{"id":"https://openalex.org/W4380032285","doi":"https://doi.org/10.1109/tifs.2023.3284564","title":"Impulsive Artificial Defense Against Advanced Persistent Threat","display_name":"Impulsive Artificial Defense Against Advanced Persistent Threat","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4380032285","doi":"https://doi.org/10.1109/tifs.2023.3284564"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2023.3284564","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3284564","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/journal_contribution/Impulsive_Artificial_Defense_Against_Advanced_Persistent_Threat/23624991","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100778531","display_name":"Hao Sun","orcid":"https://orcid.org/0000-0003-4488-5579"},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hao Sun","raw_affiliation_strings":["School of Big Data and Software Engineering, Chongqing University, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"School of Big Data and Software Engineering, Chongqing University, Chongqing, China","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101464927","display_name":"Xiaofan Yang","orcid":"https://orcid.org/0000-0001-6931-2692"},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaofan Yang","raw_affiliation_strings":["School of Big Data and Software Engineering, Chongqing University, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"School of Big Data and Software Engineering, Chongqing University, Chongqing, China","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012015574","display_name":"Lu\u2010Xing Yang","orcid":"https://orcid.org/0000-0002-9229-5787"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Lu-Xing Yang","raw_affiliation_strings":["School of Information Technology, Deakin University, Melbourne, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036581757","display_name":"Kaifan Huang","orcid":"https://orcid.org/0000-0001-8998-8083"},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kaifan Huang","raw_affiliation_strings":["School of Big Data and Software Engineering, Chongqing University, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"School of Big Data and Software Engineering, Chongqing University, Chongqing, China","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100438769","display_name":"Gang Li","orcid":"https://orcid.org/0000-0003-1583-641X"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Gang Li","raw_affiliation_strings":["School of Information Technology, Deakin University, Melbourne, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100778531"],"corresponding_institution_ids":["https://openalex.org/I158842170"],"apc_list":null,"apc_paid":null,"fwci":3.6424,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.93322582,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"18","issue":null,"first_page":"3506","last_page":"3516"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9912999868392944,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9878000020980835,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7458482384681702},{"id":"https://openalex.org/keywords/rootkit","display_name":"Rootkit","score":0.6025641560554504},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5975418090820312},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48399829864501953},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4417651891708374},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.32063016295433044},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.1962721347808838}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7458482384681702},{"id":"https://openalex.org/C10144332","wikidata":"https://www.wikidata.org/wiki/Q14645","display_name":"Rootkit","level":3,"score":0.6025641560554504},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5975418090820312},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48399829864501953},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4417651891708374},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.32063016295433044},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.1962721347808838},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2023.3284564","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3284564","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:figshare.com:article/23624991","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Impulsive_Artificial_Defense_Against_Advanced_Persistent_Threat/23624991","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/23624991","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Impulsive_Artificial_Defense_Against_Advanced_Persistent_Threat/23624991","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5199999809265137}],"awards":[{"id":"https://openalex.org/G4258110081","display_name":null,"funder_award_id":"