{"id":"https://openalex.org/W4410623898","doi":"https://doi.org/10.1145/3736760","title":"CBDRA-IS: Centrality-Based Defense Resource Allocation for Securing Interdependent Systems","display_name":"CBDRA-IS: Centrality-Based Defense Resource Allocation for Securing Interdependent Systems","publication_year":2025,"publication_date":"2025-05-23","ids":{"openalex":"https://openalex.org/W4410623898","doi":"https://doi.org/10.1145/3736760"},"language":"en","primary_location":{"id":"doi:10.1145/3736760","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3736760","pdf_url":null,"source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1145/3736760","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5097167000","display_name":"Mohammad Ryiad Al-Eiadeh","orcid":null},"institutions":[{"id":"https://openalex.org/I135191193","display_name":"University of Indianapolis","ror":"https://ror.org/052133d12","country_code":"US","type":"education","lineage":["https://openalex.org/I135191193"]},{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]},{"id":"https://openalex.org/I55769427","display_name":"Indiana University \u2013 Purdue University Indianapolis","ror":"https://ror.org/05gxnyn08","country_code":"US","type":"education","lineage":["https://openalex.org/I55769427","https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mohammad Aleiadeh","raw_affiliation_strings":["Electrical and Computer Engineering, Purdue University","Electrical and Computer Engineering, Purdue University, Indianapolis, United States"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, Purdue University","institution_ids":["https://openalex.org/I219193219"]},{"raw_affiliation_string":"Electrical and Computer Engineering, Purdue University, Indianapolis, United States","institution_ids":["https://openalex.org/I135191193","https://openalex.org/I55769427"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007992878","display_name":"Mustafa Abdallah","orcid":"https://orcid.org/0000-0002-9554-9260"},"institutions":[{"id":"https://openalex.org/I135191193","display_name":"University of Indianapolis","ror":"https://ror.org/052133d12","country_code":"US","type":"education","lineage":["https://openalex.org/I135191193"]},{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]},{"id":"https://openalex.org/I55769427","display_name":"Indiana University \u2013 Purdue University Indianapolis","ror":"https://ror.org/05gxnyn08","country_code":"US","type":"education","lineage":["https://openalex.org/I55769427","https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mustafa Abdallah","raw_affiliation_strings":["Computer and Information Technology, Purdue University","Computer and Information Technology, Purdue University, Indianapolis, United States"],"affiliations":[{"raw_affiliation_string":"Computer and Information Technology, Purdue University","institution_ids":["https://openalex.org/I219193219"]},{"raw_affiliation_string":"Computer and Information Technology, Purdue University, Indianapolis, United States","institution_ids":["https://openalex.org/I135191193","https://openalex.org/I55769427"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5097167000"],"corresponding_institution_ids":["https://openalex.org/I135191193","https://openalex.org/I219193219","https://openalex.org/I55769427"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.15441918,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"28","issue":"3","first_page":"1","last_page":"44"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/centrality","display_name":"Centrality","score":0.8408092856407166},{"id":"https://openalex.org/keywords/interdependence","display_name":"Interdependence","score":0.8290607929229736},{"id":"https://openalex.org/keywords/resource-allocation","display_name":"Resource allocation","score":0.5300397872924805},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.47290194034576416},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.47269558906555176},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.46434006094932556},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.331382155418396},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.15979081392288208},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.10369151830673218},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.0722283124923706},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.04486832022666931}],"concepts":[{"id":"https://openalex.org/C53811970","wikidata":"https://www.wikidata.org/wiki/Q5062194","display_name":"Centrality","level":2,"score":0.8408092856407166},{"id":"https://openalex.org/C185874996","wikidata":"https://www.wikidata.org/wiki/Q269699","display_name":"Interdependence","level":2,"score":0.8290607929229736},{"id":"https://openalex.org/C29202148","wikidata":"https://www.wikidata.org/wiki/Q287260","display_name":"Resource allocation","level":2,"score":0.5300397872924805},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.47290194034576416},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.47269558906555176},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.46434006094932556},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.331382155418396},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.15979081392288208},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.10369151830673218},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0722283124923706},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.04486832022666931},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3736760","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3736760","pdf_url":null,"source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1145/3736760","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3736760","pdf_url":null,"source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.6600000262260437,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G3002511237","display_name":null,"funder_award_id":"AnalytixIN","funder_id":"https://openalex.org/F4320309409","funder_display_name":"Lilly