{"id":"https://openalex.org/W2323890320","doi":"https://doi.org/10.1109/tdsc.2015.2411264","title":"Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming","display_name":"Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming","publication_year":2015,"publication_date":"2015-03-09","ids":{"openalex":"https://openalex.org/W2323890320","doi":"https://doi.org/10.1109/tdsc.2015.2411264","mag":"2323890320"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2015.2411264","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2015.2411264","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063912683","display_name":"Hussain M. J. Almohri","orcid":"https://orcid.org/0000-0002-7738-5864"},"institutions":[{"id":"https://openalex.org/I36721946","display_name":"Kuwait University","ror":"https://ror.org/021e5j056","country_code":"KW","type":"education","lineage":["https://openalex.org/I36721946"]}],"countries":["KW"],"is_corresponding":true,"raw_author_name":"Hussain M.J. Almohri","raw_affiliation_strings":["Department of Computer Science, Kuwait University, Kuwait"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Kuwait University, Kuwait","institution_ids":["https://openalex.org/I36721946"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068161656","display_name":"Layne T. Watson","orcid":"https://orcid.org/0000-0003-2009-107X"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Layne T. Watson","raw_affiliation_strings":["Departments of Computer Science and Mathematics, Virginia Tech, Blacksburg, VA"],"affiliations":[{"raw_affiliation_string":"Departments of Computer Science and Mathematics, Virginia Tech, Blacksburg, VA","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034366344","display_name":"Danfeng Yao","orcid":"https://orcid.org/0000-0001-8969-2792"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Danfeng Yao","raw_affiliation_strings":["Department of Computer Science, Virginia Tech, Blacksburg, VA, 24060"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Virginia Tech, Blacksburg, VA, 24060","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113810433","display_name":"Xinming Ou","orcid":"https://orcid.org/0009-0007-2501-7991"},"institutions":[{"id":"https://openalex.org/I189590672","display_name":"Kansas State University","ror":"https://ror.org/05p1j8758","country_code":"US","type":"education","lineage":["https://openalex.org/I189590672"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xinming Ou","raw_affiliation_strings":["Department of Computing and Information Sciences, Kansas State University, Manhattan, KS"],"affiliations":[{"raw_affiliation_string":"Department of Computing and Information Sciences, Kansas State University, Manhattan, KS","institution_ids":["https://openalex.org/I189590672"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5063912683"],"corresponding_institution_ids":["https://openalex.org/I36721946"],"apc_list":null,"apc_paid":null,"fwci":12.3509,"has_fulltext":false,"cited_by_count":62,"citation_normalized_percentile":{"value":0.98404338,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"13","issue":"4","first_page":"474","last_page":"487"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9894000291824341,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8451077938079834},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.685629665851593},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.672644853591919},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5738071203231812},{"id":"https://openalex.org/keywords/linear-programming","display_name":"Linear programming","score":0.5196086764335632},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5091177821159363},{"id":"https://openalex.org/keywords/complex-network","display_name":"Complex network","score":0.4164612591266632},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3594328761100769},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1963980793952942},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.17345410585403442},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.1056566834449768}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8451077938079834},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.685629665851593},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.672644853591919},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5738071203231812},{"id":"https://openalex.org/C41045048","wikidata":"https://www.wikidata.org/wiki/Q202843","display_name":"Linear programming","level":2,"score":0.5196086764335632},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5091177821159363},{"id":"https://openalex.org/C34947359","wikidata":"https://www.wikidata.org/wiki/Q665189","display_name":"Complex network","level":2,"score":0.4164612591266632},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3594328761100769},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1963980793952942},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.17345410585403442},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.1056566834449768},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tdsc.2015.2411264","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2015.2411264","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.702.2713","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.702.2713","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://people.cs.vt.edu/danfeng/papers/ecsa.