{"id":"https://openalex.org/W2072030921","doi":"https://doi.org/10.1145/2590296.2590308","title":"How many down?","display_name":"How many down?","publication_year":2014,"publication_date":"2014-05-30","ids":{"openalex":"https://openalex.org/W2072030921","doi":"https://doi.org/10.1145/2590296.2590308","mag":"2072030921"},"language":"en","primary_location":{"id":"doi:10.1145/2590296.2590308","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2590296.2590308","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 9th ACM symposium on Information, computer and communications security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089194215","display_name":"Benjamin Johnson","orcid":"https://orcid.org/0000-0001-8832-9457"},"institutions":[{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Benjamin Johnson","raw_affiliation_strings":["University of California, Berkeley, Berkeley, CA, USA","University of California, Berkeley, Berkeley, CA USA"],"affiliations":[{"raw_affiliation_string":"University of California, Berkeley, Berkeley, CA, USA","institution_ids":["https://openalex.org/I95457486"]},{"raw_affiliation_string":"University of California, Berkeley, Berkeley, CA USA","institution_ids":["https://openalex.org/I95457486"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049435924","display_name":"\u00c1ron L\u00e1szka","orcid":"https://orcid.org/0000-0001-7400-2357"},"institutions":[{"id":"https://openalex.org/I29770179","display_name":"Budapest University of Technology and Economics","ror":"https://ror.org/02w42ss30","country_code":"HU","type":"education","lineage":["https://openalex.org/I29770179"]}],"countries":["HU"],"is_corresponding":false,"raw_author_name":"Aron Laszka","raw_affiliation_strings":["Budapest University of Technology and Economics, Budapest, Hungary","Budapest University of Technology and Economics , Budapest , Hungary"],"affiliations":[{"raw_affiliation_string":"Budapest University of Technology and Economics, Budapest, Hungary","institution_ids":["https://openalex.org/I29770179"]},{"raw_affiliation_string":"Budapest University of Technology and Economics , Budapest , Hungary","institution_ids":["https://openalex.org/I29770179"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063714878","display_name":"Jens Gro\u00dfklags","orcid":"https://orcid.org/0000-0003-1093-1282"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jens Grossklags","raw_affiliation_strings":["The Pennsylvania State University, State College, PA, USA"],"affiliations":[{"raw_affiliation_string":"The Pennsylvania State University, State College, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5089194215"],"corresponding_institution_ids":["https://openalex.org/I95457486"],"apc_list":null,"apc_paid":null,"fwci":1.407,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.81886377,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"495","last_page":"500"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12592","display_name":"Opinion Dynamics and Social Influence","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.7630820870399475},{"id":"https://openalex.org/keywords/dependency","display_name":"Dependency (UML)","score":0.7337651252746582},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7210253477096558},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.6225818991661072},{"id":"https://openalex.org/keywords/interdependence","display_name":"Interdependence","score":0.6079716682434082},{"id":"https://openalex.org/keywords/outcome","display_name":"Outcome (game theory)","score":0.5576707720756531},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.5001301765441895},{"id":"https://openalex.org/keywords/scale-free-network","display_name":"Scale-free network","score":0.47474008798599243},{"id":"https://openalex.org/keywords/graphical-model","display_name":"Graphical model","score":0.4559631049633026},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.43233418464660645},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3478665351867676},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.34263038635253906},{"id":"https://openalex.org/keywords/complex-network","display_name":"Complex network","score":0.31877046823501587},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1459447741508484},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1347752809524536}],"concepts":[{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.7630820870399475},{"id":"https://openalex.org/C19768560","wikidata":"https://www.wikidata.org/wiki/Q320727","display_name":"Dependency (UML)","level":2,"score":0.7337651252746582},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7210253477096558},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.6225818991661072},{"id":"https://openalex.org/C185874996","wikidata":"https://www.wikidata.org/wiki/Q269699","display_name":"Interdependence","level":2,"score":0.6079716682434082},{"id":"https://openalex.org/C148220186","wikidata":"https://www.wikidata.org/wiki/Q7111912","display_name":"Outcome (game