{"id":"https://openalex.org/W4383899643","doi":"https://doi.org/10.1109/tdsc.2023.3294433","title":"ILLATION: Improving Vulnerability Risk Prioritization by Learning From Network","display_name":"ILLATION: Improving Vulnerability Risk Prioritization by Learning From Network","publication_year":2023,"publication_date":"2023-07-11","ids":{"openalex":"https://openalex.org/W4383899643","doi":"https://doi.org/10.1109/tdsc.2023.3294433"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2023.3294433","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2023.3294433","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100360185","display_name":"Zhen Zeng","orcid":"https://orcid.org/0000-0002-7877-292X"},"institutions":[{"id":"https://openalex.org/I43579087","display_name":"University of Wisconsin\u2013Milwaukee","ror":"https://ror.org/031q21x57","country_code":"US","type":"education","lineage":["https://openalex.org/I43579087"]},{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]},{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Zhen Zeng","raw_affiliation_strings":["College of Engineering &amp; Applied Science, University of Wisconsin Milwaukee, Milwaukee, WI, USA","Bradley Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg, VA, USA","School of Computing and Augmented Intelligence, Arizona State University, Tempe, AZ, USA"],"affiliations":[{"raw_affiliation_string":"College of Engineering &amp; Applied Science, University of Wisconsin Milwaukee, Milwaukee, WI, USA","institution_ids":["https://openalex.org/I43579087"]},{"raw_affiliation_string":"Bradley Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg, VA, USA","institution_ids":["https://openalex.org/I859038795"]},{"raw_affiliation_string":"School of Computing and Augmented Intelligence, Arizona State University, Tempe, AZ, USA","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003921452","display_name":"Dijiang Huang","orcid":"https://orcid.org/0000-0003-3257-6349"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]},{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dijiang Huang","raw_affiliation_strings":["School of Computing and Augmented Intelligence, Arizona State University, Tempe, AZ, USA","Bradley Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg, VA, USA"],"affiliations":[{"raw_affiliation_string":"School of Computing and Augmented Intelligence, Arizona State University, Tempe, AZ, USA","institution_ids":["https://openalex.org/I55732556"]},{"raw_affiliation_string":"Bradley Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg, VA, USA","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026230689","display_name":"Guoliang Xue","orcid":"https://orcid.org/0000-0002-5833-8894"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]},{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Guoliang Xue","raw_affiliation_strings":["School of Computing and Augmented Intelligence, Arizona State University, Tempe, AZ, USA","Bradley Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg, VA, USA"],"affiliations":[{"raw_affiliation_string":"School of Computing and Augmented Intelligence, Arizona State University, Tempe, AZ, USA","institution_ids":["https://openalex.org/I55732556"]},{"raw_affiliation_string":"Bradley Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg, VA, USA","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034806935","display_name":"Yuli Deng","orcid":"https://orcid.org/0000-0001-7715-9966"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]},{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yuli Deng","raw_affiliation_strings":["School of Computing and Augmented Intelligence, Arizona State University, Tempe, AZ, USA","Bradley Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg, VA, USA"],"affiliations":[{"raw_affiliation_string":"School of Computing and Augmented Intelligence, Arizona State University, Tempe, AZ, USA","institution_ids":["https://openalex.org/I55732556"]},{"raw_affiliation_string":"Bradley Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg, VA, USA","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059472172","display_name":"Neha Vadnere","orcid":"https://orcid.org/0000-0002-6216-070X"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]},{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Neha Vadnere","raw_affiliation_strings":["School of Computing and Augmented Intelligence, Arizona State University, Tempe, AZ, USA","Bradley Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg, VA, USA"],"affiliations":[{"raw_affiliation_string":"School of Computing and Augmented Intelligence, Arizona State University, Tempe, AZ, USA","institution_ids":["https://openalex.org/I55732556"]},{"raw_affiliation_string":"Bradley Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg, VA, USA","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040158607","display_name":"Liguang Xie","orcid":"https://orcid.org/0000-0002-3764-9888"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]},{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Liguang Xie","raw_affiliation_strings":["Bradley Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg, VA, USA","School of Computing and Augmented Intelligence, Arizona State University, Tempe, AZ, USA"],"affiliations":[{"raw_affiliation_string":"Bradley Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg, VA, USA","institution_ids":["https://openalex.org/I859038795"]},{"raw_affiliation_string":"School of Computing and Augmented Intelligence, Arizona State