{"id":"https://openalex.org/W2471554257","doi":"https://doi.org/10.1145/3105760","title":"Efficient Attack Graph Analysis through Approximate Inference","display_name":"Efficient Attack Graph Analysis through Approximate Inference","publication_year":2017,"publication_date":"2017-07-31","ids":{"openalex":"https://openalex.org/W2471554257","doi":"https://doi.org/10.1145/3105760","mag":"2471554257"},"language":"en","primary_location":{"id":"doi:10.1145/3105760","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3105760","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=3105760&type=pdf","source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"http://dl.acm.org/ft_gateway.cfm?id=3105760&type=pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032718837","display_name":"Luis Mu\u00f1oz-Gonz\u00e1lez","orcid":"https://orcid.org/0000-0001-6093-5922"},"institutions":[{"id":"https://openalex.org/I47508984","display_name":"Imperial College London","ror":"https://ror.org/041kmwe10","country_code":"GB","type":"education","lineage":["https://openalex.org/I47508984"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Luis Mu\u00f1oz-Gonz\u00e1lez","raw_affiliation_strings":["Imperial College London, London, UK","Imperial College London, London (UK)#TAB#"],"affiliations":[{"raw_affiliation_string":"Imperial College London, London, UK","institution_ids":["https://openalex.org/I47508984"]},{"raw_affiliation_string":"Imperial College London, London (UK)#TAB#","institution_ids":["https://openalex.org/I47508984"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001748768","display_name":"Daniele Sgandurra","orcid":"https://orcid.org/0000-0001-5238-8068"},"institutions":[{"id":"https://openalex.org/I184558857","display_name":"Royal Holloway University of London","ror":"https://ror.org/04g2vpn86","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I184558857"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Daniele Sgandurra","raw_affiliation_strings":["Royal Holloway, University of London, Egham Hill, Egham, UK","Royal Holloway, University of London, Egham Hill, Egham, UK#TAB#"],"affiliations":[{"raw_affiliation_string":"Royal Holloway, University of London, Egham Hill, Egham, UK","institution_ids":["https://openalex.org/I184558857"]},{"raw_affiliation_string":"Royal Holloway, University of London, Egham Hill, Egham, UK#TAB#","institution_ids":["https://openalex.org/I184558857"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031096722","display_name":"Andrea Paudice","orcid":"https://orcid.org/0000-0003-1098-662X"},"institutions":[{"id":"https://openalex.org/I47508984","display_name":"Imperial College London","ror":"https://ror.org/041kmwe10","country_code":"GB","type":"education","lineage":["https://openalex.org/I47508984"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Andrea Paudice","raw_affiliation_strings":["Imperial College London, London, UK","Imperial College London, London (UK)#TAB#"],"affiliations":[{"raw_affiliation_string":"Imperial College London, London, UK","institution_ids":["https://openalex.org/I47508984"]},{"raw_affiliation_string":"Imperial College London, London (UK)#TAB#","institution_ids":["https://openalex.org/I47508984"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065619732","display_name":"Emil Lupu","orcid":"https://orcid.org/0000-0002-2844-3917"},"institutions":[{"id":"https://openalex.org/I47508984","display_name":"Imperial College London","ror":"https://ror.org/041kmwe10","country_code":"GB","type":"education","lineage":["https://openalex.org/I47508984"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Emil C. Lupu","raw_affiliation_strings":["Imperial College London, London, UK","Imperial College London, London (UK)#TAB#"],"affiliations":[{"raw_affiliation_string":"Imperial College London, London, UK","institution_ids":["https://openalex.org/I47508984"]},{"raw_affiliation_string":"Imperial College London, London (UK)#TAB#","institution_ids":["https://openalex.org/I47508984"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5032718837"],"corresponding_institution_ids":["https://openalex.org/I47508984"],"apc_list":null,"apc_paid":null,"fwci":2.1895,"has_fulltext":true,"cited_by_count":13,"citation_normalized_percentile":{"value":0.88925693,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"20","issue":"3","first_page":"1","last_page":"30"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9912999868392944,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10994","display_name":"Terrorism, Counterterrorism, and Political Violence","score":0.9793000221252441,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.8151547908782959},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6864035129547119},{"id":"https://openalex.org/keywords/bayesian-network","display_name":"Bayesian network","score":0.6048715114593506},{"id":"https://openalex.org/keywords/belief-propagation","display_name":"Belief propagation","score":0.5731694102287292},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.5264497399330139},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5189273357391357},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4704543352127075},{"id":"https://openalex.org/keywords/bayesian-inference","display_name":"Bayesian