{"id":"https://openalex.org/W2890590966","doi":"https://doi.org/10.1109/tcss.2018.2858440","title":"Dynamic Security Risk Evaluation via Hybrid Bayesian Risk Graph in Cyber-Physical Social Systems","display_name":"Dynamic Security Risk Evaluation via Hybrid Bayesian Risk Graph in Cyber-Physical Social Systems","publication_year":2018,"publication_date":"2018-08-14","ids":{"openalex":"https://openalex.org/W2890590966","doi":"https://doi.org/10.1109/tcss.2018.2858440","mag":"2890590966"},"language":"en","primary_location":{"id":"doi:10.1109/tcss.2018.2858440","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcss.2018.2858440","pdf_url":null,"source":{"id":"https://openalex.org/S2490693980","display_name":"IEEE Transactions on Computational Social Systems","issn_l":"2329-924X","issn":["2329-924X","2373-7476"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computational Social Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://eprints.uwe.ac.uk/37641/1/som6.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112604661","display_name":"Shancang Li","orcid":"https://orcid.org/0000-0001-5663-7420"},"institutions":[{"id":"https://openalex.org/I178535277","display_name":"University of the West of England","ror":"https://ror.org/02nwg5t34","country_code":"GB","type":"education","lineage":["https://openalex.org/I178535277"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Shancang Li","raw_affiliation_strings":["Department of Computer Science and Creative Technology, University of the West of England, Bristol, U.K"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Creative Technology, University of the West of England, Bristol, U.K","institution_ids":["https://openalex.org/I178535277"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069429555","display_name":"Shanshan Zhao","orcid":"https://orcid.org/0000-0002-6683-3502"},"institutions":[{"id":"https://openalex.org/I178535277","display_name":"University of the West of England","ror":"https://ror.org/02nwg5t34","country_code":"GB","type":"education","lineage":["https://openalex.org/I178535277"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Shanshan Zhao","raw_affiliation_strings":["Department of Engineering, Design, and mathematics, University of the West of England, Bristol, U.K"],"affiliations":[{"raw_affiliation_string":"Department of Engineering, Design, and mathematics, University of the West of England, Bristol, U.K","institution_ids":["https://openalex.org/I178535277"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110476655","display_name":"Yong Yuan","orcid":"https://orcid.org/0000-0001-8310-2712"},"institutions":[{"id":"https://openalex.org/I4210094879","display_name":"Shandong Institute of Automation","ror":"https://ror.org/00qdtba35","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210094879","https://openalex.org/I4210142748"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Yuan","raw_affiliation_strings":["Institute of Automation, Chinese Academy of Science, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Automation, Chinese Academy of Science, Beijing, China","institution_ids":["https://openalex.org/I4210094879"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082944496","display_name":"Qindong Sun","orcid":"https://orcid.org/0000-0003-2019-7886"},"institutions":[{"id":"https://openalex.org/I4210131919","display_name":"Xi'an University of Technology","ror":"https://ror.org/038avdt50","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210131919"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qindong Sun","raw_affiliation_strings":["School of Computer Science, Xi\u2019an University of Technology, Xi\u2019an, China","School of Computer Science, Xi'an University of Technology, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Xi\u2019an University of Technology, Xi\u2019an, China","institution_ids":["https://openalex.org/I4210131919"]},{"raw_affiliation_string":"School of Computer Science, Xi'an University of Technology, Xi'an, China","institution_ids":["https://openalex.org/I4210131919"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063471046","display_name":"Kewang Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kewang Zhang","raw_affiliation_strings":["School of Electronic and Information Engineering, Xi\u2019an Jiaotong University, Xi\u2019an, China","School of Electronic and Information Engineering, Xi'an Jiaotong University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic and Information Engineering, Xi\u2019an Jiaotong University, Xi\u2019an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"School of Electronic and Information Engineering, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5112604661"],"corresponding_institution_ids":["https://openalex.org/I178535277"],"apc_list":null,"apc_paid":null,"fwci":10.6905,"has_fulltext":false,"cited_by_count":42,"citation_normalized_percentile":{"value":0.98303204,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":100},"biblio":{"volume":"5","issue":"4","first_page":"1133","last_page":"1141"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6649602651596069},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.6631559133529663},{"id":"https://openalex.org/keywords/bayesian-network","display_name":"Bayesian network","score":0.563732385635376},{"id":"https://openalex.org/keywords/dynamic-bayesian-network","display_name":"Dynamic Bayesian network","score":0.5423761606216431},{"id":"https://openalex.org/keywords/hidden-markov-model","display_name":"Hidden Markov model","score":0.5119272470474243},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5028550028800964},{"id":"https://openalex.org/keywords/bayesian-probability","display_name":"Bayesian probability","score":0.4871208667755127},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.4645144045352936},{"id":"https://openalex.org/keywords/markov-chain","display_name":"Markov