theory)","level":2,"score":0.5576707720756531},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.5001301765441895},{"id":"https://openalex.org/C25580894","wikidata":"https://www.wikidata.org/wiki/Q1071058","display_name":"Scale-free network","level":3,"score":0.47474008798599243},{"id":"https://openalex.org/C155846161","wikidata":"https://www.wikidata.org/wiki/Q1143367","display_name":"Graphical model","level":2,"score":0.4559631049633026},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.43233418464660645},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3478665351867676},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34263038635253906},{"id":"https://openalex.org/C34947359","wikidata":"https://www.wikidata.org/wiki/Q665189","display_name":"Complex network","level":2,"score":0.31877046823501587},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1459447741508484},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1347752809524536},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2590296.2590308","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2590296.2590308","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 9th ACM symposium on Information, computer and communications security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Decent work and economic growth","score":0.46000000834465027,"id":"https://metadata.un.org/sdg/8"}],"awards":[{"id":"https://openalex.org/G2043895709","display_name":null,"funder_award_id":"W911NF-13-2-0045","funder_id":"https://openalex.org/F4320338295","funder_display_name":"Army Research Laboratory"},{"id":"https://openalex.org/G6937232228","display_name":null,"funder_award_id":"CCF-0424422","funder_id":"https://openalex.org/F4320337387","funder_display_name":"Division of Computing and Communication Foundations"}],"funders":[{"id":"https://openalex.org/F4320337387","display_name":"Division of Computing and Communication Foundations","ror":"https://ror.org/01mng8331"},{"id":"https://openalex.org/F4320338295","display_name":"Army Research Laboratory","ror":"https://ror.org/011hc8f90"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W53401952","https://openalex.org/W73527706","https://openalex.org/W77047371","https://openalex.org/W106782957","https://openalex.org/W1482734477","https://openalex.org/W1500450275","https://openalex.org/W1513707187","https://openalex.org/W1572831554","https://openalex.org/W1738749088","https://openalex.org/W1972976939","https://openalex.org/W1987236914","https://openalex.org/W1995213405","https://openalex.org/W2008620264","https://openalex.org/W2025392770","https://openalex.org/W2048596679","https://openalex.org/W2052611279","https://openalex.org/W2110522107","https://openalex.org/W2115022330","https://openalex.org/W2124486211","https://openalex.org/W2126949246","https://openalex.org/W2140356130","https://openalex.org/W2140719869","https://openalex.org/W2144173251","https://openalex.org/W2147256592","https://openalex.org/W2149705024","https://openalex.org/W2168337670","https://openalex.org/W2560536009","https://openalex.org/W2612972698","https://openalex.org/W2624787701","https://openalex.org/W2964127029","https://openalex.org/W3012502744","https://openalex.org/W3121840377","https://openalex.org/W4236841844","https://openalex.org/W4254318710","https://openalex.org/W6681100228","https://openalex.org/W6682180568","https://openalex.org/W6684679250"],"related_works":["https://openalex.org/W584881664","https://openalex.org/W2896300277","https://openalex.org/W2955169294","https://openalex.org/W2944759572","https://openalex.org/W2088554646","https://openalex.org/W2373100292","https://openalex.org/W3125380556","https://openalex.org/W2316807176","https://openalex.org/W3009528591","https://openalex.org/W2085207701"],"abstract_inverted_index":{"The":[0],"systematic":[1],"risk":[2,26],"of":[3,25,38,44,63,85,95],"a":[4,9,23,56],"networked":[5],"system":[6],"depends":[7],"to":[8,59,73,107],"large":[10],"extent":[11],"on":[12,31,41,66],"its":[13],"topology.":[14],"In":[15],"this":[16,20,71],"paper,":[17],"we":[18],"explore":[19],"dependency":[21],"using":[22],"model":[24],"propagation":[27],"from":[28],"the":[29,42,61,82,93],"literature":[30],"interdependent":[32],"security":[33],"games.":[34],"Our":[35],"main":[36],"area":[37],"focus":[39],"is":[40],"number":[43],"nodes":[45,98],"that":[46,91],"go":[47],"down":[48],"after":[49],"an":[50,102],"attack":[51],"takes":[52],"place.":[53],"We":[54,76],"develop":[55],"simulation":[57,72],"algorithm":[58],"study":[60],"effects":[62,90],"such":[64,86],"attacks":[65],"arbitrary":[67],"topologies,":[68],"and":[69],"apply":[70],"scale-free":[74],"networks.":[75],"investigate":[77],"by":[78],"graphical":[79],"illustration":[80],"how":[81],"outcome":[83],"distribution":[84],"networks":[87],"exhibits":[88],"correlation":[89],"increase":[92],"likelihood":[94],"losing":[96],"more":[97],"at":[99],"once":[100],"--":[101],"effect":[103],"having":[104],"direct":[105],"applications":[106],"cyber-insurance.":[108]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
