{"id":"https://openalex.org/W3039211466","doi":"https://doi.org/10.1145/3403746.3403897","title":"Effectiveness Evaluation Method for Cyber Deception Based on Dynamic Bayesian Attack Graph","display_name":"Effectiveness Evaluation Method for Cyber Deception Based on Dynamic Bayesian Attack Graph","publication_year":2020,"publication_date":"2020-05-22","ids":{"openalex":"https://openalex.org/W3039211466","doi":"https://doi.org/10.1145/3403746.3403897","mag":"3039211466"},"language":"en","primary_location":{"id":"doi:10.1145/3403746.3403897","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3403746.3403897","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 3rd International Conference on Computer Science and Software Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032328549","display_name":"Hua Wu","orcid":"https://orcid.org/0000-0002-8829-0182"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hua Wu","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051715896","display_name":"Yu Gu","orcid":"https://orcid.org/0000-0002-0411-0990"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Gu","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043707940","display_name":"Guang Cheng","orcid":"https://orcid.org/0000-0001-8642-4362"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guang Cheng","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077862885","display_name":"Yuyang Zhou","orcid":"https://orcid.org/0000-0001-8626-0468"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuyang Zhou","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5032328549"],"corresponding_institution_ids":["https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":1.0676,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.8347956,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/deception","display_name":"Deception","score":0.8245335817337036},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7212945818901062},{"id":"https://openalex.org/keywords/dynamic-bayesian-network","display_name":"Dynamic Bayesian network","score":0.6555109024047852},{"id":"https://openalex.org/keywords/bayesian-probability","display_name":"Bayesian probability","score":0.5661806464195251},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4561445415019989},{"id":"https://openalex.org/keywords/bayesian-network","display_name":"Bayesian network","score":0.42924410104751587},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39137279987335205},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.2943195700645447},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.28759974241256714},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.18274733424186707},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.10039538145065308}],"concepts":[{"id":"https://openalex.org/C2779267917","wikidata":"https://www.wikidata.org/wiki/Q170028","display_name":"Deception","level":2,"score":0.8245335817337036},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7212945818901062},{"id":"https://openalex.org/C82142266","wikidata":"https://www.wikidata.org/wiki/Q3456604","display_name":"Dynamic Bayesian network","level":3,"score":0.6555109024047852},{"id":"https://openalex.org/C107673813","wikidata":"https://www.wikidata.org/wiki/Q812534","display_name":"Bayesian probability","level":2,"score":0.5661806464195251},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4561445415019989},{"id":"https://openalex.org/C33724603","wikidata":"https://www.wikidata.org/wiki/Q812540","display_name":"Bayesian network","level":2,"score":0.42924410104751587},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39137279987335205},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2943195700645447},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.28759974241256714},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.18274733424186707},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.10039538145065308},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3403746.3403897","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3403746.3403897","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 3rd International Conference on Computer Science and Software Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6100000143051147,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W2057493578","https://openalex.org/W2309749574","https://openalex.org/W2494110282","https://openalex.org/W2766667285","https://openalex.org/W2802409154","https://openalex.org/W4391419058","https://openalex.org/W7052953813","https://openalex.org/W7056617719"],"related_works":["https://openalex.org/W3128072696","https://openalex.org/W2578973671","https://openalex.org/W2215058820","https://openalex.org/W2945000716","https://openalex.org/W2097663773","https://openalex.org/W1602184117","https://openalex.org/W2413421635","https://openalex.org/W2511198839","https://openalex.org/W1966557338","https://openalex.org/W2366931106"],"abstract_inverted_index":{"The":[0],"theoretical":[1],"study":[2],"of":[3,12,41,62,74,85,164],"cyber":[4,42,131],"deception":[5,43,157],"technology":[6],"often":[7],"focuses":[8],"on":[9,52,71,92],"the":[10,22,31,39,60,64,72,83,89,102,114,121,130,142,151,155,161],"analysis":[11],"specific":[13],"defense":[14],"technologies,":[15],"and":[16,45,77,97,100,123],"most":[17],"researches":[18],"are":[19,126],"limited":[20],"to":[21,37,128,153,160],"single-level":[23],"qualitative":[24],"measurement,":[25],"which":[26,147],"cannot":[27],"be":[28],"utilized":[29],"in":[30,88,111],"complex":[32],"environment.":[33],"In":[34],"this":[35],"paper,":[36],"quantify":[38],"effectiveness":[40,124],"comprehensively":[44],"reasonably,":[46],"a":[47,53],"method":[48,138],"is":[49,68,139,148],"proposed":[50],"based":[51,70,91],"dynamic":[54],"Bayesian":[55,65,103],"attack":[56,66,104],"graph.":[57],"By":[58],"analyzing":[59],"capability":[61],"attackers,":[63],"graph":[67,105],"established":[69],"dependence":[73],"network":[75,93,107,145],"resources":[76],"vulnerability":[78,116],"factors.":[79],"Then":[80],"we":[81],"verify":[82],"consistency":[84],"host":[86],"nodes":[87],"project":[90],"features,":[94],"device":[95],"fingerprints,":[96],"file":[98],"attributes,":[99],"update":[101],"with":[106,113],"attack-defense":[108,143,165],"events.":[109,166],"Finally,":[110],"combination":[112],"common":[115],"scoring":[117],"system":[118],"(CVSS)":[119],"metrics,":[120],"concealment":[122],"indexes":[125],"given":[127],"evaluate":[129],"deception's":[132],"performance.":[133],"Experiments":[134],"show":[135],"that":[136],"our":[137],"feasible":[140],"for":[141,150],"adversarial":[144],"environment,":[146],"beneficial":[149],"defender":[152],"formulate":[154],"optimal":[156],"strategy":[158],"according":[159],"current":[162],"situation":[163]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