chain","score":0.4533308744430542},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4487789571285248},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.33425045013427734},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2879500389099121},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.2771289646625519},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.26535680890083313},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.14188286662101746}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6649602651596069},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.6631559133529663},{"id":"https://openalex.org/C33724603","wikidata":"https://www.wikidata.org/wiki/Q812540","display_name":"Bayesian network","level":2,"score":0.563732385635376},{"id":"https://openalex.org/C82142266","wikidata":"https://www.wikidata.org/wiki/Q3456604","display_name":"Dynamic Bayesian network","level":3,"score":0.5423761606216431},{"id":"https://openalex.org/C23224414","wikidata":"https://www.wikidata.org/wiki/Q176769","display_name":"Hidden Markov model","level":2,"score":0.5119272470474243},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5028550028800964},{"id":"https://openalex.org/C107673813","wikidata":"https://www.wikidata.org/wiki/Q812534","display_name":"Bayesian probability","level":2,"score":0.4871208667755127},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4645144045352936},{"id":"https://openalex.org/C98763669","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov chain","level":2,"score":0.4533308744430542},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4487789571285248},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.33425045013427734},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2879500389099121},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2771289646625519},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.26535680890083313},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.14188286662101746},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tcss.2018.2858440","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcss.2018.2858440","pdf_url":null,"source":{"id":"https://openalex.org/S2490693980","display_name":"IEEE Transactions on Computational Social Systems","issn_l":"2329-924X","issn":["2329-924X","2373-7476"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computational Social Systems","raw_type":"journal-article"},{"id":"pmh:oai:eprints.uwe.ac.uk:37641","is_oa":true,"landing_page_url":"http://eprints.uwe.ac.uk/37641/1/som6.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306401464","display_name":"UWE Research Repository (UWE Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I178535277","host_organization_name":"University of the West of England","host_organization_lineage":["https://openalex.org/I178535277"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"}],"best_oa_location":{"id":"pmh:oai:eprints.uwe.ac.uk:37641","is_oa":true,"landing_page_url":"http://eprints.uwe.ac.uk/37641/1/som6.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306401464","display_name":"UWE Research Repository (UWE Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I178535277","host_organization_name":"University of the West of England","host_organization_lineage":["https://openalex.org/I178535277"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1180392010","display_name":null,"funder_award_id":"61571360","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1665023230","https://openalex.org/W1968714482","https://openalex.org/W1976126576","https://openalex.org/W2057450999","https://openalex.org/W2088027524","https://openalex.org/W2092643274","https://openalex.org/W2098340566","https://openalex.org/W2136476267","https://openalex.org/W2138666566","https://openalex.org/W2156872427","https://openalex.org/W2168569394","https://openalex.org/W2329068542","https://openalex.org/W2329399643","https://openalex.org/W2344264180","https://openalex.org/W2467289067","https://openalex.org/W2491697916","https://openalex.org/W2560317658","https://openalex.org/W2563039760","https://openalex.org/W2590133556","https://openalex.org/W2601933405","https://openalex.org/W2790284307","https://openalex.org/W3142667057"],"related_works":["https://openalex.org/W2017210410","https://openalex.org/W1993009522","https://openalex.org/W1995792634","https://openalex.org/W2135672910","https://openalex.org/W2578973671","https://openalex.org/W2215058820","https://openalex.org/W2097663773","https://openalex.org/W1602184117","https://openalex.org/W2413421635","https://openalex.org/W2511198839"],"abstract_inverted_index":{"Cyber-physical":[0],"social":[1,34,76],"system":[2],"(CPSS)":[3],"plays":[4],"an":[5],"important":[6],"role":[7],"in":[8,54,73,112],"both":[9],"the":[10,19,24,68,79,90,109,122],"modern":[11],"lifestyle":[12],"and":[13,33,56,126],"business":[14],"models,":[15],"which":[16,95],"significantly":[17],"changes":[18],"way":[20],"we":[21],"interact":[22],"with":[23],"physical":[25],"world.":[26],"The":[27,44],"increasing":[28],"influence":[29,92],"of":[30,46,93,129],"cyber":[31],"systems":[32],"networks":[35],"is":[36,49,64,86],"also":[37],"a":[38,57,82,100,113],"high":[39],"risk":[40,60,110,115],"for":[41],"security":[42],"threats.":[43],"objective":[45],"this":[47],"paper":[48],"to":[50,66,88,135],"investigate":[51],"associated":[52],"risks":[53,102,128],"CPSS,":[55],"hybrid":[58],"Bayesian":[59,101],"graph":[61,103],"(HBRG)":[62],"model":[63,85,89,105,125],"proposed":[65,80],"analyze":[67],"temporal":[69],"attack":[70],"activity":[71,131],"patterns":[72,132],"dynamic":[74,91],"cyberphysical":[75],"networks.":[77],"In":[78],"approach,":[81],"hidden":[83],"Markov":[84],"introduced":[87],"activities,":[94],"then":[96],"be":[97],"mapped":[98],"into":[99],"(BRG)":[104],"that":[106,121,133],"can":[107,124],"evaluate":[108,127],"propagation":[111],"layered":[114],"architecture.":[116],"Our":[117],"numerical":[118],"studies":[119],"demonstrate":[120],"framework":[123],"user":[130],"expose":[134],"CPSSs.":[136]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":9},{"year":2019,"cited_by_count":14}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