Endowment"}],"funders":[{"id":"https://openalex.org/F4320309409","display_name":"Lilly Endowment","ror":"https://ror.org/00cpsd622"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":68,"referenced_works":["https://openalex.org/W33891176","https://openalex.org/W272161498","https://openalex.org/W1690805376","https://openalex.org/W1810489654","https://openalex.org/W2007978799","https://openalex.org/W2017809722","https://openalex.org/W2031407623","https://openalex.org/W2036109172","https://openalex.org/W2077937403","https://openalex.org/W2089659963","https://openalex.org/W2098630923","https://openalex.org/W2117042957","https://openalex.org/W2117473144","https://openalex.org/W2121805588","https://openalex.org/W2157635833","https://openalex.org/W2160534125","https://openalex.org/W2165049137","https://openalex.org/W2169592938","https://openalex.org/W2214393795","https://openalex.org/W2240450792","https://openalex.org/W2250171293","https://openalex.org/W2290944024","https://openalex.org/W2291792089","https://openalex.org/W2358879366","https://openalex.org/W2548135047","https://openalex.org/W2573216695","https://openalex.org/W2599777545","https://openalex.org/W2613343943","https://openalex.org/W2617631619","https://openalex.org/W2618370510","https://openalex.org/W2766954398","https://openalex.org/W2914625454","https://openalex.org/W2916723483","https://openalex.org/W2943011553","https://openalex.org/W2952675638","https://openalex.org/W2998767552","https://openalex.org/W3011364585","https://openalex.org/W3016437435","https://openalex.org/W3032206867","https://openalex.org/W3033821423","https://openalex.org/W3100092374","https://openalex.org/W3157891444","https://openalex.org/W3172698735","https://openalex.org/W3173514555","https://openalex.org/W3202087751","https://openalex.org/W3205287637","https://openalex.org/W3210911509","https://openalex.org/W4206749896","https://openalex.org/W4210535201","https://openalex.org/W4226119873","https://openalex.org/W4246774680","https://openalex.org/W4250503569","https://openalex.org/W4250863246","https://openalex.org/W4253024571","https://openalex.org/W4253867444","https://openalex.org/W4285886199","https://openalex.org/W4286587339","https://openalex.org/W4288057727","https://openalex.org/W4293317155","https://openalex.org/W4298625430","https://openalex.org/W4327522784","https://openalex.org/W4367666264","https://openalex.org/W4387740163","https://openalex.org/W4394966886","https://openalex.org/W4399268729","https://openalex.org/W4399634295","https://openalex.org/W4401067570","https://openalex.org/W4409985424"],"related_works":["https://openalex.org/W4229078645","https://openalex.org/W1977345676","https://openalex.org/W4282032776","https://openalex.org/W2047552823","https://openalex.org/W4321606905","https://openalex.org/W3130445735","https://openalex.org/W2105110616","https://openalex.org/W2747930654","https://openalex.org/W2739658809","https://openalex.org/W2419362237"],"abstract_inverted_index":{"Interdependent":[0],"systems,":[1,114],"with":[2,88,138],"multiple":[3],"interconnected":[4],"assets,":[5],"face":[6],"escalating":[7],"cybersecurity":[8],"threats":[9],"from":[10,71],"external":[11],"attackers.":[12],"This":[13],"article":[14],"explores":[15],"security":[16,26,116,173],"decision-making,":[17,124],"operating":[18],"on":[19,101],"complex":[20],"interdependent":[21,102],"systems":[22],"and":[23,41,54,58,128,167,180],"proposes":[24],"a":[25],"resource":[27,75,193],"allocation":[28,76,91,121,194],"methodology":[29,195],"to":[30,68,98,196],"enhance":[31],"their":[32],"proactive":[33],"security.":[34],"Using":[35],"attack":[36,110,182],"graphs,":[37],"we":[38],"model":[39],"vulnerabilities":[40],"propose":[42],"different":[43,47,80,176,185],"defense":[44],"mechanisms":[45],"integrating":[46],"network":[48],"analysis":[49],"algorithms,":[50],"including":[51,178],"degree,":[52],"betweenness,":[53],"harmonic":[55],"centralities,":[56],"TrustRank,":[57],"Katz":[59],"centrality.":[60],"We":[61,104,147,159,187],"introduce":[62],"Average":[63],"Based":[64],"Node":[65],"Ranking":[66],"(ABNR)":[67],"average":[69],"ranks":[70],"these":[72,89],"methods.":[73,82],"The":[74],"methods":[77,94],"leverage":[78],"four":[79,90,119],"graph-theoretic":[81],"Each":[83],"ranking":[84],"algorithm":[85],"is":[86],"combined":[87],"techniques.":[92],"Our":[93,130,170],"show":[95,148],"low":[96],"sensitivity":[97],"simultaneous":[99],"attacks":[100,166],"systems.":[103],"validate":[105],"our":[106,154,162,192],"framework":[107,131,155,163,171],"using":[108],"11":[109],"graphs":[111],"representing":[112],"real-world":[113],"measuring":[115],"improvements":[117],"against":[118,164],"well-known":[120],"algorithms:":[122],"behavioral":[123],"defense-in-depth,":[125],"risk-based":[126],"defense,":[127],"min-cut.":[129],"outperformed":[132],"the":[133,143,150,189,197],"baselines":[134],"in":[135,153],"most":[136],"cases,":[137],"superior":[139],"outcomes":[140],"confirmed":[141],"by":[142],"Friedman":[144],"statistical":[145],"test.":[146],"that":[149],"main":[151],"components":[152],"have":[156],"low-time":[157],"overhead.":[158],"also":[160],"evaluate":[161],"multi-stage":[165],"cascading":[168],"failures":[169],"enhances":[172],"decision-making":[174],"across":[175],"scenarios,":[177],"top-1":[179],"all":[181],"paths":[183],"for":[184],"attacks.":[186],"release":[188],"implementation":[190],"of":[191],"research":[198],"community":[199]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
