{"id":"https://openalex.org/W4224001628","doi":"https://doi.org/10.1145/3522749.3523071","title":"Vulnerability Analysis of Complex Network Important Nodes Based on Multi-attribute","display_name":"Vulnerability Analysis of Complex Network Important Nodes Based on Multi-attribute","publication_year":2022,"publication_date":"2022-03-11","ids":{"openalex":"https://openalex.org/W4224001628","doi":"https://doi.org/10.1145/3522749.3523071"},"language":"en","primary_location":{"id":"doi:10.1145/3522749.3523071","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3522749.3523071","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 6th International Conference on Control Engineering and Artificial Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101483421","display_name":"Jintao Yu","orcid":"https://orcid.org/0000-0002-5572-0879"},"institutions":[{"id":"https://openalex.org/I4210104252","display_name":"Air Force Engineering University","ror":"https://ror.org/00seraz22","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210104252"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jintao Yu","raw_affiliation_strings":["Air Force Early Warning Academy, China"],"affiliations":[{"raw_affiliation_string":"Air Force Early Warning Academy, China","institution_ids":["https://openalex.org/I4210104252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103121566","display_name":"Bing Xiao","orcid":null},"institutions":[{"id":"https://openalex.org/I4210104252","display_name":"Air Force Engineering University","ror":"https://ror.org/00seraz22","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210104252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bing Xiao","raw_affiliation_strings":["Air Force Early Warning Academy, China"],"affiliations":[{"raw_affiliation_string":"Air Force Early Warning Academy, China","institution_ids":["https://openalex.org/I4210104252"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028635734","display_name":"Hao Li","orcid":"https://orcid.org/0000-0001-8776-6911"},"institutions":[{"id":"https://openalex.org/I4210104252","display_name":"Air Force Engineering University","ror":"https://ror.org/00seraz22","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210104252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hao Li","raw_affiliation_strings":["Air Force Early Warning Academy, China"],"affiliations":[{"raw_affiliation_string":"Air Force Early Warning Academy, China","institution_ids":["https://openalex.org/I4210104252"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101483421"],"corresponding_institution_ids":["https://openalex.org/I4210104252"],"apc_list":null,"apc_paid":null,"fwci":0.1382,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.43882648,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"60","issue":null,"first_page":"103","last_page":"106"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9857000112533569,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.954200029373169,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.737223744392395},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6005970239639282},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.5077734589576721},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4093981087207794},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34773439168930054},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3377387523651123}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.737223744392395},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6005970239639282},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.5077734589576721},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4093981087207794},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34773439168930054},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3377387523651123},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3522749.3523071","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3522749.3523071","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 6th International Conference on Control Engineering and Artificial Intelligence","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1922704722","https://openalex.org/W1995074519","https://openalex.org/W2113146118","https://openalex.org/W2345298936","https://openalex.org/W2383439028","https://openalex.org/W2389678206","https://openalex.org/W2566183352","https://openalex.org/W2568208952","https://openalex.org/W2981535300","https://openalex.org/W3004635484","https://openalex.org/W3006349298","https://openalex.org/W3040488344","https://openalex.org/W3103657871","https://openalex.org/W3110852183"],"related_works":["https://openalex.org/W1974343333","https://openalex.org/W141916771","https://openalex.org/W2376398693","https://openalex.org/W2020865170","https://openalex.org/W2024164043","https://openalex.org/W2147405072","https://openalex.org/W3137235688","https://openalex.org/W53551321","https://openalex.org/W3005960146","https://openalex.org/W2086336616"],"abstract_inverted_index":{"research-article":[0],"Vulnerability":[1],"Analysis":[2],"of":[3,66],"Complex":[4],"Network":[5],"Important":[6],"Nodes":[7],"Based":[8],"on":[9,71,123],"Multi-attribute":[10],"Authors:":[11],"Jintao":[12],"Yu":[13],"Air":[14,20,30,36,46,52],"Force":[15,21,31,37,47,53],"Early":[16,22,32,38,48,54],"Warning":[17,23,33,39,49,55],"Academy,":[18,24,34,40,50,56],"China":[19,35,51],"ChinaView":[25,41,57],"Profile":[26,42,58],",":[27,43],"Bing":[28],"Xiao":[29],"Hao":[44],"Li":[45],"Authors":[59],"Info":[60],"&":[61],"Claims":[62],"CCEAI":[63],"'22:":[64],"Proceedings":[65],"the":[67,124],"6th":[68],"International":[69],"Conference":[70],"Control":[72],"Engineering":[73],"and":[74,100],"Artificial":[75],"IntelligenceMarch":[76],"2022Pages":[77],"103\u2013106https://doi.org/10.1145/3522749.3523071Published:13":[78],"April":[79],"2022Publication":[80],"History":[81],"0citation27DownloadsMetricsTotal":[82],"Citations0Total":[83],"Downloads27Last":[84],"12":[85],"Months22Last":[86],"6":[87],"weeks0":[88],"Get":[89],"Citation":[90,92,129],"AlertsNew":[91,128],"Alert":[93],"added!This":[94],"alert":[95,120],"has":[96,115],"been":[97,116],"successfully":[98],"added":[99],"will":[101,105],"be":[102,106],"sent":[103],"to:You":[104],"notified":[107],"whenever":[108],"a":[109,141],"record":[110],"that":[111],"you":[112],"have":[113],"chosen":[114],"cited.To":[117],"manage":[118],"your":[119,134],"preferences,":[121],"click":[122],"button":[125],"below.Manage":[126],"my":[127],"Alert!Please":[130],"log":[131],"in":[132],"to":[133,137,139],"account":[135],"Save":[136],"BinderSave":[138],"BinderCreate":[140],"New":[142],"BinderNameCancelCreateExport":[143],"CitationPublisher":[144],"SiteGet":[145],"Access":[146]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
