{"id":"https://openalex.org/W2945624265","doi":"https://doi.org/10.1109/tsmc.2019.2915940","title":"A2G2V: Automatic Attack Graph Generation and Visualization and Its Applications to Computer and SCADA Networks","display_name":"A2G2V: Automatic Attack Graph Generation and Visualization and Its Applications to Computer and SCADA Networks","publication_year":2019,"publication_date":"2019-05-22","ids":{"openalex":"https://openalex.org/W2945624265","doi":"https://doi.org/10.1109/tsmc.2019.2915940","mag":"2945624265"},"language":"en","primary_location":{"id":"doi:10.1109/tsmc.2019.2915940","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsmc.2019.2915940","pdf_url":null,"source":{"id":"https://openalex.org/S4210209078","display_name":"IEEE Transactions on Systems Man and Cybernetics Systems","issn_l":"2168-2216","issn":["2168-2216","2168-2232"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Systems, Man, and Cybernetics: Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081594342","display_name":"Alaa T. Al Ghazo","orcid":"https://orcid.org/0000-0001-7029-4487"},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Alaa T. Al Ghazo","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Iowa State University, Ames, USA"],"raw_orcid":"https://orcid.org/0000-0001-7029-4487","affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Iowa State University, Ames, USA","institution_ids":["https://openalex.org/I173911158"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079744121","display_name":"Mariam Ibrahim","orcid":"https://orcid.org/0000-0001-5683-3317"},"institutions":[{"id":"https://openalex.org/I230091363","display_name":"German Jordanian University","ror":"https://ror.org/02jgpyd84","country_code":"JO","type":"education","lineage":["https://openalex.org/I230091363"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Mariam Ibrahim","raw_affiliation_strings":["Department of Mechatronics Engineering, German Jordanian University, Amman, Jordan"],"raw_orcid":"https://orcid.org/0000-0001-5683-3317","affiliations":[{"raw_affiliation_string":"Department of Mechatronics Engineering, German Jordanian University, Amman, Jordan","institution_ids":["https://openalex.org/I230091363"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101591241","display_name":"Hao Ren","orcid":"https://orcid.org/0000-0001-7101-6120"},"institutions":[{"id":"https://openalex.org/I82514191","display_name":"Honeywell (United States)","ror":"https://ror.org/02t71h845","country_code":"US","type":"company","lineage":["https://openalex.org/I82514191"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hao Ren","raw_affiliation_strings":["Advanced Technology Division, Honeywell Aerospace, Plymouth, USA"],"raw_orcid":"https://orcid.org/0000-0001-7101-6120","affiliations":[{"raw_affiliation_string":"Advanced Technology Division, Honeywell Aerospace, Plymouth, USA","institution_ids":["https://openalex.org/I82514191"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044031773","display_name":"Ratnesh Kumar","orcid":"https://orcid.org/0000-0003-3974-5790"},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ratnesh Kumar","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Iowa State University, Ames, USA"],"raw_orcid":"https://orcid.org/0000-0003-3974-5790","affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Iowa State University, Ames, USA","institution_ids":["https://openalex.org/I173911158"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5081594342"],"corresponding_institution_ids":["https://openalex.org/I173911158"],"apc_list":null,"apc_paid":null,"fwci":11.9801,"has_fulltext":false,"cited_by_count":72,"citation_normalized_percentile":{"value":0.98478711,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"50","issue":"10","first_page":"3488","last_page":"3498"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9883999824523926,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9800000190734863,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8049196004867554},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5633765459060669},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.4770973324775696},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.47055959701538086},{"id":"https://openalex.org/keywords/attack-surface","display_name":"Attack surface","score":0.46560364961624146},{"id":"https://openalex.org/keywords/scada","display_name":"SCADA","score":0.46205320954322815},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.46192023158073425},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.44237416982650757},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.38083699345588684},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.36618372797966003},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.36181825399398804},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.21479016542434692}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8049196004867554},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5633765459060669},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.4770973324775696},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.47055959701538086},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.46560364961624146},{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.46205320954322815},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.46192023158073425},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.44237416982650757},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.38083699345588684},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36618372797966003},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.36181825399398804},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.21479016542434692},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tsmc.2019.2915940","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsmc.2019.2915940","pdf_url":null,"source":{"id":"https://openalex.org/S4210209078","display_name":"IEEE