{"id":"https://openalex.org/W3000221761","doi":"https://doi.org/10.1145/3371676.3371679","title":"A Comprehensive Assessment Method of Asset Importance for Key Asset Protection","display_name":"A Comprehensive Assessment Method of Asset Importance for Key Asset Protection","publication_year":2019,"publication_date":"2019-11-15","ids":{"openalex":"https://openalex.org/W3000221761","doi":"https://doi.org/10.1145/3371676.3371679","mag":"3000221761"},"language":"en","primary_location":{"id":"doi:10.1145/3371676.3371679","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3371676.3371679","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 9th International Conference on Communication and Network Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047113122","display_name":"Xiaoling Gao","orcid":"https://orcid.org/0000-0002-5466-3200"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaoling Gao","raw_affiliation_strings":["College of Mathematics and Computer Science, Fuzhou University Fuzhou, Fujian, China, Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing, Fuzhou, Fujian, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Computer Science, Fuzhou University Fuzhou, Fujian, China, Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing, Fuzhou, Fujian, China","institution_ids":["https://openalex.org/I80947539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100317723","display_name":"Yanhua Liu","orcid":"https://orcid.org/0000-0002-6076-9968"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanhua Liu","raw_affiliation_strings":["College of Mathematics and Computer Science, Fuzhou University Fuzhou, Fujian, China, Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing, Fuzhou, Fujian, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Computer Science, Fuzhou University Fuzhou, Fujian, China, Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing, Fuzhou, Fujian, China","institution_ids":["https://openalex.org/I80947539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050560016","display_name":"Yanbin Qiu","orcid":null},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanbin Qiu","raw_affiliation_strings":["College of Mathematics and Computer Science, Fuzhou University Fuzhou, Fujian, China, Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing, Fuzhou, Fujian, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Computer Science, Fuzhou University Fuzhou, Fujian, China, Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing, Fuzhou, Fujian, China","institution_ids":["https://openalex.org/I80947539"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072230105","display_name":"Huajun Liu","orcid":"https://orcid.org/0000-0003-1147-6840"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huajun Liu","raw_affiliation_strings":["College of Mathematics and Computer Science, Fuzhou University Fuzhou, Fujian, China, Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing, Fuzhou, Fujian, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Computer Science, Fuzhou University Fuzhou, Fujian, China, Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing, Fuzhou, Fujian, China","institution_ids":["https://openalex.org/I80947539"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5047113122"],"corresponding_institution_ids":["https://openalex.org/I80947539"],"apc_list":null,"apc_paid":null,"fwci":0.1448,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.48738669,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"79","last_page":"83"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9897000193595886,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/centrality","display_name":"Centrality","score":0.8777859210968018},{"id":"https://openalex.org/keywords/pagerank","display_name":"PageRank","score":0.652328372001648},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6050089597702026},{"id":"https://openalex.org/keywords/asset","display_name":"Asset (computer security)","score":0.6047379374504089},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.5501634478569031},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.5267184376716614},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5000312328338623},{"id":"https://openalex.org/keywords/betweenness-centrality","display_name":"Betweenness centrality","score":0.4531358778476715},{"id":"https://openalex.org/keywords/core","display_name":"Core (optical fiber)","score":0.42959949374198914},{"id":"https://openalex.org/keywords/closeness","display_name":"Closeness","score":0.4184722602367401},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.37227898836135864},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.2971862256526947},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2792392373085022},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.191080242395401},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12692350149154663},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.112659752368927},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.08851051330566406}],"concepts":[{"id":"https://openalex.org/C53811970","wikidata":"https://www.wikidata.org/wiki/Q5062194","display_name":"Centrality","level":2,"score":0.8777859210968018},{"id":"https://openalex.org/C2779172887","wikidata":"https://www.wikidata.org/wiki/Q184316","display_name":"PageRank","level":2,"score":0.652328372001648},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6050089597702026},{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.6047379374504089},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.5501634478569031},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.5267184376716614},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5000312328338623},{"id":"https://openalex.org/C117045392","wikidata":"https://www.wikidata.org/wiki/Q4899215","display_name":"Betweenness centrality","level":3,"score":0.4531358778476715},{"id":"https://openalex.org/C2164484","wikidata":"https://www.wikidata.org/wiki/Q5170150","display_name":"Core (optical fiber)","level":2,"score":0.42959949374198914},{"id":"https://openalex.org/C2779545769","wikidata":"https://www.wikidata.org/wiki/Q5135364","display_name":"Closeness","level":2,"score":0.4184722602367401},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.37227898836135864},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.2971862256526947},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2792392373085022},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.191080242395401},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12692350149154663},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.112659752368927},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08851051330566406},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3371676.3371679","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3371676.3371679","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 9th International Conference on Communication and Network Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1635909395","https://openalex.org/W1854214752","https://openalex.org/W1888358353","https://openalex.org/W1995853580","https://openalex.org/W2124637492","https://openalex.org/W2148606196","https://openalex.org/W2148606255","https://openalex.org/W2436509158","https://openalex.org/W2803347616","https://openalex.org/W4254007350","https://openalex.org/W6682100860"],"related_works":["https://openalex.org/W1973509935","https://openalex.org/W4389076551","https://openalex.org/W2097992793","https://openalex.org/W2107855069","https://openalex.org/W2611574733","https://openalex.org/W2241641394","https://openalex.org/W2140653560","https://openalex.org/W2348831795","https://openalex.org/W2514739320","https://openalex.org/W4312461432"],"abstract_inverted_index":{"In":[0,32],"a":[1,37],"given":[2],"system":[3],"network,":[4],"an":[5],"important":[6],"prerequisite":[7],"for":[8,43,84],"security":[9],"risk":[10],"control":[11],"is":[12],"how":[13],"to":[14,76,97],"accurately":[15],"calculate":[16],"the":[17,24,27,48,55,70,78,90,99,103,106,110,115,124,133,136,141,144],"impact":[18],"of":[19,29,50,80,102,114,117,123,126,135,143],"different":[20],"host":[21,104],"assets":[22,53,83,128],"in":[23,54,105],"topology":[25,56,108],"on":[26],"spread":[28],"attack":[30],"risk.":[31],"this":[33],"regard,":[34],"we":[35],"propose":[36],"comprehensive":[38,120],"asset":[39,45,85],"importance":[40,49,79,116,125],"assessment":[41],"model":[42,137],"critical":[44],"protection.":[46],"First,":[47],"local":[51,81],"static":[52],"was":[57,74,129,138],"evaluated":[58],"using":[59,95],"three":[60],"methods:":[61],"degree":[62],"centrality,":[63,65],"mediation":[64],"and":[66,94,132],"closeness":[67],"centrality.":[68],"At":[69],"same":[71],"time,":[72],"PageRank":[73],"used":[75],"assess":[77],"dynamic":[82],"level":[86],"changes.":[87],"By":[88],"combining":[89],"above":[91],"two":[92],"methods,":[93],"K-CORE":[96],"evaluate":[98],"core":[100],"position":[101],"network":[107],"as":[109],"global":[111],"weight":[112],"indicator":[113],"assets.":[118],"The":[119],"evaluation":[121],"results":[122],"topology-oriented":[127],"finally":[130],"obtained,":[131],"validity":[134],"verified":[139],"through":[140],"experiment":[142],"simulation":[145],"ER":[146],"random":[147],"network.":[148]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
