{"id":"https://openalex.org/W2603196442","doi":"https://doi.org/10.1145/3041008.3041015","title":"Identifying Key Cyber-Physical Terrain","display_name":"Identifying Key Cyber-Physical Terrain","publication_year":2017,"publication_date":"2017-03-24","ids":{"openalex":"https://openalex.org/W2603196442","doi":"https://doi.org/10.1145/3041008.3041015","mag":"2603196442"},"language":"en","primary_location":{"id":"doi:10.1145/3041008.3041015","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3041008.3041015","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080341077","display_name":"Brian Thompson","orcid":null},"institutions":[{"id":"https://openalex.org/I44896327","display_name":"Mitre (United States)","ror":"https://ror.org/03ks2a131","country_code":"US","type":"company","lineage":["https://openalex.org/I44896327"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Brian Thompson","raw_affiliation_strings":["The MITRE Corporation, McLean, VA, USA"],"affiliations":[{"raw_affiliation_string":"The MITRE Corporation, McLean, VA, USA","institution_ids":["https://openalex.org/I44896327"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033809782","display_name":"Richard Harang","orcid":null},"institutions":[{"id":"https://openalex.org/I166416128","display_name":"DEVCOM Army Research Laboratory","ror":"https://ror.org/011hc8f90","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I166416128","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Richard Harang","raw_affiliation_strings":["U.S. Army Research Lab, Adelphi, MD, USA"],"affiliations":[{"raw_affiliation_string":"U.S. Army Research Lab, Adelphi, MD, USA","institution_ids":["https://openalex.org/I166416128"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5080341077"],"corresponding_institution_ids":["https://openalex.org/I44896327"],"apc_list":null,"apc_paid":null,"fwci":0.6216,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.70591818,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"23","last_page":"28"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/terrain","display_name":"Terrain","score":0.8037958145141602},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7533218860626221},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.7214148044586182},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.7027826905250549},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5680737495422363},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5061630606651306},{"id":"https://openalex.org/keywords/range","display_name":"Range (aeronautics)","score":0.5012452602386475},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.485734760761261},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.435323566198349},{"id":"https://openalex.org/keywords/physical-space","display_name":"Physical space","score":0.42711085081100464},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42672866582870483},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.13032421469688416},{"id":"https://openalex.org/keywords/geography","display_name":"Geography","score":0.1064085066318512},{"id":"https://openalex.org/keywords/aerospace-engineering","display_name":"Aerospace engineering","score":0.08421358466148376}],"concepts":[{"id":"https://openalex.org/C161840515","wikidata":"https://www.wikidata.org/wiki/Q186131","display_name":"Terrain","level":2,"score":0.8037958145141602},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7533218860626221},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.7214148044586182},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.7027826905250549},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5680737495422363},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5061630606651306},{"id":"https://openalex.org/C204323151","wikidata":"https://www.wikidata.org/wiki/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.5012452602386475},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.485734760761261},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.435323566198349},{"id":"https://openalex.org/C2982717780","wikidata":"https://www.wikidata.org/wiki/Q107","display_name":"Physical space","level":2,"score":0.42711085081100464},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42672866582870483},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13032421469688416},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.1064085066318512},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.08421358466148376},{"id":"https://openalex.org/C58640448","wikidata":"https://www.wikidata.org/wiki/Q42515","display_name":"Cartography","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3041008.3041015","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3041008.3041015","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1584325681","https://openalex.org/W1971937094","https://openalex.org/W1978136502","https://openalex.org/W2042728064","https://openalex.org/W2066636486","https://openalex.org/W2068011000","https://openalex.org/W2110725936","https://openalex.org/W2124486211","https://openalex.org/W2148301044","https://openalex.org/W2164463646","https://openalex.org/W2165308387","https://openalex.org/W2212501783","https://openalex.org/W2344656633","https://openalex.org/W2566862376","https://openalex.org/W2580587828","https://openalex.org/W2603196442"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W4284893819","https://openalex.org/W4399671601","https://openalex.org/W3017360834","https://openalex.org/W4389543381"],"abstract_inverted_index":{"The":[0,23],"high":[1],"mobility":[2],"of":[3,55,68,76,86,98,109,116],"Army":[4],"tactical":[5,92],"networks,":[6],"combined":[7],"with":[8,19,105],"their":[9],"close":[10],"proximity":[11],"to":[12],"hostile":[13],"actors,":[14],"elevates":[15],"the":[16,41,46,53,66,84,96],"risks":[17],"associated":[18],"short-range":[20],"network":[21,100],"attacks.":[22],"connectivity":[24],"model":[25],"for":[26,80,122],"such":[27,124,135],"short":[28],"range":[29],"connections":[30],"under":[31],"active":[32],"operations":[33,77],"is":[34,48],"extremely":[35],"fluid,":[36],"and":[37,119,127,140],"highly":[38],"dependent":[39],"upon":[40],"physical":[42],"space":[43],"within":[44,57,73],"which":[45],"element":[47],"operating,":[49],"as":[50,52,95],"well":[51],"patterns":[54],"movement":[56,117],"that":[58,78,99,131],"space.":[59],"To":[60],"handle":[61],"these":[62],"dependencies,":[63],"we":[64,132],"introduce":[65],"notion":[67],"\"key":[69],"cyber-physical":[70,137],"terrain\":":[71],"locations":[72],"an":[74,106,114],"area":[75],"allow":[79],"effective":[81],"control":[82],"over":[83],"spread":[85],"proximity-dependent":[87],"malware":[88],"in":[89,102],"a":[90],"mobile":[91],"network,":[93],"even":[94],"elements":[97],"are":[101],"constant":[103],"motion":[104],"unpredictable":[107],"pattern":[108],"node-to-node":[110],"connectivity.":[111],"We":[112],"provide":[113],"analysis":[115],"models":[118],"approximation":[120],"strategies":[121],"finding":[123],"critical":[125],"nodes,":[126],"demonstrate":[128],"via":[129],"simulation":[130],"can":[133],"identify":[134],"key":[136],"terrain":[138],"quickly":[139],"effectively.":[141]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