inference","score":0.4666462242603302},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4556960165500641},{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.43170562386512756},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.42122071981430054},{"id":"https://openalex.org/keywords/dynamic-bayesian-network","display_name":"Dynamic Bayesian network","score":0.41108179092407227},{"id":"https://openalex.org/keywords/bayesian-probability","display_name":"Bayesian probability","score":0.40870121121406555},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3584291636943817},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3252685070037842},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.27029097080230713},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.24168092012405396},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18261703848838806},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.08655020594596863}],"concepts":[{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.8151547908782959},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6864035129547119},{"id":"https://openalex.org/C33724603","wikidata":"https://www.wikidata.org/wiki/Q812540","display_name":"Bayesian network","level":2,"score":0.6048715114593506},{"id":"https://openalex.org/C152948882","wikidata":"https://www.wikidata.org/wiki/Q4060686","display_name":"Belief propagation","level":3,"score":0.5731694102287292},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.5264497399330139},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5189273357391357},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4704543352127075},{"id":"https://openalex.org/C160234255","wikidata":"https://www.wikidata.org/wiki/Q812535","display_name":"Bayesian inference","level":3,"score":0.4666462242603302},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4556960165500641},{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.43170562386512756},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.42122071981430054},{"id":"https://openalex.org/C82142266","wikidata":"https://www.wikidata.org/wiki/Q3456604","display_name":"Dynamic Bayesian network","level":3,"score":0.41108179092407227},{"id":"https://openalex.org/C107673813","wikidata":"https://www.wikidata.org/wiki/Q812534","display_name":"Bayesian probability","level":2,"score":0.40870121121406555},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3584291636943817},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3252685070037842},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.27029097080230713},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.24168092012405396},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18261703848838806},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.08655020594596863},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1145/3105760","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3105760","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=3105760&type=pdf","source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:1606.07025","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1606.07025","pdf_url":"https://arxiv.org/pdf/1606.07025","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},{"id":"mag:2471554257","is_oa":true,"landing_page_url":"https://arxiv.org/pdf/1606.07025.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"pmh:oai:spiral.imperial.ac.uk:10044/1/52049","is_oa":false,"landing_page_url":"http://hdl.handle.net/10044/1/52049","pdf_url":null,"source":{"id":"https://openalex.org/S4306401396","display_name":"Spiral (Imperial College London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I47508984","host_organization_name":"Imperial College London","host_organization_lineage":["https://openalex.org/I47508984"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"},{"id":"doi:10.48550/arxiv.1606.07025","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1606.07025","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.1145/3105760","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3105760","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=3105760&type=pdf","source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6800000071525574}],"awards":[{"id":"https://openalex.org/G1181013235","display_name":null,"funder_award_id":"EP/L022729/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G2175229830","display_name":"CIPART: CLOUD INTELLIGENT PROTECTION AT RUN-TIME","funder_award_id":"EP/L022729/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320314707","display_name":"Government of the United