Transactions on Systems Man and Cybernetics Systems","issn_l":"2168-2216","issn":["2168-2216","2168-2232"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Systems, Man, and Cybernetics: Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6200000047683716,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G6035575445","display_name":null,"funder_award_id":"NSF-CCF-1331390","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8202263001","display_name":null,"funder_award_id":"NSF-IIP-1602089","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8396803110","display_name":null,"funder_award_id":"NSF-ECCS-1509420","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320309503","display_name":"Rockwell Collins","ror":"https://ror.org/025vwbe15"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W189948524","https://openalex.org/W1777237171","https://openalex.org/W1848531833","https://openalex.org/W2002929532","https://openalex.org/W2054127354","https://openalex.org/W2059451986","https://openalex.org/W2073387071","https://openalex.org/W2077841310","https://openalex.org/W2092510604","https://openalex.org/W2093819105","https://openalex.org/W2100033648","https://openalex.org/W2104588447","https://openalex.org/W2121805588","https://openalex.org/W2125377756","https://openalex.org/W2150127671","https://openalex.org/W2154971967","https://openalex.org/W2157554212","https://openalex.org/W2170082530","https://openalex.org/W2225196477","https://openalex.org/W2285762765","https://openalex.org/W2303212871","https://openalex.org/W2317787581","https://openalex.org/W2342413143","https://openalex.org/W2371681823","https://openalex.org/W2507636931","https://openalex.org/W2624728724","https://openalex.org/W2808231219","https://openalex.org/W4249173680","https://openalex.org/W6607546955","https://openalex.org/W6639116193","https://openalex.org/W6682144877","https://openalex.org/W6688973003"],"related_works":["https://openalex.org/W2615977515","https://openalex.org/W2115760278","https://openalex.org/W2146396794","https://openalex.org/W2807864071","https://openalex.org/W2809162650","https://openalex.org/W2388279172","https://openalex.org/W2617238897","https://openalex.org/W4386714408","https://openalex.org/W3164929525","https://openalex.org/W2588995807"],"abstract_inverted_index":{"Securing":[0],"cyber-physical":[1],"systems":[2,9,45],"(CPS)":[3],"and":[4,56,67,82,128,164],"Internet":[5],"of":[6,13,50,95,118,131,146,187],"Things":[7],"(IoT)":[8],"requires":[10],"the":[11,34,51,93,119,144,154,157,188],"identification":[12],"how":[14],"interdependence":[15],"among":[16],"existing":[17,75],"atomic":[18,123],"vulnerabilities":[19,102],"may":[20],"be":[21,104],"exploited":[22,105],"by":[23],"an":[24,29,78,88,140],"adversary":[25],"to":[26,86,106,137,182,198],"stitch":[27],"together":[28],"attack":[30,38,52,64,89,141,168,190],"that":[31,91],"can":[32,103],"compromise":[33,107],"system.":[35],"Therefore,":[36],"accurate":[37],"graphs":[39,53],"play":[40],"a":[41,61,115,147,173,184],"significant":[42],"role":[43],"in":[44,99,143],"security.":[46,109],"A":[47,133],"manual":[48],"construction":[49],"is":[54,135],"tedious":[55],"error-prone,":[57],"this":[58],"paper":[59],"proposes":[60],"model-checking-based":[62],"automated":[63],"graph":[65,90],"generator":[66],"visualizer":[68],"(A2G2V).":[69],"The":[70,110,192],"proposed":[71],"A2G2V":[72,181],"algorithm":[73],"uses":[74],"model-checking":[76],"tools,":[77],"architecture":[79,111],"description":[80,112],"tool,":[81],"our":[83],"own":[84,150],"code":[85,151],"generate":[87,183],"enumerates":[92],"set":[94],"all":[96,167],"possible":[97],"sequences":[98,169],"which":[100],"atomic-level":[101],"system":[108],"tool":[113,175],"captures":[114],"formal":[116],"representation":[117,186],"networked":[120],"system,":[121],"its":[122],"vulnerabilities,":[124],"their":[125],"pre-and":[126],"post-conditions,":[127],"security":[129],"property":[130],"interest.":[132],"model-checker":[134,155],"employed":[136],"automatically":[138],"identify":[139],"sequence":[142],"form":[145],"counterexample.":[148],"Our":[149],"integrated":[152],"with":[153,180],"parses":[156],"counterexamples,":[158],"encodes":[159],"those":[160],"for":[161],"specification":[162],"relaxation,":[163],"iterates":[165],"until":[166],"are":[170,194],"revealed.":[171],"Finally,":[172],"visualization":[174],"has":[176],"also":[177],"been":[178],"incorporated":[179],"graphical":[185],"generated":[189],"graph.":[191],"results":[193],"illustrated":[195],"through":[196],"application":[197],"computer":[199],"as":[200,202],"well":[201],"control":[203],"(SCADA)":[204],"networks.":[205]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":15},{"year":2022,"cited_by_count":17},{"year":2021,"cited_by_count":10},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
