{"id":"https://openalex.org/W4390678155","doi":"https://doi.org/10.1109/icsrs59833.2023.10381005","title":"Study on the Application of Graph Theory Algorithms and Attack Graphs in Cybersecurity Assessment","display_name":"Study on the Application of Graph Theory Algorithms and Attack Graphs in Cybersecurity Assessment","publication_year":2023,"publication_date":"2023-11-22","ids":{"openalex":"https://openalex.org/W4390678155","doi":"https://doi.org/10.1109/icsrs59833.2023.10381005"},"language":"en","primary_location":{"id":"doi:10.1109/icsrs59833.2023.10381005","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsrs59833.2023.10381005","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 7th International Conference on System Reliability and Safety (ICSRS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://re.public.polimi.it/bitstream/11311/1260268/1/Study_on_the_Application_of_Graph_Theory_Algorithms_and_Attack_Graphs_in_Cybersecurity_Assessment.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019672830","display_name":"Jinghan Zhang","orcid":"https://orcid.org/0000-0003-2583-395X"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":true,"raw_author_name":"Jinghan Zhang","raw_affiliation_strings":["City University of Hong Kong,Department of Mechanical Engineering,Hong Kong,China","Department of Mechanical Engineering, City University of Hong Kong, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"City University of Hong Kong,Department of Mechanical Engineering,Hong Kong,China","institution_ids":["https://openalex.org/I168719708"]},{"raw_affiliation_string":"Department of Mechanical Engineering, City University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022221330","display_name":"Wei Wang","orcid":"https://orcid.org/0009-0004-0637-4844"},"institutions":[{"id":"https://openalex.org/I4210105229","display_name":"City University of Hong Kong, Shenzhen Research Institute","ror":"https://ror.org/00xc0ma20","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210105229"]},{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["CN","HK"],"is_corresponding":false,"raw_author_name":"Wei Wang","raw_affiliation_strings":["City University of Hong Kong,Department of Mechanical Engineering,Hong Kong,China","Shenzhen Research Institute of City University of Hong Kong, Shenzhen, China","Department of Mechanical Engineering, City University of Hong Kong, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"City University of Hong Kong,Department of Mechanical Engineering,Hong Kong,China","institution_ids":["https://openalex.org/I168719708"]},{"raw_affiliation_string":"Shenzhen Research Institute of City University of Hong Kong, Shenzhen, China","institution_ids":["https://openalex.org/I168719708","https://openalex.org/I4210105229"]},{"raw_affiliation_string":"Department of Mechanical Engineering, City University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012431211","display_name":"Enrico Zio","orcid":"https://orcid.org/0000-0002-7108-637X"},"institutions":[{"id":"https://openalex.org/I93860229","display_name":"Politecnico di Milano","ror":"https://ror.org/01nffqt88","country_code":"IT","type":"education","lineage":["https://openalex.org/I93860229"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Enrico Zio","raw_affiliation_strings":["Politecnico di Milano,Department of Energy,Milano,Italy","Department of Energy, Politecnico di Milano, Milano, Italy"],"affiliations":[{"raw_affiliation_string":"Politecnico di Milano,Department of Energy,Milano,Italy","institution_ids":["https://openalex.org/I93860229"]},{"raw_affiliation_string":"Department of Energy, Politecnico di Milano, Milano, Italy","institution_ids":["https://openalex.org/I93860229"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5019672830"],"corresponding_institution_ids":["https://openalex.org/I168719708"],"apc_list":null,"apc_paid":null,"fwci":1.3479,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.86454845,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"558","last_page":"564"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9901000261306763,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7674555778503418},{"id":"https://openalex.org/keywords/dijkstras-algorithm","display_name":"Dijkstra's algorithm","score":0.726709246635437},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.7217811346054077},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6958239078521729},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6153307557106018},{"id":"https://openalex.org/keywords/shortest-path-problem","display_name":"Shortest path problem","score":0.5792021751403809},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.5134187936782837},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5107970237731934},{"id":"https://openalex.org/keywords/scada","display_name":"SCADA","score":0.4982028007507324},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.45085281133651733},{"id":"https://openalex.org/keywords/graph-theory","display_name":"Graph theory","score":0.43511658906936646},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.40799203515052795},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.355729877948761},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.13066554069519043},{"id":"https://openalex.org/keywords/psychological-resilience","display_name":"Psychological resilience","score":0.09401699900627136},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08133402466773987}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7674555778503418},{"id":"https://openalex.org/C173870130","wikidata":"https://www.wikidata.org/wiki/Q8548","display_name":"Dijkstra's algorithm","level":4,"score":0.726709246635437},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.7217811346054077},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6958239078521729},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6153307557106018},{"id":"https://openalex.org/C22590252","wikidata":"https://www.wikidata.org/wiki/Q1058754","display_name":"Shortest path problem","level":3,"score":0.5792021751403809},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.5134187936782837},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5107970237731934},{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.4982028007507324},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.45085281133651733},{"id":"https://openalex.org/C88230418","wikidata":"https://www.wikidata.org/wiki/Q131476","display_name":"Graph