Kingdom","ror":"https://ror.org/05wnh3t63"},{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2471554257.pdf","grobid_xml":"https://content.openalex.org/works/W2471554257.grobid-xml"},"referenced_works_count":65,"referenced_works":["https://openalex.org/W24131227","https://openalex.org/W153010205","https://openalex.org/W1503398984","https://openalex.org/W1508191694","https://openalex.org/W1511986666","https://openalex.org/W1545898854","https://openalex.org/W1560512119","https://openalex.org/W1571953269","https://openalex.org/W1593793857","https://openalex.org/W1663973292","https://openalex.org/W1891202952","https://openalex.org/W1965332127","https://openalex.org/W1980452149","https://openalex.org/W1990414757","https://openalex.org/W2009470162","https://openalex.org/W2011505318","https://openalex.org/W2016701760","https://openalex.org/W2022578767","https://openalex.org/W2025113626","https://openalex.org/W2030014066","https://openalex.org/W2033082111","https://openalex.org/W2044152003","https://openalex.org/W2047408445","https://openalex.org/W2047423253","https://openalex.org/W2053944475","https://openalex.org/W2054127354","https://openalex.org/W2055143850","https://openalex.org/W2065890363","https://openalex.org/W2070813941","https://openalex.org/W2083658929","https://openalex.org/W2089396968","https://openalex.org/W2091673436","https://openalex.org/W2094601022","https://openalex.org/W2101438812","https://openalex.org/W2105594594","https://openalex.org/W2106188980","https://openalex.org/W2110908300","https://openalex.org/W2114884316","https://openalex.org/W2117694832","https://openalex.org/W2121141821","https://openalex.org/W2121805588","https://openalex.org/W2130373165","https://openalex.org/W2131875370","https://openalex.org/W2141289698","https://openalex.org/W2141876475","https://openalex.org/W2147565737","https://openalex.org/W2150127671","https://openalex.org/W2150802402","https://openalex.org/W2156094048","https://openalex.org/W2157554212","https://openalex.org/W2160841769","https://openalex.org/W2163364417","https://openalex.org/W2166646839","https://openalex.org/W2171483145","https://openalex.org/W2175160295","https://openalex.org/W2290944024","https://openalex.org/W2499849620","https://openalex.org/W2540462820","https://openalex.org/W2552939725","https://openalex.org/W2963654300","https://openalex.org/W3020913839","https://openalex.org/W3094284177","https://openalex.org/W4248986893","https://openalex.org/W4254018622","https://openalex.org/W6812742317"],"related_works":["https://openalex.org/W2963622436","https://openalex.org/W1500829410","https://openalex.org/W2898746808","https://openalex.org/W1998659118","https://openalex.org/W2278785635","https://openalex.org/W2212302534","https://openalex.org/W2949438331","https://openalex.org/W3092989169","https://openalex.org/W2952922882","https://openalex.org/W1631483227","https://openalex.org/W3082442515","https://openalex.org/W2913347837","https://openalex.org/W2983189838","https://openalex.org/W2900042804","https://openalex.org/W92757538","https://openalex.org/W2980307224","https://openalex.org/W3098407604","https://openalex.org/W2805757971","https://openalex.org/W3014795866","https://openalex.org/W3021101329"],"abstract_inverted_index":{"Attack":[0],"graphs":[1,39,123,159],"provide":[2],"compact":[3],"representations":[4,26],"of":[5,20,43,46,81,132,162,186,205],"the":[6,18,41,44,49,64,70,130,167,201],"attack":[7,38,122,158,213],"paths":[8],"an":[9],"attacker":[10],"can":[11],"follow":[12],"to":[13,48,121,164,176,211],"compromise":[14,47],"network":[15,21,153],"resources":[16],"from":[17,85],"analysis":[19,68,76],"vulnerabilities":[22,54],"and":[23,55,57,88,124,137,152,172,183,197,203],"topology.":[24],"These":[25],"are":[27],"a":[28,177],"powerful":[29],"tool":[30],"for":[31,59,79,83,134,144,194],"security":[32],"risk":[33,45,71],"assessment.":[34],"Bayesian":[35,100,157],"inference":[36,101,117,192,207],"on":[37,155],"enables":[40],"estimation":[42],"system\u2019s":[50],"components":[51],"given":[52],"their":[53],"interconnections":[56],"accounts":[58,78],"multi-step":[60],"attacks":[61],"spreading":[62],"through":[63],"system.":[65],"While":[66],"static":[67,136,196],"considers":[69],"posture":[72],"at":[73],"rest,":[74],"dynamic":[75,138,198],"also":[77],"evidence":[80],"compromise,":[82],"example,":[84],"Security":[86],"Information":[87],"Event":[89],"Management":[90],"software":[91],"or":[92],"forensic":[93],"investigation.":[94],"However,":[95],"in":[96,129],"this":[97,108],"context,":[98],"exact":[99,191],"techniques":[102,193,208],"do":[103],"not":[104],"scale":[105],"well.":[106],"In":[107],"article,":[109],"we":[110],"show":[111,165],"how":[112],"Loopy":[113,187],"Belief":[114,188],"Propagation\u2014an":[115],"approximate":[116,206],"technique\u2014can":[118],"be":[119],"applied":[120],"that":[125,166,173],"it":[126,174],"scales":[127],"linearly":[128],"number":[131],"nodes":[133,163],"both":[135,195],"analysis,":[139,199],"making":[140],"such":[141],"analyses":[142],"viable":[143],"larger":[145,212],"networks.":[146],"We":[147,180],"experiment":[148],"with":[149,160,190],"different":[150],"topologies":[151],"clustering":[154],"synthetic":[156],"thousands":[161],"algorithm\u2019s":[168],"accuracy":[169],"is":[170],"acceptable":[171],"converges":[175],"stable":[178],"solution.":[179],"compare":[181],"sequential":[182],"parallel":[184],"versions":[185],"Propagation":[189],"showing":[200],"advantages":[202],"gains":[204],"when":[209],"scaling":[210],"graphs.":[214]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
