{"id":"https://openalex.org/W4408935948","doi":"https://doi.org/10.1109/jsyst.2025.3547491","title":"DAMAGE: Directed Heterogeneous Network Attack Sequence Inference Through Graph Attention Matrix Generation Embedding and Reinforcement Learning","display_name":"DAMAGE: Directed Heterogeneous Network Attack Sequence Inference Through Graph Attention Matrix Generation Embedding and Reinforcement Learning","publication_year":2025,"publication_date":"2025-03-29","ids":{"openalex":"https://openalex.org/W4408935948","doi":"https://doi.org/10.1109/jsyst.2025.3547491"},"language":"en","primary_location":{"id":"doi:10.1109/jsyst.2025.3547491","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2025.3547491","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068238150","display_name":"Hongfu Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hongfu Liu","raw_affiliation_strings":["College of Intelligence Science and Technology, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Intelligence Science and Technology, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072930058","display_name":"Chengyi Zeng","orcid":"https://orcid.org/0000-0001-7395-2537"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chengyi Zeng","raw_affiliation_strings":["College of Intelligence Science and Technology, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Intelligence Science and Technology, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101635577","display_name":"Zhen Li","orcid":"https://orcid.org/0000-0002-2750-3957"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Li","raw_affiliation_strings":["College of Information and Communication, National University of Defense Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"College of Information and Communication, National University of Defense Technology, Wuhan, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100771923","display_name":"Lina Lu","orcid":"https://orcid.org/0000-0003-1775-1831"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lina Lu","raw_affiliation_strings":["College of Intelligence Science and Technology, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Intelligence Science and Technology, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100394982","display_name":"Jing Chen","orcid":"https://orcid.org/0000-0003-3409-8651"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Chen","raw_affiliation_strings":["College of Intelligence Science and Technology, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Intelligence Science and Technology, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002039721","display_name":"Zongtan Zhou","orcid":"https://orcid.org/0000-0002-6423-8603"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zongtan Zhou","raw_affiliation_strings":["College of Intelligence Science and Technology, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Intelligence Science and Technology, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5068238150"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":null,"apc_paid":null,"fwci":1.5567,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.81617951,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"19","issue":"2","first_page":"392","last_page":"403"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9562000036239624,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9562000036239624,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9132000207901001,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9003999829292297,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6262114644050598},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.6243870258331299},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.5362837314605713},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.5174697041511536},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.46358394622802734},{"id":"https://openalex.org/keywords/sequence","display_name":"Sequence (biology)","score":0.4395502209663391},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4057276248931885}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6262114644050598},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.6243870258331299},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.5362837314605713},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.5174697041511536},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.46358394622802734},{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.4395502209663391},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4057276248931885},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jsyst.2025.3547491","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2025.3547491","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2740789347","display_name":null,"funder_award_id":"62173336","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W1509532469","https://openalex.org/W1967385589","https://openalex.org/W1983833917","https://openalex.org/W1985953075","https://openalex.org/W1989400610","https://openalex.org/W2008620264","https://openalex.org/W2052923946","https://openalex.org/W2053186076","https://openalex.org/W2121035174","https://openalex.org/W2154851992","https://openalex.org/W2156718197","https://openalex.org/W2294028189","https://openalex.org/W2387462954","https://openalex.org/W2393319904","https://openalex.org/W2415243320","https://openalex.org/W2605060505","https://openalex.org/W2782195772","https://openalex.org/W2792824988","https://openalex.org/W2948729509","https://openalex.org/W2962756421","https://openalex.org/W2962833907","https://openalex.org/W3028110392","https://openalex.org/W3032600838","https://openalex.org/W3120502492","https://openalex.org/W4210386997","https://openalex.org/W4212853450","https://openalex.org/W4229043583","https://openalex.org/W4310038937","https://openalex.org/W4315474731","https://openalex.org/W4387846213","https://openalex.org/W6726873649","https://openalex.org/W6760886919","https://openalex.org/W6771263443"],"related_works":["https://openalex.org/W2081900870","https://openalex.org/W4306904969","https://openalex.org/W2138720691","https://openalex.org/W4362501864","https://openalex.org/W4380318855","https://openalex.org/W3084456289","https://openalex.org/W2024136090","https://openalex.org/W4391331176","https://openalex.org/W2966686650","https://openalex.org/W2932872266"],"abstract_inverted_index":{"Distributed":[0],"heterogeneous":[1,47,53,109],"multiagent":[2,26,54],"systems":[3,27],"(DHMASs)":[4],"link":[5],"geographically":[6],"dispersed":[7],"agents":[8],"through":[9,116],"networks,":[10],"harnessing":[11],"information":[12],"technology":[13],"to":[14,44,50,74,150],"foster":[15],"collaboration.":[16],"Considering":[17],"the":[18,29,32,61,69,99,152,158,181,198],"mainstream":[19],"status":[20],"of":[21,34,63,71,91,102,154,160,183,200],"wireless":[22],"communication":[23,36,65,72],"in":[24,31,93,211],"modern":[25],"and":[28,85,128,139],"differences":[30],"performance":[33,75],"interagent":[35,64],"devices,":[37],"we":[38,191],"believe":[39],"that":[40,134,193],"it":[41],"is":[42,95,148],"appropriate":[43],"use":[45],"directed":[46,168],"networks":[48,138],"(DHNs)":[49],"model":[51,57],"distributed":[52],"systems.":[55],"This":[56],"not":[58,195],"only":[59,196],"reflects":[60,68],"directionality":[62],"but":[66,207],"also":[67,208],"complexity":[70],"due":[73],"differences,":[76],"thus":[77],"providing":[78],"a":[79,167,173],"more":[80],"accurate":[81],"framework":[82],"for":[83,97],"understanding":[84],"optimizing":[86],"system":[87],"behavior.":[88],"The":[89],"study":[90],"disintegration":[92,155,202],"DHNs":[94],"vital":[96],"enhancing":[98],"decision-making":[100],"agility":[101],"DHMAS.":[103],"We":[104],"introduce":[105],"<underline":[106,111,119,122,125],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[107,112,120,123,126],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">D</u>irected":[108],"network":[110,161,169,185,201],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">A</u>ttack":[113],"sequence":[114],"inference":[115],"graph":[117,136,174],"attention":[118,175],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">MA</u>trix":[121],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">G</u>eneration":[124],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">E</u>mbedding":[127],"reinforcement":[129,140],"learning":[130,141],"(DAMAGE),":[131],"an":[132,143],"algorithm":[133],"integrates":[135],"neural":[137],"within":[142],"inductive":[144],"reasoning":[145],"framework.":[146],"DAMAGE":[147,194],"designed":[149],"optimize":[151],"generation":[153,177],"strategies,":[156],"improving":[157],"efficiency":[159],"breakdown":[162],"processes.":[163],"Our":[164],"approach":[165],"includes":[166],"embedding":[170],"technique":[171],"with":[172,213],"matrix":[176],"module,":[178],"which":[179],"enhances":[180],"utilization":[182],"imperfect":[184,214],"structure":[186],"information.":[187,216],"Through":[188],"ablation":[189],"studies,":[190],"demonstrate":[192],"increases":[197],"effectiveness":[199],"under":[203],"perfect":[204],"topological":[205,215],"conditions":[206],"maintains":[209],"robustness":[210],"scenario":[212]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
