{"id":"https://openalex.org/W3109279011","doi":"https://doi.org/10.1142/s0218213020400242","title":"Research on Automatic Vulnerability Mining Model Based on Knowledge Graph","display_name":"Research on Automatic Vulnerability Mining Model Based on Knowledge Graph","publication_year":2020,"publication_date":"2020-11-30","ids":{"openalex":"https://openalex.org/W3109279011","doi":"https://doi.org/10.1142/s0218213020400242","mag":"3109279011"},"language":"en","primary_location":{"id":"doi:10.1142/s0218213020400242","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218213020400242","pdf_url":null,"source":{"id":"https://openalex.org/S178780388","display_name":"International Journal of Artificial Intelligence Tools","issn_l":"0218-2130","issn":["0218-2130","1793-6349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal on Artificial Intelligence Tools","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100664181","display_name":"Ze Chen","orcid":"https://orcid.org/0000-0001-8518-140X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Ze Chen","raw_affiliation_strings":["State Grid Hebei Electric Power Research Institutes, Shijiazhuang, 50021, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"State Grid Hebei Electric Power Research Institutes, Shijiazhuang, 50021, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025681543","display_name":"Xiaojun Zuo","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xiaojun Zuo","raw_affiliation_strings":["State Grid Hebei Electric Power Research Institutes, Shijiazhuang, 50021, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"State Grid Hebei Electric Power Research Institutes, Shijiazhuang, 50021, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029334833","display_name":"Botao Hou","orcid":"https://orcid.org/0000-0001-8676-9889"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Botao Hou","raw_affiliation_strings":["State Grid Hebei Electric Power Research Institutes, Shijiazhuang, 50021, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"State Grid Hebei Electric Power Research Institutes, Shijiazhuang, 50021, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071568179","display_name":"Na Dong","orcid":"https://orcid.org/0000-0003-2982-3441"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Na Dong","raw_affiliation_strings":["State Grid Hebei Electric Power Research Institutes, Shijiazhuang, 50021, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"State Grid Hebei Electric Power Research Institutes, Shijiazhuang, 50021, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024615256","display_name":"Jie Chang","orcid":"https://orcid.org/0000-0002-8484-482X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jie Chang","raw_affiliation_strings":["State Grid Hebei Electric Power Research Institutes, Shijiazhuang, 50021, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"State Grid Hebei Electric Power Research Institutes, Shijiazhuang, 50021, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100664181"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.8354,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.82022516,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"29","issue":"07n08","first_page":"2040024","last_page":"2040024"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9740999937057495,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9740999937057495,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.914900004863739,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9068418145179749},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4878218472003937},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44684404134750366},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.44615086913108826},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.44462600350379944},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.43043163418769836},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.15561479330062866}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9068418145179749},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4878218472003937},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44684404134750366},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.44615086913108826},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.44462600350379944},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.43043163418769836},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.15561479330062866}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s0218213020400242","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218213020400242","pdf_url":null,"source":{"id":"https://openalex.org/S178780388","display_name":"International Journal of Artificial Intelligence Tools","issn_l":"0218-2130","issn":["0218-2130","1793-6349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal on Artificial Intelligence Tools","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Decent work and economic growth","score":0.4099999964237213,"id":"https://metadata.un.org/sdg/8"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2095999892","https://openalex.org/W2018764758","https://openalex.org/W2383689843","https://openalex.org/W1550668881","https://openalex.org/W617913288","https://openalex.org/W1977400398","https://openalex.org/W2319323865","https://openalex.org/W2951745010","https://openalex.org/W2347958299","https://openalex.org/W4387171935"],"abstract_inverted_index":{"In":[0,51,194],"the":[1,11,14,18,22,33,37,52,64,73,79,82,96,100,103,110,115,125,141,146,155,163,172,175,177,183,188,191,195,214,224,245,250,260],"information":[2,4,88,104],"extraction,":[3],"sources":[5],"can":[6,27,209,234],"be":[7,210,235],"screened":[8],"according":[9],"to":[10,70,94,123,144,149,161,212,222,237,259],"characteristics":[12],"of":[13,36,78,99,166,174,190,197,206,216,249],"target":[15],"network":[16,39,168,185,262],"at":[17],"present":[19],"stage,":[20],"and":[21,47,67,76,90,102,154,203,218,230,247,254],"knowledge":[23,58,192],"graph":[24,179,199],"generated":[25,117,129,181],"thereby":[26],"play":[28],"a":[29,257],"role":[30],"in":[31,55,109],"assisting":[32],"security":[34],"analysis":[35,98],"general":[38],"or":[40],"power":[41],"grid":[42,261],"control":[43],"network,":[44],"mobile":[45],"Internet":[46],"other":[48],"special":[49],"networks.":[50],"method":[53,202],"proposed":[54],"this":[56,255],"paper,":[57],"reasoning":[59,91],"is":[60,121,159,180],"mainly":[61],"based":[62],"on":[63],"attack":[65,68,138,142,156,178,198,201,204,207,225,231],"conditions":[66],"methods":[69],"reason":[71],"about":[72],"success":[74,157,228],"rate":[75,158,229],"return":[77],"attack.":[80],"Through":[81],"obtained":[83],"quality":[84],"information,":[85,101],"map":[86],"construction":[87,173],"extraction":[89],"are":[92,107,252],"performed":[93],"realize":[95],"correlation":[97],"processing":[105],"results":[106],"stored":[108],"graphic":[111],"structure.":[112],"When":[113],"analyzing":[114],"alerts":[116],"by":[118,130,134],"IDS,":[119],"it":[120],"necessary":[122],"solve":[124],"multi-source":[126],"alarm":[127],"format":[128],"various":[131],"devices":[132],"produced":[133],"different":[135],"suppliers.":[136],"The":[137],"diagram":[139],"constructs":[140],"mode":[143],"guide":[145,213],"defense":[147,152,164],"side":[148],"take":[150],"targeted":[151],"measures,":[153],"used":[160,211,236],"judge":[162],"priority":[165],"all":[167],"nodes.":[169],"After":[170,242],"completing":[171],"graph,":[176],"for":[182],"specific":[184],"environment":[186],"under":[187],"guidance":[189],"graph.":[193],"process":[196],"generation,":[200],"condition":[205],"instance":[208],"match":[215],"pre-condition":[217],"post-condition,":[219],"so":[220],"as":[221],"find":[223],"path.":[226],"Attack":[227],"profit":[232],"attribute":[233],"assist":[238],"subsequent":[239],"risk":[240],"analysis.":[241],"simulation":[243],"tests,":[244],"timeliness":[246],"availability":[248],"system":[251],"verified,":[253],"makes":[256],"contribution":[258],"management.":[263]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2022,"cited_by_count":3}],"updated_date":"2026-05-21T09:19:25.381259","created_date":"2025-10-10T00:00:00"}
