{"id":"https://openalex.org/W2780076464","doi":"https://doi.org/10.1109/cns.2017.8228706","title":"A layered graphical model for mission attack impact analysis","display_name":"A layered graphical model for mission attack impact analysis","publication_year":2017,"publication_date":"2017-10-01","ids":{"openalex":"https://openalex.org/W2780076464","doi":"https://doi.org/10.1109/cns.2017.8228706","mag":"2780076464"},"language":"en","primary_location":{"id":"doi:10.1109/cns.2017.8228706","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns.2017.8228706","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100701769","display_name":"Changwei Liu","orcid":"https://orcid.org/0000-0003-2367-5564"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Changwei Liu","raw_affiliation_strings":["Department of Computer Science, George Mason University, Fairfax, VA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088206056","display_name":"Anoop Singhal","orcid":"https://orcid.org/0000-0002-2602-3927"},"institutions":[{"id":"https://openalex.org/I1321296531","display_name":"National Institute of Standards and Technology","ror":"https://ror.org/05xpvk416","country_code":"US","type":"funder","lineage":["https://openalex.org/I1321296531","https://openalex.org/I1343035065"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Anoop Singhal","raw_affiliation_strings":["National Institute of Standards and Technology, Gaithersburg, MD, USA"],"affiliations":[{"raw_affiliation_string":"National Institute of Standards and Technology, Gaithersburg, MD, USA","institution_ids":["https://openalex.org/I1321296531"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071866219","display_name":"Duminda Wijesekera","orcid":"https://orcid.org/0000-0002-7122-3055"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Duminda Wijesekera","raw_affiliation_strings":["Department of Computer Science, George Mason University, Fairfax, VA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100701769"],"corresponding_institution_ids":["https://openalex.org/I162714631"],"apc_list":null,"apc_paid":null,"fwci":0.4836,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.76238719,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"602","last_page":"609"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.8104878664016724},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7311416268348694},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.70977783203125},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.5360468029975891},{"id":"https://openalex.org/keywords/layer","display_name":"Layer (electronics)","score":0.5022096633911133},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.48126524686813354},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.41021212935447693},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.33362916111946106},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32205918431282043},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.08098778128623962}],"concepts":[{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.8104878664016724},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7311416268348694},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.70977783203125},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.5360468029975891},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.5022096633911133},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.48126524686813354},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.41021212935447693},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.33362916111946106},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32205918431282043},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.08098778128623962},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cns.2017.8228706","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns.2017.8228706","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7099999785423279,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1526913711","https://openalex.org/W1590752147","https://openalex.org/W1608349577","https://openalex.org/W2001479375","https://openalex.org/W2258962210","https://openalex.org/W2327239563","https://openalex.org/W2520437639","https://openalex.org/W2547036158","https://openalex.org/W2642628527","https://openalex.org/W6635235395"],"related_works":["https://openalex.org/W1883246888","https://openalex.org/W2370114625","https://openalex.org/W2947584067","https://openalex.org/W3118510577","https://openalex.org/W2280562859","https://openalex.org/W3157230915","https://openalex.org/W1496728123","https://openalex.org/W2062873522","https://openalex.org/W1756374135","https://openalex.org/W2789975780"],"abstract_inverted_index":{"Business":[0],"or":[1,122],"military":[2],"missions":[3],"are":[4],"supported":[5],"by":[6],"hardware":[7],"and":[8,55],"software":[9],"systems.":[10],"Unanticipated":[11],"cyber":[12],"activities":[13,107],"occurring":[14],"in":[15,94,126],"supporting":[16],"systems":[17],"can":[18],"impact":[19,128],"such":[20,26],"missions.":[21,109],"In":[22,71],"order":[23],"to":[24,67,101,135],"quantify":[25],"impact,":[27],"we":[28,97],"describe":[29],"a":[30,99,132],"layered":[31],"graphical":[32],"model":[33,41],"as":[34],"an":[35],"extension":[36],"of":[37,91,105,139],"forensic":[38,123],"investigation.":[39],"Our":[40],"has":[42],"three":[43,89],"layers:":[44],"the":[45,53,79,88,103,137],"upper":[46],"layer":[47,60],"models":[48],"operational":[49],"tasks":[50],"that":[51],"constitute":[52],"mission":[54],"their":[56,69],"inter-dependencies.":[57],"The":[58],"middle":[59],"reconstructs":[61,82],"attack":[62,85,106],"scenarios":[63],"from":[64],"available":[65],"evidence":[66,76],"reconstruct":[68],"inter-relationships.":[70],"cases":[72],"where":[73],"not":[74],"all":[75],"is":[77],"available,":[78],"lower":[80],"level":[81],"potentially":[83],"missing":[84],"steps.":[86],"Using":[87],"levels":[90],"graphs":[92],"constructed":[93],"these":[95],"steps,":[96],"present":[98,131],"method":[100],"compute":[102],"impacts":[104],"on":[108],"We":[110,130],"use":[111],"NIST":[112],"National":[113],"Vulnerability":[114,117],"Database's":[115],"(NVD)-Common":[116],"Scoring":[118],"System":[119],"(CVSS)":[120],"scores":[121],"investigators'":[124],"estimates":[125],"our":[127,140],"computations.":[129],"case":[133],"study":[134],"show":[136],"utility":[138],"model.":[141]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