61572006","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":51,"referenced_works":["https://openalex.org/W116690101","https://openalex.org/W156595741","https://openalex.org/W156783801","https://openalex.org/W657923602","https://openalex.org/W1533945010","https://openalex.org/W1878853999","https://openalex.org/W1908246798","https://openalex.org/W1976506837","https://openalex.org/W1985984683","https://openalex.org/W2002941278","https://openalex.org/W2015787697","https://openalex.org/W2063917507","https://openalex.org/W2108614537","https://openalex.org/W2111034649","https://openalex.org/W2146591355","https://openalex.org/W2293205929","https://openalex.org/W2294347342","https://openalex.org/W2527789129","https://openalex.org/W2560934771","https://openalex.org/W2582259743","https://openalex.org/W2720329411","https://openalex.org/W2734412659","https://openalex.org/W2734593181","https://openalex.org/W2735776271","https://openalex.org/W2748696935","https://openalex.org/W2766290037","https://openalex.org/W2789266794","https://openalex.org/W2883847230","https://openalex.org/W2888279577","https://openalex.org/W2888415739","https://openalex.org/W2901048557","https://openalex.org/W2903765663","https://openalex.org/W2910711617","https://openalex.org/W2912172168","https://openalex.org/W2951082602","https://openalex.org/W2971648973","https://openalex.org/W2990464212","https://openalex.org/W2997841142","https://openalex.org/W3033897840","https://openalex.org/W3084641931","https://openalex.org/W3102739576","https://openalex.org/W3107652070","https://openalex.org/W3128313482","https://openalex.org/W3137950818","https://openalex.org/W3152977613","https://openalex.org/W3190895447","https://openalex.org/W4200111155","https://openalex.org/W4206428783","https://openalex.org/W4211043782","https://openalex.org/W4237974662","https://openalex.org/W4285242745"],"related_works":["https://openalex.org/W2379630539","https://openalex.org/W2923974490","https://openalex.org/W2371149587","https://openalex.org/W2389381542","https://openalex.org/W1972479252","https://openalex.org/W4400055136","https://openalex.org/W3007844610","https://openalex.org/W178168142","https://openalex.org/W1980110217","https://openalex.org/W2979345819"],"abstract_inverted_index":{"Advanced":[0],"persistent":[1],"threat":[2,14],"(APT)":[3],"as":[4,54,127],"a":[5,12,96,138],"new":[6],"type":[7],"of":[8,58,66,99,109,117,124,136,199,211,230],"cyber":[9],"espionage":[10],"poses":[11],"severe":[13],"to":[15,29,105,121,162],"modern":[16],"organizations.":[17],"Artificial":[18],"APT":[19,38,59,68],"defense,":[20],"in":[21,107],"which":[22],"an":[23,55,128,148,163,181],"organization":[24],"engages":[25],"experienced":[26],"cybersecurity":[27],"experts":[28],"artificially":[30,47],"check":[31],"if":[32,45],"there":[33],"exist":[34],"rootkits":[35],"implanted":[36],"by":[37,146,172],"actors":[39],"within":[40],"the":[41,49,75,90,110,115,134,154,157,174,178,186,195,200,209,221,228],"organizational":[42,155],"internet":[43],"and,":[44],"so,":[46],"remove":[48],"discovered":[50],"rootkits,":[51],"is":[52,78,93,103,160,192,214,220,225],"recognized":[53],"indispensable":[56],"part":[57],"defense.":[60],"There":[61],"are":[62,203],"two":[63],"different":[64],"ways":[65],"artificial":[67,71,86],"defenses:":[69],"continuous":[70],"defense":[72,76,87,91],"(CAD),":[73],"where":[74,89],"work":[77,92],"conducted":[79,94],"at":[80,95],"all":[81],"time":[82,100,223],"points,":[83],"and":[84,197],"impulsive":[85,149,165,232],"(IAD),":[88],"scheduled":[97],"sequence":[98,123],"points.":[101],"IAD":[102,129,140,143,158,169,179,187,190,201,224],"superior":[104],"CAD":[106],"terms":[108],"overall":[111],"service":[112,125],"cost.":[113],"In":[114],"context":[116],"IAD,":[118],"we":[119],"refer":[120],"each":[122],"costs":[126],"policy.":[130],"This":[131],"paper":[132],"addresses":[133],"problem":[135,159],"developing":[137],"cost-effective":[139],"policy":[141],"(the":[142,168,189],"problem).":[144],"First,":[145],"introducing":[147],"state":[150],"evolutionary":[151],"model":[152,167,188],"for":[153,177,184],"intranet,":[156],"reduced":[161],"optimal":[164,231],"control":[166,233],"model).":[170],"Second,":[171],"deriving":[173],"optimality":[175],"system":[176],"model,":[180],"iterative":[182],"algorithm":[183,202],"solving":[185],"algorithm)":[191],"presented.":[193],"Next,":[194],"convergence":[196],"effectiveness":[198],"validated":[204],"through":[205],"numerical":[206],"experiments.":[207],"Finally,":[208],"effect":[210],"some":[212],"factors":[213],"inspected.":[215],"To":[216],"our":[217],"knowledge,":[218],"this":[219],"first":[222],"inspected":[226],"from":[227],"perspective":[229],"theory.":[234]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":13},{"year":2024,"cited_by_count":6}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
