{"id":"https://openalex.org/W3091155493","doi":"https://doi.org/10.3233/faia200070","title":"Strategic Monitor Placement Against Malicious Flows","display_name":"Strategic Monitor Placement Against Malicious Flows","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3091155493","doi":"https://doi.org/10.3233/faia200070","mag":"3091155493"},"language":"en","primary_location":{"id":"doi:10.3233/faia200070","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia200070","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.3233/faia200070","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075507126","display_name":"Vincenzo Auletta","orcid":"https://orcid.org/0000-0002-7875-3366"},"institutions":[{"id":"https://openalex.org/I131729948","display_name":"University of Salerno","ror":"https://ror.org/0192m2k53","country_code":"IT","type":"education","lineage":["https://openalex.org/I131729948"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Auletta Vincenzo","raw_affiliation_strings":["University of Salerno, Fisciano, Italy"],"affiliations":[{"raw_affiliation_string":"University of Salerno, Fisciano, Italy","institution_ids":["https://openalex.org/I131729948"]}]},{"author_position":"middle","author":{"id":null,"display_name":"De Nittis Giuseppe","orcid":null},"institutions":[{"id":"https://openalex.org/I93860229","display_name":"Politecnico di Milano","ror":"https://ror.org/01nffqt88","country_code":"IT","type":"education","lineage":["https://openalex.org/I93860229"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"De Nittis Giuseppe","raw_affiliation_strings":["Politecnico di Milano, Milan, Italy"],"affiliations":[{"raw_affiliation_string":"Politecnico di Milano, Milan, Italy","institution_ids":["https://openalex.org/I93860229"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044085723","display_name":"Diodato Ferraioli","orcid":"https://orcid.org/0000-0002-7962-5200"},"institutions":[{"id":"https://openalex.org/I131729948","display_name":"University of Salerno","ror":"https://ror.org/0192m2k53","country_code":"IT","type":"education","lineage":["https://openalex.org/I131729948"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Ferraioli Diodato","raw_affiliation_strings":["University of Salerno, Fisciano, Italy"],"affiliations":[{"raw_affiliation_string":"University of Salerno, Fisciano, Italy","institution_ids":["https://openalex.org/I131729948"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Gatti Nicola","orcid":null},"institutions":[{"id":"https://openalex.org/I93860229","display_name":"Politecnico di Milano","ror":"https://ror.org/01nffqt88","country_code":"IT","type":"education","lineage":["https://openalex.org/I93860229"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Gatti Nicola","raw_affiliation_strings":["Politecnico di Milano, Milan, Italy"],"affiliations":[{"raw_affiliation_string":"Politecnico di Milano, Milan, Italy","institution_ids":["https://openalex.org/I93860229"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012494383","display_name":"Domenico Longo","orcid":"https://orcid.org/0000-0001-9858-3061"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Longo Domenico","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5075507126"],"corresponding_institution_ids":["https://openalex.org/I131729948"],"apc_list":null,"apc_paid":null,"fwci":1.1463,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.79253927,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4423864185810089},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4422370195388794},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.43851256370544434}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4423864185810089},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4422370195388794},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.43851256370544434}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3233/faia200070","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia200070","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},{"id":"pmh:oai:re.public.polimi.it:11311/1167020","is_oa":true,"landing_page_url":"http://hdl.handle.net/11311/1167020","pdf_url":null,"source":{"id":"https://openalex.org/S4306400312","display_name":"Virtual Community of Pathological Anatomy (University of Castilla La Mancha)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79189158","host_organization_name":"University of Castilla-La Mancha","host_organization_lineage":["https://openalex.org/I79189158"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":{"id":"doi:10.3233/faia200070","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia200070","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"sustainable_development_goals":[{"score":0.46000000834465027,"id":"https://metadata.un.org/sdg/5","display_name":"Gender equality"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W34952362","https://openalex.org/W1542177083","https://openalex.org/W1854214752","https://openalex.org/W1964510837","https://openalex.org/W1995497007","https://openalex.org/W2012391569","https://openalex.org/W2020816761","https://openalex.org/W2025392770","https://openalex.org/W2103446323","https://openalex.org/W2166294754","https://openalex.org/W2202067636","https://openalex.org/W2324763723","https://openalex.org/W2525047520","https://openalex.org/W2562505269","https://openalex.org/W2739823785","https://openalex.org/W3118655244"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Security":[0],"Games":[1],"have":[2],"been":[3],"widely":[4],"adopted":[5],"to":[6,16,19,23,79,99,131],"model":[7,132],"scenarios":[8,52],"in":[9,53,66,106],"which":[10,54,146],"one":[11],"player,":[12,37],"the":[13,25,38,46,55,61,68,74,81,84,97,101,139,148,171,175],"Defender,":[14],"has":[15,57],"decide":[17],"how":[18],"deploy":[20],"her":[21],"resources":[22],"minimize":[24],"loss":[26],"that":[27,108],"can":[28,109,186],"be":[29,110],"caused":[30],"by":[31,35],"an":[32,159,164],"attack":[33],"performed":[34],"another":[36],"Attacker,":[39],"aiming":[40],"at":[41],"maximizing":[42],"such":[43,158],"loss.":[44],"In":[45,120],"present":[47],"paper,":[48],"we":[49,123,161,178],"focus":[50],"on":[51,60,190],"Defender":[56],"lexicographic-like":[58],"preferences":[59],"targets,":[62],"being":[63],"primarily":[64],"interested":[65],"defending":[67],"integrity":[69],"of":[70,73,83,103,128,141,169,174,192],"a":[71,125,143],"subset":[72],"targets":[75],"and,":[76],"only":[77],"secondarily,":[78],"reduce":[80,100],"amount":[82],"other":[85],"damaged":[86],"targets.":[87],"Our":[88],"central":[89],"motivation":[90],"for":[91,153],"studying":[92],"this":[93,121,154,184],"problem":[94],"comes":[95],"from":[96],"need":[98],"impact":[102],"malicious":[104],"flows":[105],"networks,":[107],"either":[111],"physical,":[112],"like":[113],"cities,":[114],"or":[115],"virtual,":[116],"e.g.,":[117],"social":[118],"networks.":[119],"work,":[122],"introduce":[124],"new":[126],"class":[127],"security":[129],"games":[130],"these":[133],"scenarios,":[134],"characterizing":[135],"it":[136],"and":[137],"proving":[138],"NP-hardness":[140],"computing":[142],"leader-follower":[144],"equilibrium,":[145,160],"is":[147],"most":[149],"appropriate":[150],"solution":[151],"concept":[152],"setting.":[155],"To":[156],"compute":[157],"then":[162],"provide":[163],"exact":[165],"exponential-time":[166],"algorithm,":[167],"capable":[168],"exploiting":[170],"topological":[172],"properties":[173],"network.":[176],"Finally,":[177],"show":[179],"that,":[180],"with":[181],"opportune":[182],"optimizations,":[183],"algorithm":[185],"work":[187],"efficiently":[188],"even":[189],"network":[191],"10000":[193],"nodes.":[194]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2020-10-08T00:00:00"}