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.706.2919","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.706.2919","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://people.cs.vt.edu/danfeng/papers/TDSC-Attack-Graph-Probabilistic-Yao.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3448938895","display_name":null,"funder_award_id":"[ZQ02/14]","funder_id":"https://openalex.org/F4320322668","funder_display_name":"Kuwait University"}],"funders":[{"id":"https://openalex.org/F4320322668","display_name":"Kuwait University","ror":"https://ror.org/021e5j056"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W24131227","https://openalex.org/W63046450","https://openalex.org/W82848659","https://openalex.org/W127755304","https://openalex.org/W153010205","https://openalex.org/W164306009","https://openalex.org/W1508191694","https://openalex.org/W1543669032","https://openalex.org/W1580885327","https://openalex.org/W1590752147","https://openalex.org/W1854214752","https://openalex.org/W1971114459","https://openalex.org/W1983457299","https://openalex.org/W1997322704","https://openalex.org/W1997965167","https://openalex.org/W2009470162","https://openalex.org/W2019196986","https://openalex.org/W2022578767","https://openalex.org/W2030014066","https://openalex.org/W2034053794","https://openalex.org/W2077937403","https://openalex.org/W2083270195","https://openalex.org/W2083658929","https://openalex.org/W2091673436","https://openalex.org/W2097209984","https://openalex.org/W2100033648","https://openalex.org/W2106188980","https://openalex.org/W2110908300","https://openalex.org/W2121805588","https://openalex.org/W2122587727","https://openalex.org/W2131875370","https://openalex.org/W2143396794","https://openalex.org/W2149365825","https://openalex.org/W2150802402","https://openalex.org/W2151369956","https://openalex.org/W2157554212","https://openalex.org/W2159173139","https://openalex.org/W3000651840","https://openalex.org/W4230517232","https://openalex.org/W6606758492","https://openalex.org/W6639055396","https://openalex.org/W6642954648","https://openalex.org/W6676167480","https://openalex.org/W6845600186"],"related_works":["https://openalex.org/W2389214306","https://openalex.org/W2965083567","https://openalex.org/W4235240664","https://openalex.org/W1838576100","https://openalex.org/W2757182831","https://openalex.org/W2095886385","https://openalex.org/W2089704382","https://openalex.org/W1983399550","https://openalex.org/W97075385","https://openalex.org/W2357523926"],"abstract_inverted_index":{"Securing":[0],"the":[1,11,39,56,67,84,88,113,119,124],"networks":[2,18,42,117],"of":[3,60,69,75,78,86,90,115,122,126,187],"large":[4],"organizations":[5],"is":[6,143,172],"technically":[7],"challenging":[8],"due":[9],"to":[10,29,154],"complex":[12,100,116],"configurations":[13],"and":[14,21,46,58,99,109,146],"constraints.":[15],"Managing":[16],"these":[17],"requires":[19],"rigorous":[20,73],"comprehensive":[22,179],"analysis":[23],"tools.":[24],"A":[25],"network":[26,79,101,169,184],"administrator":[27],"needs":[28],"identify":[30],"vulnerable":[31],"configurations,":[32,170],"as":[33,35],"well":[34],"tools":[36],"for":[37,111,165],"hardening":[38],"networks.":[40],"Such":[41],"usually":[43],"have":[44,52,177],"dynamic":[45],"fluidic":[47],"structures,":[48],"thus":[49],"one":[50],"may":[51],"incomplete":[53],"information":[54],"about":[55],"connectivity":[57],"availability":[59],"hosts.":[61],"In":[62,152],"this":[63],"paper,":[64],"we":[65],"address":[66],"problem":[68],"statically":[70],"performing":[71],"a":[72,76,91,96,105,133,188],"assessment":[74],"set":[77],"security":[80,114],"defense":[81],"strategies":[82],"with":[83,118,182],"goal":[85,121],"reducing":[87,123],"probability":[89,125],"successful":[92,127],"large-scale":[93],"attack":[94,158],"in":[95,148,168],"dynamically":[97],"changing":[98],"architecture.":[102],"We":[103,176],"describe":[104],"probabilistic":[106,161],"graph":[107],"model":[108,130,162],"algorithms":[110],"analyzing":[112],"ultimate":[120],"attacks.":[128],"Our":[129],"naturally":[131],"utilizes":[132],"scalable":[134],"state-of-the-art":[135],"optimization":[136],"technique":[137],"called":[138],"sequential":[139],"linear":[140],"programming":[141],"that":[142],"extensively":[144],"applied":[145],"studied":[147],"various":[149],"engineering":[150],"problems.":[151],"comparison":[153],"related":[155],"solutions":[156],"on":[157],"graphs,":[159],"our":[160],"provides":[163],"mechanisms":[164],"expressing":[166],"uncertainties":[167],"which":[171],"not":[173],"reported":[174],"elsewhere.":[175],"performed":[178],"experimental":[180],"validation":[181],"real-world":[183],"configuration":[185],"data":[186],"sizable":[189],"organization.":[190]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":7},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":3},{"year":2014,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
