{"id":"https://openalex.org/W4226276164","doi":"https://doi.org/10.1109/tnsm.2022.3166348","title":"Cybersecurity Threat Assessment Integrating Qualitative Differential and Evolutionary Games","display_name":"Cybersecurity Threat Assessment Integrating Qualitative Differential and Evolutionary Games","publication_year":2022,"publication_date":"2022-04-11","ids":{"openalex":"https://openalex.org/W4226276164","doi":"https://doi.org/10.1109/tnsm.2022.3166348"},"language":"en","primary_location":{"id":"doi:10.1109/tnsm.2022.3166348","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2022.3166348","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047763068","display_name":"Hengwei Zhang","orcid":"https://orcid.org/0000-0002-1649-7336"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Hengwei Zhang","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","Henan Key Laboratory of Information Security, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]},{"raw_affiliation_string":"Henan Key Laboratory of Information Security, Zhengzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061939024","display_name":"Jinglei Tan","orcid":"https://orcid.org/0000-0002-3231-6793"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jinglei Tan","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","Henan Key Laboratory of Information Security, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]},{"raw_affiliation_string":"Henan Key Laboratory of Information Security, Zhengzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100689572","display_name":"Xiaohu Liu","orcid":"https://orcid.org/0000-0001-9446-7426"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xiaohu Liu","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","Henan Key Laboratory of Information Security, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]},{"raw_affiliation_string":"Henan Key Laboratory of Information Security, Zhengzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011908030","display_name":"Shirui Huang","orcid":"https://orcid.org/0000-0002-2079-283X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shirui Huang","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","Henan Key Laboratory of Information Security, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]},{"raw_affiliation_string":"Henan Key Laboratory of Information Security, Zhengzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100652568","display_name":"Hao Hu","orcid":"https://orcid.org/0000-0003-4888-6368"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hao Hu","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","Henan Key Laboratory of Information Security, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]},{"raw_affiliation_string":"Henan Key Laboratory of Information Security, Zhengzhou, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100424320","display_name":"Yuchen Zhang","orcid":"https://orcid.org/0000-0002-7568-4959"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yuchen Zhang","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","Henan Key Laboratory of Information Security, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]},{"raw_affiliation_string":"Henan Key Laboratory of Information Security, Zhengzhou, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5047763068"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":7.9503,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.97451504,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"19","issue":"3","first_page":"3425","last_page":"3437"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12592","display_name":"Opinion Dynamics and Social Influence","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7778425216674805},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5865154266357422},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.5396056771278381},{"id":"https://openalex.org/keywords/replicator-equation","display_name":"Replicator equation","score":0.49880528450012207},{"id":"https://openalex.org/keywords/threat-assessment","display_name":"Threat assessment","score":0.49829840660095215},{"id":"https://openalex.org/keywords/differential-game","display_name":"Differential game","score":0.4773983061313629},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4408566355705261},{"id":"https://openalex.org/keywords/evolutionary-algorithm","display_name":"Evolutionary algorithm","score":0.43655237555503845},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2437669038772583},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.19767320156097412},{"id":"https://openalex.org/keywords/mathematical-economics","display_name":"Mathematical economics","score":0.11122369766235352},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.0999358594417572}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7778425216674805},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5865154266357422},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.5396056771278381},{"id":"https://openalex.org/C50318809","wikidata":"https://www.wikidata.org/wiki/Q2145081","display_name":"Replicator equation","level":3,"score":0.49880528450012207},{"id":"https://openalex.org/C2778868856","wikidata":"https://www.wikidata.org/wiki/Q18394273","display_name":"Threat