{"id":"https://openalex.org/W3032089044","doi":"https://doi.org/10.1142/s0218126621500468","title":"Edge Network Security Risk Control Based on Attack and Defense Map","display_name":"Edge Network Security Risk Control Based on Attack and Defense Map","publication_year":2020,"publication_date":"2020-05-28","ids":{"openalex":"https://openalex.org/W3032089044","doi":"https://doi.org/10.1142/s0218126621500468","mag":"3032089044"},"language":"en","primary_location":{"id":"doi:10.1142/s0218126621500468","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218126621500468","pdf_url":null,"source":{"id":"https://openalex.org/S167602672","display_name":"Journal of Circuits Systems and Computers","issn_l":"0218-1266","issn":["0218-1266","1793-6454"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Circuits, Systems and Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101963142","display_name":"Lin Shi","orcid":"https://orcid.org/0000-0001-7322-4118"},"institutions":[{"id":"https://openalex.org/I4210089783","display_name":"Shanghai Medical Information Center","ror":"https://ror.org/007wz9933","country_code":"CN","type":"other","lineage":["https://openalex.org/I4210089783"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]},{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lin Shi","raw_affiliation_strings":["College of Economics and Management, Nanjing University of Aeronautics and Astronautics, Nanjing 211106, Jiangsu, P. R. China","Jiangsu Financial Information Management Center, Nanjing 210024, Jiangsu, P. R. China","School of Cyber Science and Engineering, Southeast University, Nanjing 210096, Jiangsu, P. R. China"],"raw_orcid":"https://orcid.org/0000-0001-7322-4118","affiliations":[{"raw_affiliation_string":"College of Economics and Management, Nanjing University of Aeronautics and Astronautics, Nanjing 211106, Jiangsu, P. R. China","institution_ids":["https://openalex.org/I9842412"]},{"raw_affiliation_string":"Jiangsu Financial Information Management Center, Nanjing 210024, Jiangsu, P. R. China","institution_ids":["https://openalex.org/I4210089783"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing 210096, Jiangsu, P. R. China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100384113","display_name":"Zilong Wang","orcid":"https://orcid.org/0009-0003-4453-3896"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zilong Wang","raw_affiliation_strings":["College of Economics and Management, Nanjing University of Aeronautics and Astronautics, Nanjing 211106, Jiangsu, P. R. China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Economics and Management, Nanjing University of Aeronautics and Astronautics, Nanjing 211106, Jiangsu, P. R. China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103001149","display_name":"Yixuan Zeng","orcid":"https://orcid.org/0000-0002-2942-1859"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yixuan Zeng","raw_affiliation_strings":["College of Liberal Arts, Nanjing University of Information and Science Technology, Nanjing 210044, Jiangsu, P. R. China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Liberal Arts, Nanjing University of Information and Science Technology, Nanjing 210044, Jiangsu, P. R. China","institution_ids":["https://openalex.org/I200845125"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101963142"],"corresponding_institution_ids":["https://openalex.org/I4210089783","https://openalex.org/I76569877","https://openalex.org/I9842412"],"apc_list":null,"apc_paid":null,"fwci":0.4856,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.67345407,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"30","issue":"03","first_page":"2150046","last_page":"2150046"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.989300012588501,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.7921687364578247},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7240791320800781},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6889932155609131},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.6205593943595886},{"id":"https://openalex.org/keywords/offensive","display_name":"Offensive","score":0.6023823022842407},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5253704786300659},{"id":"https://openalex.org/keywords/harm","display_name":"Harm","score":0.5095112919807434},{"id":"https://openalex.org/keywords/vulnerability-management","display_name":"Vulnerability management","score":0.4968285858631134},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4790274202823639},{"id":"https://openalex.org/keywords/security-controls","display_name":"Security controls","score":0.47353073954582214},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.4681940972805023},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.3872455954551697},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.17737770080566406},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1533883810043335},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.12577176094055176},{"id":"https://openalex.org/keywords/operations-research","display_name":"Operations