_affiliation_strings":["China Mobile Research Institute,Beijing,China"],"affiliations":[{"raw_affiliation_string":"China Mobile Research Institute,Beijing,China","institution_ids":["https://openalex.org/I180662265"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053253351","display_name":"Yan Ru","orcid":"https://orcid.org/0000-0002-6832-2183"},"institutions":[{"id":"https://openalex.org/I180662265","display_name":"China Mobile (China)","ror":"https://ror.org/05gftfe97","country_code":"CN","type":"company","lineage":["https://openalex.org/I180662265"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ru Yan","raw_affiliation_strings":["China Mobile Research Institute,Beijing,China"],"affiliations":[{"raw_affiliation_string":"China Mobile Research Institute,Beijing,China","institution_ids":["https://openalex.org/I180662265"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082234538","display_name":"Xiaojun Zhuang","orcid":null},"institutions":[{"id":"https://openalex.org/I180662265","display_name":"China Mobile (China)","ror":"https://ror.org/05gftfe97","country_code":"CN","type":"company","lineage":["https://openalex.org/I180662265"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaojun Zhuang","raw_affiliation_strings":["China Mobile Research Institute,Beijing,China"],"affiliations":[{"raw_affiliation_string":"China Mobile Research Institute,Beijing,China","institution_ids":["https://openalex.org/I180662265"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101096322","display_name":"Yuwei Ma","orcid":null},"institutions":[{"id":"https://openalex.org/I180662265","display_name":"China Mobile (China)","ror":"https://ror.org/05gftfe97","country_code":"CN","type":"company","lineage":["https://openalex.org/I180662265"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuwei Ma","raw_affiliation_strings":["China Mobile Research Institute,Beijing,China"],"affiliations":[{"raw_affiliation_string":"China Mobile Research Institute,Beijing,China","institution_ids":["https://openalex.org/I180662265"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112914837","display_name":"Haitao Du","orcid":null},"institutions":[{"id":"https://openalex.org/I180662265","display_name":"China Mobile (China)","ror":"https://ror.org/05gftfe97","country_code":"CN","type":"company","lineage":["https://openalex.org/I180662265"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haitao Du","raw_affiliation_strings":["China Mobile Research Institute,Beijing,China"],"affiliations":[{"raw_affiliation_string":"China Mobile Research Institute,Beijing,China","institution_ids":["https://openalex.org/I180662265"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100353188","display_name":"Chang Liu","orcid":"https://orcid.org/0000-0001-9442-6210"},"institutions":[{"id":"https://openalex.org/I180662265","display_name":"China Mobile (China)","ror":"https://ror.org/05gftfe97","country_code":"CN","type":"company","lineage":["https://openalex.org/I180662265"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chang Liu","raw_affiliation_strings":["China Mobile Research Institute,Beijing,China"],"affiliations":[{"raw_affiliation_string":"China Mobile Research Institute,Beijing,China","institution_ids":["https://openalex.org/I180662265"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5100374892"],"corresponding_institution_ids":["https://openalex.org/I180662265"],"apc_list":null,"apc_paid":null,"fwci":0.3486,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.67362288,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7233645915985107},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.5855736136436462},{"id":"https://openalex.org/keywords/transition","display_name":"Transition (genetics)","score":0.5838465094566345},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49951171875},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.39846405386924744},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3462839126586914},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.22414416074752808}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7233645915985107},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.5855736136436462},{"id":"https://openalex.org/C194232998","wikidata":"https://www.wikidata.org/wiki/Q1606712","display_name":"Transition (genetics)","level":3,"score":0.5838465094566345},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49951171875},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.39846405386924744},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3462839126586914},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.22414416074752808},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/gcwkshp64532.2024.11101134","is_oa":false,"landing_page_url":"https://doi.org/10.1109/gcwkshp64532.2024.11101134","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE Globecom Workshops (GC Wkshps)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4300000071525574,"id":"https://metadata.un.org/sdg/13","display_name":"Climate action"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W2083658929","https://openalex.org/W2117694832","https://openalex.org/W3010447702","https://openalex.org/W3041500432","https://openalex.org/W4206992006","https://openalex.org/W4366202009","https://openalex.org/W6780695565"],"related_works":["https://openalex.org/W2111375262","https://openalex.org/W2317728013","https://openalex.org/W4252076617","https://openalex.org/W1991205173","https://openalex.org/W2109048960","https://openalex.org/W1727353606","https://openalex.org/W2292168444","https://openalex.org/W2360747494","https://openalex.org/W2741481635","https://openalex.org/W2338537463"],"abstract_inverted_index":{"6G":[0],"communications":[1],"network":[2,21,28,88,103,130,177],"and":[3,9,34,39,49,52,94,105,111,136,155,166,170,201,213,228,244,247],"services":[4],"will":[5,217],"be":[6,133,140,164,179,204],"more":[7,43],"complex":[8,27],"dynamic":[10],"facing":[11],"higher":[12],"security":[13,22,37,68,116,152,185,199,225],"risks,":[14],"so":[15],"it":[16,53],"is":[17,32,42,54,77],"important":[18],"to":[19,56,100,114,143],"measure":[20],"risks":[23],"accurately.":[24],"In":[25,64],"a":[26,67],"environment,":[29],"risk":[30],"modeling":[31],"difficult":[33,55],"inaccurate,":[35],"while":[36],"attack":[38,92,110,137,153,162,172],"defense":[40,112],"drill":[41],"accurate":[44,242],"with":[45,210],"long":[46],"implementation":[47],"period":[48],"high":[50,145],"cost,":[51,215,246],"simulate":[57,101],"the":[58,81,84,102,106,109,128,151,158,171,175,184,198,220,232,235],"attacks":[59],"of":[60,83,87,108,160,174,222,237],"some":[61],"unknown":[62],"vulnerabilities.":[63],"this":[65,195],"paper,":[66],"deduction":[69,243],"method":[70,188,233],"based":[71,79,124,149,189],"on":[72,80,125,150,190,207],"Digital":[73,97,126,156,208],"Twin":[74,209],"Network":[75],"(DTN)":[76],"proposed":[78,193],"analysis":[82],"state":[85,104,131,186],"transition":[86],"entities":[89],"driven":[90],"by":[91,182],"events,":[93],"fully":[95],"integrates":[96],"Twin\u2019s":[98],"ability":[99,107],"platform":[113,154],"perceive":[115],"events.":[117],"The":[118],"scheme":[119],"has":[120,234,248],"three":[121],"advantages:":[122],"firstly,":[123],"Twin,":[127,157],"existing":[129],"can":[132,139,163,178,203],"truly":[134],"simulated,":[135],"scenarios":[138],"randomly":[141],"set":[142],"achieve":[144],"degree":[146],"simulation;":[147],"Secondly,":[148],"impact":[159],"one":[161],"completely":[165],"accurately":[167,180],"fed":[168],"back,":[169],"effect":[173],"twin":[176],"evaluated":[181],"using":[183],"superposition":[187],"time":[191],"series":[192],"in":[194],"paper.":[196],"Thirdly,":[197],"strategy":[200],"capabilities":[202],"dynamically":[205],"deployed":[206],"fast":[211],"speed":[212],"low":[214,245],"which":[216],"effectively":[218],"improve":[219],"feasibility":[221],"high-degree":[223],"simulation":[224],"deduction.":[226],"Analysis":[227],"experiments":[229],"show":[230],"that":[231],"advantages":[236],"environmental":[238],"simulation,":[239,241],"rapid":[240],"strong":[249],"application":[250],"prospects.":[251]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-01T17:29:45.350535","created_date":"2025-10-10T00:00:00"}
