{"id":"https://openalex.org/W7124159987","doi":"https://doi.org/10.1109/codit66093.2025.11321736","title":"Optimal risk mitigation strategies for cyber contagion in networks: A hybrid deep learning method","display_name":"Optimal risk mitigation strategies for cyber contagion in networks: A hybrid deep learning method","publication_year":2025,"publication_date":"2025-07-15","ids":{"openalex":"https://openalex.org/W7124159987","doi":"https://doi.org/10.1109/codit66093.2025.11321736"},"language":null,"primary_location":{"id":"doi:10.1109/codit66093.2025.11321736","is_oa":false,"landing_page_url":"https://doi.org/10.1109/codit66093.2025.11321736","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 11th International Conference on Control, Decision and Information Technologies (CoDIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5123039842","display_name":"Yu Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I4472751","display_name":"Anhui Normal University","ror":"https://ror.org/05fsfvw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I4472751"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yu Zhang","raw_affiliation_strings":["Anhui Normal University,School of Mathematics and Statistics,Wuhu,China,241002"],"affiliations":[{"raw_affiliation_string":"Anhui Normal University,School of Mathematics and Statistics,Wuhu,China,241002","institution_ids":["https://openalex.org/I4472751"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123049128","display_name":"Zhuo Jin","orcid":null},"institutions":[{"id":"https://openalex.org/I99043593","display_name":"Macquarie University","ror":"https://ror.org/01sf06y89","country_code":"AU","type":"education","lineage":["https://openalex.org/I99043593"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Zhuo Jin","raw_affiliation_strings":["Macquarie University,Department of Actuarial Studies and Business Analytics,NSW,Australia,2109"],"affiliations":[{"raw_affiliation_string":"Macquarie University,Department of Actuarial Studies and Business Analytics,NSW,Australia,2109","institution_ids":["https://openalex.org/I99043593"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123005998","display_name":"Jiaqin Wei","orcid":null},"institutions":[{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiaqin Wei","raw_affiliation_strings":["East China Normal University,School of Statistics,Key Laboratory of Advanced Theory and Application in Statistics and Data Science-MOE,Shanghai,China,200062"],"affiliations":[{"raw_affiliation_string":"East China Normal University,School of Statistics,Key Laboratory of Advanced Theory and Application in Statistics and Data Science-MOE,Shanghai,China,200062","institution_ids":["https://openalex.org/I66867065"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5123036421","display_name":"George Yin","orcid":null},"institutions":[{"id":"https://openalex.org/I140172145","display_name":"University of Connecticut","ror":"https://ror.org/02der9h97","country_code":"US","type":"education","lineage":["https://openalex.org/I140172145"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"George Yin","raw_affiliation_strings":["University of Connecticut,Department of Mathematics,Storrs,CT,USA,06269-1009"],"affiliations":[{"raw_affiliation_string":"University of Connecticut,Department of Mathematics,Storrs,CT,USA,06269-1009","institution_ids":["https://openalex.org/I140172145"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5123039842"],"corresponding_institution_ids":["https://openalex.org/I4472751"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.80071911,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"16","last_page":"21"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.39660000801086426,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.39660000801086426,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.1754000037908554,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.11580000072717667,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.628000020980835},{"id":"https://openalex.org/keywords/optimal-control","display_name":"Optimal control","score":0.527899980545044},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.44179999828338623},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.41290000081062317},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.3747999966144562},{"id":"https://openalex.org/keywords/cluster","display_name":"Cluster (spacecraft)","score":0.3456999957561493},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.3425999879837036}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6453999876976013},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.628000020980835},{"id":"https://openalex.org/C91575142","wikidata":"https://www.wikidata.org/wiki/Q1971426","display_name":"Optimal control","level":2,"score":0.527899980545044},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5108000040054321},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.45100000500679016},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.44179999828338623},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.41290000081062317},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.3747999966144562},{"id":"https://openalex.org/C164866538","wikidata":"https://www.wikidata.org/wiki/Q367351","display_name":"Cluster (spacecraft)","level":2,"score":0.3456999957561493},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.3425999879837036},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.31850001215934753},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.29319998621940613},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.2906000018119812},{"id":"https://openalex.org/C171769113","wikidata":"https://www.wikidata.org/wiki/Q849340","display_name":"Cyberwarfare","level":2,"score":0.29019999504089355},{"id":"https://openalex.org/C2780264999","wikidata":"https://www.wikidata.org/wiki/Q7445032","display_name":"Security domain","level":2,"score":0.2842999994754791},{"id":"https://openalex.org/C37404715","wikidata":"https://www.wikidata.org/wiki/Q380679","display_name":"Dynamic programming","level":2,"score":0.2770000100135803},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.26179999113082886},{"id":"https://openalex.org/C50897621","wikidata":"https://www.wikidata.org/wiki/Q2665508","display_name":"Hybrid system","level":2,"score":0.2612999975681305},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2590999901294708},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2542000114917755},{"id":"https://openalex.org/C158622935","wikidata":"https://www.wikidata.org/wiki/Q660848","display_name":"Nonlinear system","level":2,"score":0.250900000333786}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/codit66093.2025.11321736","is_oa":false,"landing_page_url":"https://doi.org/10.1109/codit66093.2025.11321736","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 11th International Conference on Control, Decision and Information Technologies (CoDIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/3","score":0.4942055940628052,"display_name":"Good health and well-being"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":51,"referenced_works":["https://openalex.org/W640023950","https://openalex.org/W1460986822","https://openalex.org/W1622308394","https://openalex.org/W1981712011","https://openalex.org/W1991925701","https://openalex.org/W2000953228","https://openalex.org/W2042040043","https://openalex.org/W2056075452","https://openalex.org/W2095993741","https://openalex.org/W2096118443","https://openalex.org/W2139669429","https://openalex.org/W2142889610","https://openalex.org/W2171331105","https://openalex.org/W2339674953","https://openalex.org/W2342408547","https://openalex.org/W2618523767","https://openalex.org/W2749028154","https://openalex.org/W2803881474","https://openalex.org/W2892859754","https://openalex.org/W2907351452","https://openalex.org/W2929803724","https://openalex.org/W2952298682","https://openalex.org/W2962706750","https://openalex.org/W2963726397","https://openalex.org/W2963755939","https://openalex.org/W2980973928","https://openalex.org/W2982343992","https://openalex.org/W3014877645","https://openalex.org/W3020687048","https://openalex.org/W3021614052","https://openalex.org/W3023136537","https://openalex.org/W3116796363","https://openalex.org/W3137381002","https://openalex.org/W3183560208","https://openalex.org/W4232737250","https://openalex.org/W4248806346","https://openalex.org/W4252460146","https://openalex.org/W4280600669","https://openalex.org/W4284965199","https://openalex.org/W4292136393","https://openalex.org/W4292156591","https://openalex.org/W4302367620","https://openalex.org/W4317770587","https://openalex.org/W4361287059","https://openalex.org/W4366810288","https://openalex.org/W4367308754","https://openalex.org/W4390582679","https://openalex.org/W4396954697","https://openalex.org/W4403534428","https://openalex.org/W4403798189","https://openalex.org/W4410832695"],"related_works":[],"abstract_inverted_index":{"This":[0],"paper":[1],"presents":[2],"a":[3,24,69,83,95,103],"novel":[4],"class":[5],"of":[6,41,50,85,121],"cyber":[7],"security":[8],"models":[9],"based":[10],"on":[11,17],"SIR-type":[12],"formulation.":[13],"Our":[14],"effort":[15],"is":[16,98,128],"investigating":[18],"optimal":[19,59,74,115],"impulse":[20],"controls":[21],"arising":[22],"from":[23,35],"cluster":[25,45],"owner":[26],"under":[27],"exogenous":[28],"cyber-attacks.":[29],"We":[30,101],"utilize":[31],"the":[32,39,44,48,58,90,110,114,119,122,134],"SIRS":[33],"model":[34],"epidemiology":[36],"to":[37,89,108],"represent":[38],"spread":[40],"cyber-attacks":[42],"within":[43],"and":[46,67,93],"evaluate":[47],"impact":[49],"protective":[51],"measures.":[52],"Within":[53],"this":[54],"framework,":[55],"we":[56,81],"determine":[57],"defense":[60],"strategy":[61],"against":[62],"effective":[63],"hacking":[64],"by":[65,112,130],"formulating":[66],"solving":[68],"stochastic":[70],"control":[71],"problem":[72],"with":[73,133],"switching.":[75],"By":[76],"employing":[77],"dynamic":[78],"programming":[79],"principles,":[80],"derive":[82],"system":[84],"quasi-variational":[86],"inequalities.":[87],"Due":[88],"inherent":[91],"nonlinearity":[92],"complexity,":[94],"closed-form":[96],"solution":[97,111],"not":[99],"possible.":[100],"use":[102],"hybrid":[104,124],"deep":[105,125,135],"learning":[106,126],"method":[107,127],"approximate":[109],"simulating":[113],"protection":[116],"strategies.":[117],"Finally,":[118],"effectiveness":[120],"proposed":[123],"validated":[129],"comparing":[131],"it":[132],"Galerkin":[136],"method.":[137]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-01-15T00:00:00"}