research","score":0.11556455492973328},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1029784083366394}],"concepts":[{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.7921687364578247},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7240791320800781},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6889932155609131},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.6205593943595886},{"id":"https://openalex.org/C176856949","wikidata":"https://www.wikidata.org/wiki/Q2001676","display_name":"Offensive","level":2,"score":0.6023823022842407},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5253704786300659},{"id":"https://openalex.org/C2777363581","wikidata":"https://www.wikidata.org/wiki/Q15098235","display_name":"Harm","level":2,"score":0.5095112919807434},{"id":"https://openalex.org/C172776598","wikidata":"https://www.wikidata.org/wiki/Q7943570","display_name":"Vulnerability management","level":4,"score":0.4968285858631134},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4790274202823639},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.47353073954582214},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4681940972805023},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.3872455954551697},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.17737770080566406},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1533883810043335},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.12577176094055176},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.11556455492973328},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1029784083366394},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s0218126621500468","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218126621500468","pdf_url":null,"source":{"id":"https://openalex.org/S167602672","display_name":"Journal of Circuits Systems and Computers","issn_l":"0218-1266","issn":["0218-1266","1793-6454"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Circuits, Systems and Computers","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/11","score":0.4699999988079071,"display_name":"Sustainable cities and communities"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1683889830","https://openalex.org/W1993558273","https://openalex.org/W2201870544","https://openalex.org/W2514103709","https://openalex.org/W2888048838","https://openalex.org/W2910417943","https://openalex.org/W2911293217","https://openalex.org/W2921118440","https://openalex.org/W2937097823","https://openalex.org/W2972326439","https://openalex.org/W2976337360","https://openalex.org/W2997136556","https://openalex.org/W3005215764"],"related_works":["https://openalex.org/W2182597083","https://openalex.org/W2024164043","https://openalex.org/W2147405072","https://openalex.org/W4300871384","https://openalex.org/W53551321","https://openalex.org/W2358489782","https://openalex.org/W1657769681","https://openalex.org/W2123482121","https://openalex.org/W3032089044","https://openalex.org/W2505835510"],"abstract_inverted_index":{"The":[0],"standardized":[1],"communication":[2],"protocol":[3],"and":[4,24,37,78,84,108,131,134,153],"the":[5,19,40,43,58,66,69,75,103,106,115,124,128,136,139,158,161],"universal":[6],"application":[7],"of":[8,21,42,68,81,85,105,119,127,138,143,147,160],"intelligent":[9],"electronic":[10],"devices":[11],"in":[12,57,145],"edge":[13,44,59],"networks":[14],"provide":[15],"technical":[16],"support":[17],"to":[18,35,53,101],"realization":[20],"smart":[22],"cities":[23],"also":[25],"bring":[26],"network":[27,45,60],"security":[28,61,110,116,140],"issues":[29],"that":[30,51],"cannot":[31],"be":[32,54],"ignored.":[33],"How":[34],"analyze":[36,102],"quantitatively":[38],"assess":[39],"vulnerability":[41,70,82,87,97,104],"has":[46],"become":[47],"an":[48,95],"important":[49],"issue":[50],"needs":[52],"solved":[55],"urgently":[56],"risk":[62,117,141],"control.":[63],"Based":[64],"on":[65,123],"analysis":[67],"mechanism,":[71],"this":[72,92],"paper":[73,93,113],"proposes":[74,94],"selection":[76],"criteria":[77],"generation":[79],"methods":[80],"indicators":[83],"composite":[86],"indicators,":[88],"respectively.":[89],"In":[90],"addition,":[91],"improved":[96],"severity":[98],"rating":[99],"method":[100],"system":[107],"potential":[109],"threats.":[111],"This":[112],"describes":[114],"status":[118,142],"vulnerable":[120],"points":[121],"based":[122],"state":[125,129],"transition":[126],"offensive":[130],"defensive":[132],"graph":[133],"implements":[135],"description":[137],"attacks":[144],"terms":[146],"attack":[148,150],"frequency,":[149],"success":[151],"rate":[152],"harm.":[154],"Experimental":[155],"results":[156],"justify":[157],"effectiveness":[159],"proposed":[162],"solution.":[163]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
