{"id":"https://openalex.org/W2765659133","doi":"https://doi.org/10.1145/3140549.3140562","title":"Multi-Stage Attack Graph Security Games","display_name":"Multi-Stage Attack Graph Security Games","publication_year":2017,"publication_date":"2017-10-30","ids":{"openalex":"https://openalex.org/W2765659133","doi":"https://doi.org/10.1145/3140549.3140562","mag":"2765659133"},"language":"en","primary_location":{"id":"doi:10.1145/3140549.3140562","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3140549.3140562","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 Workshop on Moving Target Defense","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101614349","display_name":"Thanh H. Nguyen","orcid":"https://orcid.org/0000-0002-8466-1724"},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Thanh H. Nguyen","raw_affiliation_strings":["University of Michigan, Ann Arbor, MI, USA"],"affiliations":[{"raw_affiliation_string":"University of Michigan, Ann Arbor, MI, USA","institution_ids":["https://openalex.org/I27837315"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032253953","display_name":"Mason Wright","orcid":null},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mason Wright","raw_affiliation_strings":["University of Michigan, Ann Arbor, MI, USA"],"affiliations":[{"raw_affiliation_string":"University of Michigan, Ann Arbor, MI, USA","institution_ids":["https://openalex.org/I27837315"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002102744","display_name":"Michael P. Wellman","orcid":"https://orcid.org/0000-0002-1691-6844"},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michael P. Wellman","raw_affiliation_strings":["University of Michigan, Ann Arbor, MI, USA"],"affiliations":[{"raw_affiliation_string":"University of Michigan, Ann Arbor, MI, USA","institution_ids":["https://openalex.org/I27837315"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038440819","display_name":"Satinder Singh Baveja","orcid":null},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Satinder Baveja","raw_affiliation_strings":["University of Michigan, Ann Arbor, MI, USA"],"affiliations":[{"raw_affiliation_string":"University of Michigan, Ann Arbor, MI, USA","institution_ids":["https://openalex.org/I27837315"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101614349"],"corresponding_institution_ids":["https://openalex.org/I27837315"],"apc_list":null,"apc_paid":null,"fwci":5.8035,"has_fulltext":false,"cited_by_count":28,"citation_normalized_percentile":{"value":0.96454173,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"87","last_page":"97"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9886000156402588,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8161242008209229},{"id":"https://openalex.org/keywords/heuristics","display_name":"Heuristics","score":0.7832585573196411},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7117325067520142},{"id":"https://openalex.org/keywords/parameterized-complexity","display_name":"Parameterized complexity","score":0.6754669547080994},{"id":"https://openalex.org/keywords/heuristic","display_name":"Heuristic","score":0.5050614476203918},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4499635398387909},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.43175897002220154},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4208938479423523},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.36213916540145874},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3300885558128357},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2238979935646057},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.10573342442512512}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8161242008209229},{"id":"https://openalex.org/C127705205","wikidata":"https://www.wikidata.org/wiki/Q5748245","display_name":"Heuristics","level":2,"score":0.7832585573196411},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7117325067520142},{"id":"https://openalex.org/C165464430","wikidata":"https://www.wikidata.org/wiki/Q1570441","display_name":"Parameterized complexity","level":2,"score":0.6754669547080994},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.5050614476203918},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4499635398387909},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.43175897002220154},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4208938479423523},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36213916540145874},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3300885558128357},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2238979935646057},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.10573342442512512},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3140549.3140562","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3140549.3140562","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 Workshop on Moving Target Defense","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6000000238418579}],"awards":[],"funders":[{"id":"https://openalex.org/F4320333591","display_name":"Multidisciplinary University Research Initiative","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W4009483","https://openalex.org/W41015297","https://openalex.org/W1515452738","https://openalex.org/W1547446473","https://openalex.org/W1623614060","https://openalex.org/W1678529581","https://openalex.org/W1995716850","https://openalex.org/W2001540531","https://openalex.org/W2030014066","https://openalex.org/W2036358294","https://openalex.org/W2053944475","https://openalex.org/W2083658929","https://openalex.org/W2114765979","https://openalex.org/W2118024052","https://openalex.org/W2120839938","https://openalex.org/W2121141821","https://openalex.org/W2124156864","https://openalex.org/W2131875370","https://openalex.org/W2141867896","https://openalex.org/W2156607688","https://openalex.org/W2163762767","https://openalex.org/W2197836422","https://openalex.org/W2230402893","https://openalex.org/W2257448745","https://openalex.org/W2292274172","https://openalex.org/W2404932809","https://openalex.org/W2494110282","https://openalex.org/W2775907401","https://openalex.org/W2973135414","https://openalex.org/W2999905431","https://openalex.org/W4250353368"],"related_works":["https://openalex.org/W3143937874","https://openalex.org/W4248417824","https://openalex.org/W4300756373","https://openalex.org/W2128417237","https://openalex.org/W4280624053","https://openalex.org/W4285792982","https://openalex.org/W1524438555","https://openalex.org/W2819137623","https://openalex.org/W4239501324","https://openalex.org/W2963319088"],"abstract_inverted_index":{"We":[0,22],"study":[1],"the":[2,56,70,74,84,92,95,128,142,145],"problem":[3],"of":[4,41,73,94,111,123,130,144],"allocating":[5],"limited":[6],"security":[7,35,43,146],"countermeasures":[8],"to":[9,82,126,141],"protect":[10],"network":[11,28],"data":[12],"from":[13],"cyber-attacks,":[14],"for":[15,64],"scenarios":[16],"modeled":[17],"by":[18],"Bayesian":[19],"attack":[20,75],"graphs.":[21],"consider":[23],"multi-stage":[24],"interactions":[25],"between":[26],"a":[27,34,99,121],"administrator":[29],"and":[30,48,50,77,102],"cybercriminals,":[31],"formulated":[32],"as":[33],"game.":[36],"This":[37],"formulation":[38],"is":[39],"capable":[40],"representing":[42],"environments":[44],"with":[45],"significant":[46],"dynamics":[47],"uncertainty,":[49],"very":[51],"large":[52],"strategy":[53],"spaces.":[54],"For":[55],"game":[57,105,124],"model,":[58],"we":[59,97,116],"propose":[60],"parameterized":[61],"heuristic":[62,113],"strategies":[63,137],"both":[65],"players.":[66],"Our":[67],"heuristics":[68,132],"exploit":[69],"topological":[71],"structure":[72],"graphs":[76],"employ":[78,98],"different":[79],"sampling":[80],"methodologies":[81],"overcome":[83],"computational":[85],"complexity":[86,93],"in":[87,133],"determining":[88],"players'":[89],"actions.":[90],"Given":[91],"game,":[96],"simulation-based":[100],"methodology,":[101],"perform":[103],"empirical":[104],"analysis":[106],"over":[107],"an":[108],"enumerated":[109],"set":[110],"these":[112],"strategies.":[114],"Finally,":[115],"conduct":[117],"experiments":[118],"based":[119],"on":[120],"variety":[122],"settings":[125],"demonstrate":[127],"advantages":[129],"our":[131],"obtaining":[134],"effective":[135],"defense":[136],"which":[138],"are":[139],"robust":[140],"uncertainty":[143],"environment.":[147]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
