{"id":"https://openalex.org/W2082666187","doi":"https://doi.org/10.1145/2699907","title":"Pareto-Optimal Adversarial Defense of Enterprise Systems","display_name":"Pareto-Optimal Adversarial Defense of Enterprise Systems","publication_year":2015,"publication_date":"2015-03-09","ids":{"openalex":"https://openalex.org/W2082666187","doi":"https://doi.org/10.1145/2699907","mag":"2082666187"},"language":"en","primary_location":{"id":"doi:10.1145/2699907","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2699907","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009094578","display_name":"Edoardo Serra","orcid":"https://orcid.org/0000-0003-0689-5063"},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Edoardo Serra","raw_affiliation_strings":["University of Maryland, College Park,MD20742, USA","University of Maryland, College Park, MD20742, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"University of Maryland, College Park,MD20742, USA","institution_ids":["https://openalex.org/I66946132"]},{"raw_affiliation_string":"University of Maryland, College Park, MD20742, USA#TAB#","institution_ids":["https://openalex.org/I66946132"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010727123","display_name":"Sushil Jajodia","orcid":"https://orcid.org/0000-0003-3210-558X"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sushil Jajodia","raw_affiliation_strings":["George Mason University, Fairfax, VA, USA"],"affiliations":[{"raw_affiliation_string":"George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061876852","display_name":"Andrea Pugliese","orcid":"https://orcid.org/0000-0003-4385-958X"},"institutions":[{"id":"https://openalex.org/I45204951","display_name":"University of Calabria","ror":"https://ror.org/02rc97e94","country_code":"IT","type":"education","lineage":["https://openalex.org/I45204951"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Andrea Pugliese","raw_affiliation_strings":["University of Calabria, Italia"],"affiliations":[{"raw_affiliation_string":"University of Calabria, Italia","institution_ids":["https://openalex.org/I45204951"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032127732","display_name":"Antonino Rullo","orcid":"https://orcid.org/0000-0002-6030-0027"},"institutions":[{"id":"https://openalex.org/I45204951","display_name":"University of Calabria","ror":"https://ror.org/02rc97e94","country_code":"IT","type":"education","lineage":["https://openalex.org/I45204951"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Antonino Rullo","raw_affiliation_strings":["University of Calabria, Italia"],"affiliations":[{"raw_affiliation_string":"University of Calabria, Italia","institution_ids":["https://openalex.org/I45204951"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038645035","display_name":"V. S. Subrahmanian","orcid":"https://orcid.org/0000-0001-7191-0296"},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"V. S. Subrahmanian","raw_affiliation_strings":["University of Maryland"],"affiliations":[{"raw_affiliation_string":"University of Maryland","institution_ids":["https://openalex.org/I66946132"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5009094578"],"corresponding_institution_ids":["https://openalex.org/I66946132"],"apc_list":null,"apc_paid":null,"fwci":18.2758,"has_fulltext":false,"cited_by_count":47,"citation_normalized_percentile":{"value":0.99038163,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"17","issue":"3","first_page":"1","last_page":"39"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9843000173568726,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10994","display_name":"Terrorism, Counterterrorism, and Political Violence","score":0.9807000160217285,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.8159966468811035},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7837365865707397},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.620762825012207},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5788818001747131},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.559476912021637},{"id":"https://openalex.org/keywords/pareto-principle","display_name":"Pareto principle","score":0.5553998947143555},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5349992513656616},{"id":"https://openalex.org/keywords/enterprise-private-network","display_name":"Enterprise private network","score":0.5323097705841064},{"id":"https://openalex.org/keywords/dependency-graph","display_name":"Dependency graph","score":0.43670016527175903},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.4317229390144348},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.39066994190216064},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.1756359338760376},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09567487239837646}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.8159966468811035},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7837365865707397},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.620762825012207},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5788818001747131},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.559476912021637},{"id":"https://openalex.org/C137635306","wikidata":"https://www.wikidata.org/wiki/Q182667","display_name":"Pareto