{"id":"https://openalex.org/W4412567460","doi":"https://doi.org/10.1109/tii.2025.3582365","title":"Using Graph With Interconnection Intervals Embedding to Discover Potential Threats in the Network","display_name":"Using Graph With Interconnection Intervals Embedding to Discover Potential Threats in the Network","publication_year":2025,"publication_date":"2025-07-22","ids":{"openalex":"https://openalex.org/W4412567460","doi":"https://doi.org/10.1109/tii.2025.3582365"},"language":"en","primary_location":{"id":"doi:10.1109/tii.2025.3582365","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2025.3582365","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012922428","display_name":"Xiaorong Hao","orcid":"https://orcid.org/0000-0001-8973-2424"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaorong Hao","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100461575","display_name":"Bo Liu","orcid":"https://orcid.org/0000-0001-5209-9063"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bo Liu","raw_affiliation_strings":["School of Computer Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072003807","display_name":"Xiangguo Sun","orcid":"https://orcid.org/0000-0002-2224-4634"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangguo Sun","raw_affiliation_strings":["Department of Systems Engineering and Engineering Management, The Chinese University of Hong Kong, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Systems Engineering and Engineering Management, The Chinese University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I177725633"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012384188","display_name":"Jiuxin Cao","orcid":"https://orcid.org/0000-0002-2448-6717"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiuxin Cao","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058994392","display_name":"Ding Zhou","orcid":"https://orcid.org/0000-0002-8142-1426"},"institutions":[{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ding Zhou","raw_affiliation_strings":["Purple Mountain Laboratories, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Purple Mountain Laboratories, Nanjing, China","institution_ids":["https://openalex.org/I4210155350"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063375840","display_name":"Xinwen Fu","orcid":"https://orcid.org/0000-0003-2391-7789"},"institutions":[{"id":"https://openalex.org/I133738476","display_name":"University of Massachusetts Lowell","ror":"https://ror.org/03hamhx47","country_code":"US","type":"education","lineage":["https://openalex.org/I133738476"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xinwen Fu","raw_affiliation_strings":["School of Computer &amp; Information Sciences, University of Massachusetts Lowell, Lowell, USA"],"affiliations":[{"raw_affiliation_string":"School of Computer &amp; Information Sciences, University of Massachusetts Lowell, Lowell, USA","institution_ids":["https://openalex.org/I133738476"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5012922428"],"corresponding_institution_ids":["https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.29918297,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"21","issue":"11","first_page":"8419","last_page":"8429"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.965499997138977,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.965499997138977,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9179999828338623,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/interconnection","display_name":"Interconnection","score":0.7343979477882385},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6421811580657959},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4656544327735901},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.43253710865974426},{"id":"https://openalex.org/keywords/graph-theory","display_name":"Graph theory","score":0.4316309690475464},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3458421230316162},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3224395513534546},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.16137287020683289},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.15218240022659302}],"concepts":[{"id":"https://openalex.org/C123745756","wikidata":"https://www.wikidata.org/wiki/Q1665949","display_name":"Interconnection","level":2,"score":0.7343979477882385},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6421811580657959},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4656544327735901},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.43253710865974426},{"id":"https://openalex.org/C88230418","wikidata":"https://www.wikidata.org/wiki/Q131476","display_name":"Graph theory","level":2,"score":0.4316309690475464},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3458421230316162},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3224395513534546},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.16137287020683289},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.15218240022659302},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tii.2025.3582365","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2025.3582365","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5199999809265137,"id":"https://metadata.un.org/sdg/13","display_name":"Climate action"}],"awards":[{"id":"https://openalex.org/G5988281228","display_name":null,"funder_award_id":"62172089","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7379951849","display_name":null,"funder_award_id":"62472092","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1109422923","https://openalex.org/W2154851992","https://openalex.org/W2481265700","https://openalex.org/W2765664114","https://openalex.org/W2766503369","https://openalex.org/W2908063670","https://openalex.org/W3096129012","https://openalex.org/W3196544260","https://openalex.org/W4225697716","https://openalex.org/W4226283591","https://openalex.org/W4282963615","https://openalex.org/W4285326819","https://openalex.org/W4385245566","https://openalex.org/W4392182086","https://openalex.org/W4396574997","https://openalex.org/W4400574640","https://openalex.org/W4406322016","https://openalex.org/W4407315417","https://openalex.org/W4408565724","https://openalex.org/W6888517835"],"related_works":["https://openalex.org/W2081900870","https://openalex.org/W2014709025","https://openalex.org/W2155019192","https://openalex.org/W3125341812","https://openalex.org/W2932872266","https://openalex.org/W2532801570","https://openalex.org/W4385627933","https://openalex.org/W2480127678","https://openalex.org/W2806270048","https://openalex.org/W4310605282"],"abstract_inverted_index":{"Gradually":[0],"infiltrating":[1],"through":[2],"latent":[3],"malicious":[4],"connections":[5],"to":[6,30,51,66,82],"form":[7],"cyberattacks":[8],"has":[9],"become":[10],"a":[11,26],"significant":[12],"threat":[13],"in":[14,119,128,138,148],"cyberspace.":[15],"Advanced":[16],"persistent":[17],"threats":[18],"(APTs)":[19],"are":[20],"such":[21],"cyberattacks,":[22],"where":[23],"intruders":[24],"maintain":[25],"presence":[27],"on":[28,133],"networks":[29],"steal":[31],"secrets.":[32],"Detecting":[33],"APTs":[34,57,118,149],"by":[35,58,98],"comparing":[36],"user":[37],"behavior":[38,49],"with":[39,62,102],"normal":[40],"activity":[41],"is":[42],"challenging":[43],"because":[44],"attackers":[45],"often":[46],"mimic":[47],"legitimate":[48],"sequences":[50],"evade":[52],"detection.":[53,150],"This":[54],"article":[55],"detects":[56],"modeling":[59],"the":[60,85,96,120,129,134,139],"graph":[61,80],"interconnection":[63,103],"intervals":[64],"embedding":[65],"weaken":[67],"attackers\u2019":[68],"mimicry,":[69],"named":[70],"<italic":[71],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[72],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">CyberProber</i>.":[73],"We":[74],"first":[75],"construct":[76],"an":[77],"attack":[78],"intent":[79],"(AIG)":[81],"scale":[83],"down":[84],"original":[86,130],"network,":[87],"while":[88],"preserving":[89],"key":[90],"suspicious":[91],"paths.":[92],"Then,":[93],"we":[94,115],"embed":[95],"AIG":[97],"learning":[99],"connection":[100],"representations":[101],"interval":[104],"features,":[105],"capturing":[106],"both":[107],"structural":[108],"and":[109,123],"temporal":[110],"dependencies.":[111],"In":[112],"this":[113],"way,":[114],"can":[116],"detect":[117],"small":[121],"AIG,":[122],"further":[124],"uncover":[125],"more":[126],"anomalies":[127],"network":[131],"based":[132],"identified":[135],"compromised":[136],"nodes":[137],"AIG.":[140],"Our":[141],"experiments":[142],"demonstrate":[143],"that":[144],"CyberProber":[145],"outperforms":[146],"baselines":[147]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
