{"id":"https://openalex.org/W3005848420","doi":"https://doi.org/10.1109/uemcon47517.2019.8993076","title":"Identification of Critical-Attacks Set in an Attack-Graph","display_name":"Identification of Critical-Attacks Set in an Attack-Graph","publication_year":2019,"publication_date":"2019-10-01","ids":{"openalex":"https://openalex.org/W3005848420","doi":"https://doi.org/10.1109/uemcon47517.2019.8993076","mag":"3005848420"},"language":"en","primary_location":{"id":"doi:10.1109/uemcon47517.2019.8993076","is_oa":false,"landing_page_url":"https://doi.org/10.1109/uemcon47517.2019.8993076","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics &amp; Mobile Communication Conference (UEMCON)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081594342","display_name":"Alaa T. Al Ghazo","orcid":"https://orcid.org/0000-0001-7029-4487"},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Alaa T. Al Ghazo","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Iowa State University, Ames, IA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Iowa State University, Ames, IA, USA","institution_ids":["https://openalex.org/I173911158"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044031773","display_name":"Ratnesh Kumar","orcid":"https://orcid.org/0000-0003-3974-5790"},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ratnesh Kumar","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Iowa State University, Ames, IA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Iowa State University, Ames, IA, USA","institution_ids":["https://openalex.org/I173911158"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5081594342"],"corresponding_institution_ids":["https://openalex.org/I173911158"],"apc_list":null,"apc_paid":null,"fwci":1.6958,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.89018012,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":93,"max":97},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7811430096626282},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7473092079162598},{"id":"https://openalex.org/keywords/scada","display_name":"SCADA","score":0.7450976371765137},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5176532864570618},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.48226648569107056},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.4613092243671417},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4413626194000244},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.38090601563453674},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3242121934890747},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09088754653930664}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7811430096626282},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7473092079162598},{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.7450976371765137},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5176532864570618},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.48226648569107056},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.4613092243671417},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4413626194000244},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.38090601563453674},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3242121934890747},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09088754653930664},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/uemcon47517.2019.8993076","is_oa":false,"landing_page_url":"https://doi.org/10.1109/uemcon47517.2019.8993076","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics &amp; Mobile Communication Conference (UEMCON)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6899999976158142,"id":"https://metadata.un.org/sdg/6","display_name":"Clean water and sanitation"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2016115187","https://openalex.org/W2045609581","https://openalex.org/W2085720608","https://openalex.org/W2101438812","https://openalex.org/W2121805588","https://openalex.org/W2143396794","https://openalex.org/W2151369956","https://openalex.org/W2157554212","https://openalex.org/W2516171751","https://openalex.org/W2808231219","https://openalex.org/W2945624265","https://openalex.org/W2946894978"],"related_works":["https://openalex.org/W2123317341","https://openalex.org/W1505544058","https://openalex.org/W2128417237","https://openalex.org/W2736680659","https://openalex.org/W4245474935","https://openalex.org/W2954121957","https://openalex.org/W78402292","https://openalex.org/W295835252","https://openalex.org/W1592546298","https://openalex.org/W851785710"],"abstract_inverted_index":{"SCADA/ICS":[0],"(Supervisory":[1],"Control":[2,6],"and":[3,16,69,127,149,172],"Data":[4],"Acqui-sition/Industrial":[5],"Systems)":[7],"networks":[8],"are":[9],"becoming":[10],"targets":[11],"of":[12,18,50,96,109,119,140,160,174],"advanced":[13],"multi-faceted":[14],"attacks,":[15],"use":[17,129],"attack-graphs":[19],"has":[20],"been":[21],"proposed":[22,176],"to":[23,35,56,61,74,91,114,137,152,178],"model":[24],"complex":[25],"attacks":[26],"scenarios":[27,52],"that":[28,40,88,162],"exploit":[29],"interdependence":[30],"among":[31],"existing":[32],"atomic":[33],"vulnerabilities":[34,78],"stitch":[36],"together":[37],"the":[38,63,106,110,120,125,170,175],"attack-paths":[39],"might":[41],"compromise":[42],"a":[43,94,122,154,157,164,179,183,187],"system-level":[44],"security":[45,54,59],"property.":[46],"While":[47],"such":[48],"analysis":[49],"attack":[51,112],"enables":[53],"administrators":[55],"establish":[57],"appropriate":[58],"measurements":[60],"secure":[62],"system,":[64],"practical":[65],"considerations":[66],"on":[67],"time":[68],"cost":[70],"limit":[71],"their":[72,146,150],"ability":[73],"address":[75],"all":[76],"system":[77,102],"at":[79],"once.":[80],"In":[81],"this":[82,135],"paper,":[83],"we":[84],"propose":[85],"an":[86,116,130],"approach":[87],"identifies":[89],"label-cuts":[90],"automatically":[92],"identify":[93,138,153],"set":[95,139],"critical-attacks":[97,165],"that,":[98],"when":[99],"blocked,":[100],"guarantee":[101],"security.":[103],"We":[104,167],"utilize":[105],"Strongly-Connected-Components":[107],"(SCCs)":[108],"given":[111],"graph":[113],"generate":[115],"abstracted":[117],"version":[118],"attack-graph,":[121],"tree":[123,136],"over":[124,134],"SCCs,":[126,143],"next":[128],"iterative":[131],"backward":[132,141],"search":[133],"reachable":[142],"along":[144],"with":[145,156],"outgoing":[147],"edges":[148],"labels,":[151],"cut":[155],"minimum":[158],"number":[159],"labels":[161],"forms":[163],"set.":[166],"also":[168],"report":[169],"implementation":[171],"validation":[173],"algorithm":[177],"real-world":[180],"case":[181],"study,":[182],"SCADA":[184],"network":[185],"for":[186],"water":[188],"treatment":[189],"cyber-physical":[190],"system.":[191]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