principle","level":2,"score":0.5553998947143555},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5349992513656616},{"id":"https://openalex.org/C149859251","wikidata":"https://www.wikidata.org/wiki/Q483426","display_name":"Enterprise private network","level":2,"score":0.5323097705841064},{"id":"https://openalex.org/C16311509","wikidata":"https://www.wikidata.org/wiki/Q4148050","display_name":"Dependency graph","level":3,"score":0.43670016527175903},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.4317229390144348},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.39066994190216064},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.1756359338760376},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09567487239837646},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2699907","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2699907","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6499999761581421,"display_name":"Decent work and economic growth","id":"https://metadata.un.org/sdg/8"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W586722081","https://openalex.org/W1505851021","https://openalex.org/W1518431406","https://openalex.org/W1550792582","https://openalex.org/W1602325706","https://openalex.org/W1968161748","https://openalex.org/W1987712120","https://openalex.org/W2007940874","https://openalex.org/W2028100337","https://openalex.org/W2044152003","https://openalex.org/W2054127354","https://openalex.org/W2065527711","https://openalex.org/W2067064328","https://openalex.org/W2071274528","https://openalex.org/W2072620509","https://openalex.org/W2077937403","https://openalex.org/W2083658929","https://openalex.org/W2086114280","https://openalex.org/W2091673436","https://openalex.org/W2093776691","https://openalex.org/W2104588447","https://openalex.org/W2110309529","https://openalex.org/W2110793865","https://openalex.org/W2116039228","https://openalex.org/W2117694832","https://openalex.org/W2118595571","https://openalex.org/W2121805588","https://openalex.org/W2122269808","https://openalex.org/W2131875370","https://openalex.org/W2140353661","https://openalex.org/W2141289698","https://openalex.org/W2151369956","https://openalex.org/W2157554212","https://openalex.org/W2163468230","https://openalex.org/W2167580124","https://openalex.org/W2269788763","https://openalex.org/W2617798520","https://openalex.org/W2914982603","https://openalex.org/W4237654646","https://openalex.org/W6600567258"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W4246396837","https://openalex.org/W2482350142","https://openalex.org/W3176240006","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492","https://openalex.org/W4288019534","https://openalex.org/W4310988119"],"abstract_inverted_index":{"The":[0,119],"National":[1,9],"Vulnerability":[2,72],"Database":[3],"(NVD)":[4],"maintained":[5],"by":[6,51,133],"the":[7,40,65,89,126,129,134,136,160,171,177,207],"US":[8],"Institute":[10],"of":[11,93,128,173,189,213],"Standards":[12],"and":[13,76,169,185,205,211],"Technology":[14],"provides":[15],"valuable":[16],"information":[17],"about":[18],"vulnerabilities":[19,55,66,94],"in":[20,67,84,99],"popular":[21],"software,":[22],"as":[23,25,70,114],"well":[24],"any":[26],"patches":[27],"available":[28],"to":[29,56,101,124,142,165],"address":[30],"these":[31],"vulnerabilities.":[32],"Most":[33],"enterprise":[34,50,69,178],"security":[35],"managers":[36],"today":[37],"simply":[38],"patch":[39],"most":[41],"dangerous":[42],"vulnerabilities\u2014an":[43],"adversary":[44],"can":[45,81,111],"thus":[46],"easily":[47],"compromise":[48],"an":[49,58,68,96,115,140,152],"using":[52],"less":[53],"important":[54],"penetrate":[57],"enterprise.":[59,149],"In":[60],"this":[61,109,183],"article,":[62],"we":[63],"capture":[64],"a":[71,144,156],"Dependency":[73],"Graph":[74],"(VDG)":[75],"show":[77,107,186],"that":[78,108,154,162,187,206],"attacks":[79,214],"graphs":[80],"be":[82,112],"expressed":[83],"them.":[85],"We":[86,106,150,180],"first":[87],"ask":[88],"question:":[90],"What":[91],"set":[92],"should":[95],"attacker":[97],"exploit":[98],"order":[100],"maximize":[102,167],"his":[103,148],"expected":[104],"impact?":[105],"problem":[110],"solved":[113],"integer":[116],"linear":[117],"program.":[118],"defender":[120,137,161],"would":[121],"obviously":[122],"like":[123],"minimize":[125,170],"impact":[127,212],"worst-case":[130],"attack":[131],"mounted":[132],"attacker\u2014but":[135],"also":[138,216],"has":[139],"obligation":[141],"ensure":[143],"high":[145],"productivity":[146,168,210],"within":[147,194],"propose":[151],"algorithm":[153],"finds":[155],"Pareto-optimal":[157],"solution":[158],"for":[159,199],"allows":[163],"him":[164],"simultaneously":[166],"cost":[172],"patching":[174],"products":[175],"on":[176],"network.":[179],"have":[181],"implemented":[182],"framework":[184],"runtimes":[188],"our":[190],"computations":[191],"are":[192],"all":[193],"acceptable":[195],"time":[196],"bounds":[197],"even":[198],"large":[200],"VDGs":[201],"containing":[202],"30K":[203],"edges":[204],"balance":[208],"between":[209],"is":[215],"acceptable.":[217]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":7},{"year":2017,"cited_by_count":9},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
