{"id":"https://openalex.org/W4377000443","doi":"https://doi.org/10.1109/tsmc.2023.3274613","title":"Critical Attacks Set Identification in Attack Graphs for Computer and SCADA/ICS Networks","display_name":"Critical Attacks Set Identification in Attack Graphs for Computer and SCADA/ICS Networks","publication_year":2023,"publication_date":"2023-05-17","ids":{"openalex":"https://openalex.org/W4377000443","doi":"https://doi.org/10.1109/tsmc.2023.3274613"},"language":"en","primary_location":{"id":"doi:10.1109/tsmc.2023.3274613","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsmc.2023.3274613","pdf_url":null,"source":{"id":"https://openalex.org/S4210209078","display_name":"IEEE Transactions on Systems Man and Cybernetics Systems","issn_l":"2168-2216","issn":["2168-2216","2168-2232"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Systems, Man, and Cybernetics: Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081594342","display_name":"Alaa T. Al Ghazo","orcid":"https://orcid.org/0000-0001-7029-4487"},"institutions":[{"id":"https://openalex.org/I157392197","display_name":"Hashemite University","ror":"https://ror.org/04a1r5z94","country_code":"JO","type":"education","lineage":["https://openalex.org/I157392197"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"Alaa T. Al Ghazo","raw_affiliation_strings":["Department of Mechatronics Engineering, Faculty of Engineering, The Hashemite University, Zarqa, Jordan"],"raw_orcid":"https://orcid.org/0000-0001-7029-4487","affiliations":[{"raw_affiliation_string":"Department of Mechatronics Engineering, Faculty of Engineering, The Hashemite University, Zarqa, Jordan","institution_ids":["https://openalex.org/I157392197"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044031773","display_name":"Ratnesh Kumar","orcid":"https://orcid.org/0000-0003-3974-5790"},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ratnesh Kumar","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Iowa State University, Ames, IA, USA"],"raw_orcid":"https://orcid.org/0000-0003-3974-5790","affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Iowa State University, Ames, IA, USA","institution_ids":["https://openalex.org/I173911158"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5081594342"],"corresponding_institution_ids":["https://openalex.org/I157392197"],"apc_list":null,"apc_paid":null,"fwci":5.381,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.95833642,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"53","issue":"9","first_page":"5604","last_page":"5613"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scada","display_name":"SCADA","score":0.9072669744491577},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7844110131263733},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.719614565372467},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5331705212593079},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5228077173233032},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5065258741378784},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.48598822951316833},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.45358991622924805},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4422048032283783},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.42296499013900757},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3652244806289673},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.26537781953811646},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.16042381525039673},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.15965387225151062},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11209887266159058},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.09858289361000061}],"concepts":[{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.9072669744491577},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7844110131263733},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.719614565372467},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5331705212593079},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5228077173233032},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5065258741378784},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.48598822951316833},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.45358991622924805},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4422048032283783},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.42296499013900757},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3652244806289673},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.26537781953811646},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.16042381525039673},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.15965387225151062},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11209887266159058},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.09858289361000061},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tsmc.2023.3274613","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsmc.2023.3274613","pdf_url":null,"source":{"id":"https://openalex.org/S4210209078","display_name":"IEEE