theory","level":2,"score":0.43511658906936646},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.40799203515052795},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.355729877948761},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.13066554069519043},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.09401699900627136},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08133402466773987},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/icsrs59833.2023.10381005","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsrs59833.2023.10381005","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 7th International Conference on System Reliability and Safety (ICSRS)","raw_type":"proceedings-article"},{"id":"pmh:oai:re.public.polimi.it:11311/1260268","is_oa":true,"landing_page_url":"https://hdl.handle.net/11311/1260268","pdf_url":"https://re.public.polimi.it/bitstream/11311/1260268/1/Study_on_the_Application_of_Graph_Theory_Algorithms_and_Attack_Graphs_in_Cybersecurity_Assessment.pdf","source":{"id":"https://openalex.org/S4306400312","display_name":"Virtual Community of Pathological Anatomy (University of Castilla La Mancha)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79189158","host_organization_name":"University of Castilla-La Mancha","host_organization_lineage":["https://openalex.org/I79189158"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":{"id":"pmh:oai:re.public.polimi.it:11311/1260268","is_oa":true,"landing_page_url":"https://hdl.handle.net/11311/1260268","pdf_url":"https://re.public.polimi.it/bitstream/11311/1260268/1/Study_on_the_Application_of_Graph_Theory_Algorithms_and_Attack_Graphs_in_Cybersecurity_Assessment.pdf","source":{"id":"https://openalex.org/S4306400312","display_name":"Virtual Community of Pathological Anatomy (University of Castilla La Mancha)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79189158","host_organization_name":"University of Castilla-La Mancha","host_organization_lineage":["https://openalex.org/I79189158"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferenceObject"},"sustainable_development_goals":[{"score":0.7300000190734863,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G7296892318","display_name":null,"funder_award_id":"72101221","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320309893","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4390678155.pdf","grobid_xml":"https://content.openalex.org/works/W4390678155.grobid-xml"},"referenced_works_count":38,"referenced_works":["https://openalex.org/W82848659","https://openalex.org/W1858915531","https://openalex.org/W1972914730","https://openalex.org/W1990414757","https://openalex.org/W2030014066","https://openalex.org/W2054127354","https://openalex.org/W2074480357","https://openalex.org/W2099103357","https://openalex.org/W2100033648","https://openalex.org/W2104588447","https://openalex.org/W2110908300","https://openalex.org/W2121805588","https://openalex.org/W2125377756","https://openalex.org/W2131875370","https://openalex.org/W2132243817","https://openalex.org/W2137762774","https://openalex.org/W2146525400","https://openalex.org/W2147353684","https://openalex.org/W2157554212","https://openalex.org/W2164470395","https://openalex.org/W2165049137","https://openalex.org/W2207375515","https://openalex.org/W2293888960","https://openalex.org/W2332362738","https://openalex.org/W2752929869","https://openalex.org/W2766130346","https://openalex.org/W2766228646","https://openalex.org/W2955810727","https://openalex.org/W2997353660","https://openalex.org/W3035466593","https://openalex.org/W3133895076","https://openalex.org/W3135894137","https://openalex.org/W4226293781","https://openalex.org/W4237936646","https://openalex.org/W4256497308","https://openalex.org/W4304142075","https://openalex.org/W6607701776","https://openalex.org/W6635235395"],"related_works":["https://openalex.org/W3209137076","https://openalex.org/W4223969905","https://openalex.org/W2374560440","https://openalex.org/W1490490684","https://openalex.org/W4221129498","https://openalex.org/W2887026015","https://openalex.org/W2361442013","https://openalex.org/W2373384475","https://openalex.org/W4310124294","https://openalex.org/W143403600"],"abstract_inverted_index":{"Postulating":[0],"the":[1,8,29,49,70,74,84,88,93,98,110,124,128,132,139,144,149],"behavior":[2],"of":[3,10,77,114],"attackers":[4],"is":[5,16,106,120,135],"important":[6],"in":[7,25],"design":[9],"cybersecurity":[11],"protection":[12],"measures.":[13],"Attack":[14],"graph":[15,86],"a":[17,42,60,78,156,161],"technique":[18],"employed":[19],"for":[20],"this":[21,56],"purpose,":[22],"which":[23],"aids":[24],"identifying":[26,64],"and":[27,47,53,68,112,131],"modeling":[28],"potential":[30,65],"attack":[31,66,85],"paths":[32,67],"an":[33],"attacker":[34],"could":[35],"take":[36],"to":[37,41,96,108,122,137,155,165],"gain":[38],"unauthorized":[39],"access":[40],"cyber":[43,166],"network,":[44],"exploit":[45],"vulnerabilities,":[46],"compromise":[48],"system's":[50],"confidentiality,":[51],"integrity,":[52],"availability.":[54],"In":[55],"study,":[57],"we":[58,152],"propose":[59],"framework":[61],"aimed":[62],"at":[63],"determining":[69],"shortest":[71,125],"path":[72,126],"with":[73,92,127,143],"highest":[75,129],"probability":[76],"successful":[79],"attack.":[80],"Meanwhile,":[81],"based":[82],"on":[83],"determine":[87],"minimum":[89,140],"patch":[90,141],"sets":[91,142],"most":[94,145],"severity":[95,113],"protect":[97],"network":[99,163],"security.":[100],"Common":[101],"Vulnerability":[102],"Scoring":[103],"System":[104],"(CVSS)":[105],"utilized":[107,121,136],"quantify":[109],"exploitability":[111],"each":[115],"vulnerability.":[116],"The":[117],"Dijkstra":[118],"algorithm":[119,134],"calculate":[123,138],"probability,":[130],"Stoer-Wagner":[133],"severity.":[146],"To":[147],"demonstrate":[148],"proposed":[150],"framework,":[151],"apply":[153],"it":[154],"simplified":[157],"SCADA":[158],"system":[159],"within":[160],"corporate":[162],"susceptible":[164],"attacks.":[167]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