University, Tempe, AZ, USA","institution_ids":["https://openalex.org/I55732556"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100360185"],"corresponding_institution_ids":["https://openalex.org/I43579087","https://openalex.org/I55732556","https://openalex.org/I859038795"],"apc_list":null,"apc_paid":null,"fwci":2.2832,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.9026191,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"21","issue":"4","first_page":"1890","last_page":"1901"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9782000184059143,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9771999716758728,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.822730302810669},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.8138409852981567},{"id":"https://openalex.org/keywords/prioritization","display_name":"Prioritization","score":0.7409988641738892},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4608137011528015},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.4495226740837097},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4134542644023895},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.40531474351882935},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.37157055735588074},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.36055105924606323},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.08209294080734253},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.07237833738327026}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.822730302810669},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.8138409852981567},{"id":"https://openalex.org/C2777615720","wikidata":"https://www.wikidata.org/wiki/Q11888847","display_name":"Prioritization","level":2,"score":0.7409988641738892},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4608137011528015},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.4495226740837097},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4134542644023895},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.40531474351882935},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.37157055735588074},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.36055105924606323},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.08209294080734253},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.07237833738327026},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2023.3294433","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2023.3294433","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W150078352","https://openalex.org/W180604521","https://openalex.org/W1824971879","https://openalex.org/W1930856805","https://openalex.org/W1965332127","https://openalex.org/W1971733255","https://openalex.org/W1989440310","https://openalex.org/W1993558273","https://openalex.org/W2031175798","https://openalex.org/W2044625105","https://openalex.org/W2074616737","https://openalex.org/W2077937403","https://openalex.org/W2100033648","https://openalex.org/W2121141821","https://openalex.org/W2121805588","https://openalex.org/W2132228477","https://openalex.org/W2143396794","https://openalex.org/W2150355110","https://openalex.org/W2152311353","https://openalex.org/W2158997610","https://openalex.org/W2162969618","https://openalex.org/W2603292144","https://openalex.org/W2733563680","https://openalex.org/W2949135188","https://openalex.org/W2974695716","https://openalex.org/W2983519477","https://openalex.org/W2996949461","https://openalex.org/W3022160310","https://openalex.org/W3084558590","https://openalex.org/W4206083420","https://openalex.org/W4242407189","https://openalex.org/W4248986893","https://openalex.org/W4293193423","https://openalex.org/W6607131879","https://openalex.org/W6630356054","https://openalex.org/W6635235395","https://openalex.org/W6637554470","https://openalex.org/W6713174281","https://openalex.org/W6751691560"],"related_works":["https://openalex.org/W1883246888","https://openalex.org/W2370114625","https://openalex.org/W2947584067","https://openalex.org/W3118510577","https://openalex.org/W3157230915","https://openalex.org/W1496728123","https://openalex.org/W2062873522","https://openalex.org/W1756374135","https://openalex.org/W2789975780","https://openalex.org/W2007895524"],"abstract_inverted_index":{"Network":[0],"administrators":[1],"face":[2],"the":[3,27,82,104,136,140],"challenge":[4],"of":[5,10,40,116,181],"efficiently":[6,37],"patching":[7],"overwhelming":[8],"volumes":[9],"vulnerabilities":[11,24,41,110,145,170],"with":[12,146,158,176],"limited":[13],"time":[14,180],"and":[15,70,81,92,96,111,121,132,164],"resources.":[16],"To":[17],"address":[18],"this":[19],"issue,":[20],"they":[21],"must":[22],"prioritize":[23],"based":[25],"on":[26,42,186],"associated":[28],"risk/severity":[29],"measurements":[30],"(i.e.,":[31],"CVSS).":[32],"Existing":[33],"solutions":[34],"struggle":[35],"to":[36,58,73,150,160],"patch":[38],"thousands":[39],"a":[43,49,99,155,187],"network.":[44],"This":[45],"paper":[46],"presents":[47],"ILLATION,":[48],"proof-of-concept":[50],"model":[51,142],"that":[52,90,106,125],"provides":[53,86],"network-specific":[54],"vulnerability":[55,79,130,185],"risk":[56,75,148],"prioritization":[57,133],"support":[59],"efficient":[60],"patching.":[61],"ILLATION":[62,117,166],"integrates":[63],"AI":[64],"techniques,":[65],"such":[66],"as":[67,135,139],"neural":[68],"networks":[69],"logical":[71],"programming,":[72],"learn":[74],"patterns":[76,149],"from":[77],"adversaries,":[78],"severity,":[80],"network":[83,100,112,157],"environment.":[84],"It":[85],"an":[87,177],"integrated":[88],"solution":[89],"learns":[91],"infers":[93],"adversaries'":[94],"motivation":[95],"ability":[97],"in":[98,129,171],"while":[101,143],"also":[102],"learning":[103],"constraints":[105],"restrict":[107],"interactions":[108],"between":[109],"elements.":[113],"An":[114],"evaluation":[115],"against":[118],"CVSS":[119,141],"base":[120],"environmental":[122],"metrics":[123],"shows":[124],"it":[126],"reflects":[127],"changes":[128],"scores":[131],"ranks":[134],"same":[137],"pattern":[138],"identifying":[144],"similar":[147],"given":[151],"adversaries":[152],"better.":[153],"On":[154],"simulated":[156],"up":[159],"10k":[161],"vulnerable":[162],"hosts":[163],"vulnerabilities,":[165],"can":[167],"assess":[168],"1k":[169],"about":[172],"4.5":[173],"minutes":[174],"total,":[175],"average":[178],"running":[179],"0.19":[182],"seconds":[183],"per":[184],"general-purpose":[188],"computer.":[189]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