Transactions on Systems Man and Cybernetics Systems","issn_l":"2168-2216","issn":["2168-2216","2168-2232"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Systems, Man, and Cybernetics: Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/6","score":0.44999998807907104,"display_name":"Clean water and sanitation"}],"awards":[{"id":"https://openalex.org/G6292047413","display_name":null,"funder_award_id":"NSF-PFI-2141084","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8778038834","display_name":null,"funder_award_id":"NSF-CSSI-2004766","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320309503","display_name":"Rockwell Collins","ror":"https://ror.org/025vwbe15"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W2016115187","https://openalex.org/W2045609581","https://openalex.org/W2085720608","https://openalex.org/W2101438812","https://openalex.org/W2118382442","https://openalex.org/W2121805588","https://openalex.org/W2143396794","https://openalex.org/W2150127671","https://openalex.org/W2151369956","https://openalex.org/W2154971967","https://openalex.org/W2157554212","https://openalex.org/W2285762765","https://openalex.org/W2475817483","https://openalex.org/W2507636931","https://openalex.org/W2516171751","https://openalex.org/W2808231219","https://openalex.org/W2945624265","https://openalex.org/W2946894978","https://openalex.org/W6682144877"],"related_works":["https://openalex.org/W2516092834","https://openalex.org/W2309980522","https://openalex.org/W2187618570","https://openalex.org/W4252573951","https://openalex.org/W2902958991","https://openalex.org/W2801513872","https://openalex.org/W2615554433","https://openalex.org/W2804225172","https://openalex.org/W2007955754","https://openalex.org/W2961381604"],"abstract_inverted_index":{"Supervisory":[0],"control":[1,5],"and":[2,57,164,200,210,231],"data":[3],"acquisition/industrial":[4],"systems":[6],"(SCADA/ICSs)":[7],"networks":[8,202],"are":[9,32],"becoming":[10],"more":[11],"vulnerable":[12],"to":[13,26,36,48,55,65,124,151,168,190,237],"attacks":[14,89],"that":[15,115],"exploit":[16],"the":[17,23,71,95,117,130,133,139,173,176,191],"interdependence":[18],"of":[19,87,129,135,155,172,217],"security":[20,43,226],"weaknesses":[21],"at":[22,70],"atomic":[24],"level":[25],"compromise":[27],"system-level":[28],"security.":[29],"Attack":[30],"graphs":[31],"an":[33,105,144],"effective":[34],"approach":[35],"depict":[37],"these":[38],"complex":[39],"attack":[40,118,183],"scenarios,":[41],"assisting":[42],"administrators":[44,227],"in":[45,132,166,215,240],"determining":[46],"how":[47],"best":[49],"safeguard":[50],"their":[51,161],"systems.":[52],"However,":[53,108],"due":[54],"time":[56],"financial":[58],"constraints,":[59],"it":[60],"is":[61,103,180],"frequently":[62],"not":[63],"possible":[64],"address":[66,238],"all":[67],"atomic-level":[68],"flaws":[69],"same":[72],"time.":[73],"In":[74],"this":[75,149],"article,":[76],"we":[77,109,142],"propose":[78,110],"a":[79,84,99,111,126,136,153,170,181,204,229],"method":[80,189,233],"for":[81,203,207,234],"automatically":[82],"detecting":[83],"minimal":[85,100],"set":[86,154],"critical":[88,182],"that,":[90],"when":[91],"defended":[92],"against,":[93],"render":[94],"system":[96,206],"secure.":[97],"Finding":[98],"label":[101],"cut":[102,171],"typically":[104],"NP-complete":[106],"problem.":[107],"linear":[112],"complexity":[113],"approximation":[114,218],"uses":[116],"graph\u2019s":[119],"strongly":[120],"connected":[121],"components":[122],"(SCCs)":[123],"create":[125],"simplified":[127],"version":[128],"graph":[131],"form":[134],"tree":[137,150,174],"over":[138,148],"SCCs.":[140],"Then,":[141],"perform":[143],"iterative":[145],"backward":[146],"search":[147],"find":[152,169],"backward-reachable":[156],"SCCs,":[157],"as":[158,160,198],"well":[159],"outward":[162],"edges":[163],"labels,":[165,178],"order":[167],"with":[175,228],"fewest":[177],"which":[179],"set.":[184],"We":[185],"put":[186],"our":[187],"proposed":[188],"test":[192],"on":[193],"real-world":[194],"case":[195],"studies,":[196],"such":[197],"IT":[199],"SCADA":[201],"cyber\u2013physical":[205],"water":[208],"treatment,":[209],"outperformed":[211],"previous":[212],"state-of-the-art":[213],"algorithms":[214],"terms":[216],"accuracy":[219],"and/or":[220],"computational":[221],"speed.":[222],"Our":[223],"solution":[224],"provides":[225],"practical":[230],"efficient":[232],"prioritizing":[235],"efforts":[236],"vulnerabilities":[239],"SCADA/ICS":[241],"networks.":[242]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
