{"id":"https://openalex.org/W4315605972","doi":"https://doi.org/10.1109/globecom48099.2022.10001358","title":"Optimal Cybersecurity Investments Using SIS Model: Weakly Connected Networks","display_name":"Optimal Cybersecurity Investments Using SIS Model: Weakly Connected Networks","publication_year":2022,"publication_date":"2022-12-04","ids":{"openalex":"https://openalex.org/W4315605972","doi":"https://doi.org/10.1109/globecom48099.2022.10001358"},"language":"en","primary_location":{"id":"doi:10.1109/globecom48099.2022.10001358","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/globecom48099.2022.10001358","pdf_url":null,"source":{"id":"https://openalex.org/S4363607705","display_name":"GLOBECOM 2022 - 2022 IEEE Global Communications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2022 - 2022 IEEE Global Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036573770","display_name":"Van Sy","orcid":"https://orcid.org/0000-0001-9576-0317"},"institutions":[{"id":"https://openalex.org/I4210101396","display_name":"Communications Technology Laboratory","ror":"https://ror.org/015xey021","country_code":"US","type":"government","lineage":["https://openalex.org/I1321296531","https://openalex.org/I1343035065","https://openalex.org/I4210101396"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Van Sy Mai","raw_affiliation_strings":["CTL, NIST,Gaithersburg,MD,USA","CTL, NIST, Gaithersburg, MD, USA"],"affiliations":[{"raw_affiliation_string":"CTL, NIST,Gaithersburg,MD,USA","institution_ids":["https://openalex.org/I4210101396"]},{"raw_affiliation_string":"CTL, NIST, Gaithersburg, MD, USA","institution_ids":["https://openalex.org/I4210101396"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039201084","display_name":"Richard J. La","orcid":"https://orcid.org/0000-0002-4836-8475"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Richard J. La","raw_affiliation_strings":["ACMD, NIST &#x0026; Univ. of MD,College Park,MD,USA"],"affiliations":[{"raw_affiliation_string":"ACMD, NIST &#x0026; Univ. of MD,College Park,MD,USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024100219","display_name":"Abdella Battou","orcid":"https://orcid.org/0000-0003-3071-842X"},"institutions":[{"id":"https://openalex.org/I4210101396","display_name":"Communications Technology Laboratory","ror":"https://ror.org/015xey021","country_code":"US","type":"government","lineage":["https://openalex.org/I1321296531","https://openalex.org/I1343035065","https://openalex.org/I4210101396"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Abdella Battou","raw_affiliation_strings":["CTL, NIST,Gaithersburg,MD,USA","CTL, NIST, Gaithersburg, MD, USA"],"affiliations":[{"raw_affiliation_string":"CTL, NIST,Gaithersburg,MD,USA","institution_ids":["https://openalex.org/I4210101396"]},{"raw_affiliation_string":"CTL, NIST, Gaithersburg, MD, USA","institution_ids":["https://openalex.org/I4210101396"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5036573770"],"corresponding_institution_ids":["https://openalex.org/I4210101396"],"apc_list":null,"apc_paid":null,"fwci":1.1647,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.76320755,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"1","issue":null,"first_page":"6097","last_page":"6102"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.9882000088691711,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.7870666980743408},{"id":"https://openalex.org/keywords/interdependence","display_name":"Interdependence","score":0.693976879119873},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6813021898269653},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4592741131782532},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45896199345588684},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.42115119099617004},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3725283741950989},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.34282779693603516},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.2148485779762268},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12624070048332214},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.08658832311630249}],"concepts":[{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.7870666980743408},{"id":"https://openalex.org/C185874996","wikidata":"https://www.wikidata.org/wiki/Q269699","display_name":"Interdependence","level":2,"score":0.693976879119873},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6813021898269653},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4592741131782532},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45896199345588684},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.42115119099617004},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3725283741950989},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.34282779693603516},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2148485779762268},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12624070048332214},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08658832311630249},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/globecom48099.2022.10001358","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/globecom48099.2022.10001358","pdf_url":null,"source":{"id":"https://openalex.org/S4363607705","display_name":"GLOBECOM 2022 - 2022 IEEE Global Communications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2022 - 2022 IEEE Global Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1989706342","https://openalex.org/W2034413844","https://openalex.org/W2086916865","https://openalex.org/W2090502749","https://openalex.org/W2110852762","https://openalex.org/W2147884201","https://openalex.org/W2240450792","https://openalex.org/W2526317073","https://openalex.org/W2805503606","https://openalex.org/W2963006107","https://openalex.org/W2963275847","https://openalex.org/W3025582103","https://openalex.org/W3083664819","https://openalex.org/W3100092374","https://openalex.org/W3101599399","https://openalex.org/W3105940665","https://openalex.org/W4224014969","https://openalex.org/W4315605972","https://openalex.org/W6712258078"],"related_works":["https://openalex.org/W2139079562","https://openalex.org/W2749324135","https://openalex.org/W2908433117","https://openalex.org/W2969604939","https://openalex.org/W2378306841","https://openalex.org/W114687057","https://openalex.org/W3122988618","https://openalex.org/W1994631104","https://openalex.org/W2382776042","https://openalex.org/W1038322380"],"abstract_inverted_index":{"We":[0],"study":[1],"the":[2,6,19,55,69,101,114],"problem":[3,102],"of":[4],"minimizing":[5],"(time)":[7],"average":[8],"security":[9,30,33,81],"costs":[10,31,39],"in":[11,49],"large":[12],"systems":[13],"comprising":[14],"many":[15],"interdependent":[16],"subsystems,":[17],"where":[18],"state":[20],"evolution":[21],"is":[22,59,72,91],"captured":[23],"by":[24,99],"a":[25,96],"susceptible-infected-susceptible":[26],"(SIS)":[27],"model.":[28],"The":[29],"reflect":[32],"investments,":[34],"economic":[35],"losses":[36],"and":[37,42,103],"recovery":[38],"from":[40],"infections":[41],"failures":[43],"following":[44],"successful":[45],"attacks.":[46],"However,":[47],"unlike":[48],"existing":[50,76,115],"studies,":[51],"we":[52,87],"assume":[53],"that":[54,89,108],"underlying":[56],"dependence":[57,70],"graph":[58,71],"only":[60],"weakly":[61],"connected,":[62,75],"but":[63],"not":[64,73],"necessarily":[65],"strongly":[66,74],"connected.":[67],"When":[68],"approaches":[77],"to":[78,94,112],"computing":[79],"optimal":[80],"investments":[82],"cannot":[83],"be":[84],"applied.":[85],"Instead,":[86],"show":[88],"it":[90],"still":[92],"possible":[93],"find":[95],"good":[97],"solution":[98],"perturbing":[100],"establishing":[104],"necessary":[105],"continuity":[106],"results":[107],"then":[109],"allow":[110],"us":[111],"leverage":[113],"algorithms.":[116]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1}],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