assessment","level":2,"score":0.49829840660095215},{"id":"https://openalex.org/C2779006483","wikidata":"https://www.wikidata.org/wiki/Q1973196","display_name":"Differential game","level":2,"score":0.4773983061313629},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4408566355705261},{"id":"https://openalex.org/C159149176","wikidata":"https://www.wikidata.org/wiki/Q14489129","display_name":"Evolutionary algorithm","level":2,"score":0.43655237555503845},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2437669038772583},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.19767320156097412},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.11122369766235352},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0999358594417572},{"id":"https://openalex.org/C2908647359","wikidata":"https://www.wikidata.org/wiki/Q2625603","display_name":"Population","level":2,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C149923435","wikidata":"https://www.wikidata.org/wiki/Q37732","display_name":"Demography","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnsm.2022.3166348","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2022.3166348","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7900000214576721}],"awards":[{"id":"https://openalex.org/G5999240610","display_name":null,"funder_award_id":"61902427","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7625510445","display_name":null,"funder_award_id":"2017YFB0801900","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W1576185228","https://openalex.org/W2033301118","https://openalex.org/W2038646746","https://openalex.org/W2158379985","https://openalex.org/W2550930058","https://openalex.org/W2595933558","https://openalex.org/W2604409140","https://openalex.org/W2612172766","https://openalex.org/W2737441626","https://openalex.org/W2750282889","https://openalex.org/W2751179444","https://openalex.org/W2760535173","https://openalex.org/W2763982154","https://openalex.org/W2773741927","https://openalex.org/W2792472039","https://openalex.org/W2800797998","https://openalex.org/W2888636522","https://openalex.org/W2890099238","https://openalex.org/W2946001656","https://openalex.org/W2949341542","https://openalex.org/W2953262667","https://openalex.org/W2957305577","https://openalex.org/W2974036064","https://openalex.org/W2987728396","https://openalex.org/W3006178700","https://openalex.org/W3020302015","https://openalex.org/W3048012689","https://openalex.org/W3094892968","https://openalex.org/W3098805379","https://openalex.org/W3099080616","https://openalex.org/W4211216608","https://openalex.org/W4254975985","https://openalex.org/W6660502256","https://openalex.org/W6741049925","https://openalex.org/W6750739303","https://openalex.org/W6785574212"],"related_works":["https://openalex.org/W2492651500","https://openalex.org/W4392252503","https://openalex.org/W4287869118","https://openalex.org/W1615974028","https://openalex.org/W2142283420","https://openalex.org/W2505734641","https://openalex.org/W2601906167","https://openalex.org/W4214544733","https://openalex.org/W3144554261","https://openalex.org/W2801573479"],"abstract_inverted_index":{"Most":[0],"current":[1],"game":[2,9,63,84],"theory-based":[3],"cybersecurity":[4,41,55,67],"analysis":[5],"methods":[6,51],"use":[7,160],"traditional":[8],"models,":[10],"which":[11],"do":[12],"not":[13],"meet":[14],"realistic":[15],"conditions":[16],"of":[17,40,65,96,110,123,137,177],"continuous":[18,71],"dynamic":[19,62,121,167],"changes":[20],"in":[21],"attack-defense":[22,72,100,124,155],"behaviors":[23],"and":[24,30,74,82,102,131,153,159,175,186,190],"decision":[25,77],"makers":[26],"without":[27],"perfect":[28],"rationality,":[29],"therefore":[31],"they":[32],"adapt":[33],"with":[34],"difficulty":[35],"to":[36,52,91,106,118,132,171],"the":[37,54,93,108,120,134,138,145,150,154,163,173,184],"practical":[38],"requirements":[39],"threat":[42,56,68,168,178],"assessment.":[43,179],"This":[44],"paper":[45],"draws":[46],"on":[47,70,128],"infectious":[48],"disease":[49],"dynamics":[50],"describe":[53],"propagation":[57],"process.":[58],"It":[59],"constructs":[60],"a":[61,66,104,111,166],"model":[64,185],"based":[69,127],"confrontation":[73,94],"boundedly":[75],"rational":[76],"makers,":[78],"combining":[79],"qualitative":[80],"differential":[81,87],"evolutionary":[83,135,151],"theories.":[85],"Qualitative":[86],"games":[88,115],"are":[89,116,188],"used":[90,117],"analyze":[92,119],"process":[95],"security":[97,112,140],"threats,":[98],"calculate":[99,144],"barriers,":[101],"construct":[103],"benchmark":[105],"measure":[107],"degree":[109],"threat.":[113],"Evolutionary":[114],"change":[122],"strategy-selection":[125],"probabilities":[126],"replicator":[129],"dynamics,":[130],"deduce":[133],"trajectory":[136,152],"network":[139],"state.":[141],"We":[142],"then":[143],"multidimensional":[146],"Euclidean":[147],"distance":[148],"between":[149],"barrier":[156],"metric":[157],"benchmark,":[158],"it":[161],"as":[162],"basis":[164],"for":[165],"assessment":[169],"algorithm":[170,187],"improve":[172],"timeliness":[174],"objectivity":[176],"Simulation":[180],"experiments":[181],"show":[182],"that":[183],"effective":[189],"feasible.":[191]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":11},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
