{"id":"https://openalex.org/W4296046298","doi":"https://doi.org/10.3233/faia220251","title":"Maximizing Information Flow Path Coverage in Cyber-Physical Systems Using Metaheuristic Optimization","display_name":"Maximizing Information Flow Path Coverage in Cyber-Physical Systems Using Metaheuristic Optimization","publication_year":2022,"publication_date":"2022-09-14","ids":{"openalex":"https://openalex.org/W4296046298","doi":"https://doi.org/10.3233/faia220251"},"language":"en","primary_location":{"id":"doi:10.3233/faia220251","is_oa":false,"landing_page_url":"https://doi.org/10.3233/faia220251","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012080649","display_name":"Stefan Gries","orcid":null},"institutions":[{"id":"https://openalex.org/I62318514","display_name":"University of Duisburg-Essen","ror":"https://ror.org/04mz5ra38","country_code":"DE","type":"education","lineage":["https://openalex.org/I62318514"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Stefan Gries","raw_affiliation_strings":["University of Duisburg-Essen, Schuetzenbahn 70, 45127 Essen, Germany"],"affiliations":[{"raw_affiliation_string":"University of Duisburg-Essen, Schuetzenbahn 70, 45127 Essen, Germany","institution_ids":["https://openalex.org/I62318514"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091780221","display_name":"Volker Gruhn","orcid":null},"institutions":[{"id":"https://openalex.org/I62318514","display_name":"University of Duisburg-Essen","ror":"https://ror.org/04mz5ra38","country_code":"DE","type":"education","lineage":["https://openalex.org/I62318514"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Volker Gruhn","raw_affiliation_strings":["University of Duisburg-Essen, Schuetzenbahn 70, 45127 Essen, Germany"],"affiliations":[{"raw_affiliation_string":"University of Duisburg-Essen, Schuetzenbahn 70, 45127 Essen, Germany","institution_ids":["https://openalex.org/I62318514"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5012080649"],"corresponding_institution_ids":["https://openalex.org/I62318514"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.288955,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7514161467552185},{"id":"https://openalex.org/keywords/metaheuristic","display_name":"Metaheuristic","score":0.6823447346687317},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.6694703102111816},{"id":"https://openalex.org/keywords/trace","display_name":"TRACE (psycholinguistics)","score":0.6253607869148254},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.6126371622085571},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.49797844886779785},{"id":"https://openalex.org/keywords/information-flow","display_name":"Information flow","score":0.4957329034805298},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4748302400112152},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3685608506202698},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3314852714538574},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.18539994955062866},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12516745924949646}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7514161467552185},{"id":"https://openalex.org/C109718341","wikidata":"https://www.wikidata.org/wiki/Q1385229","display_name":"Metaheuristic","level":2,"score":0.6823447346687317},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.6694703102111816},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.6253607869148254},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.6126371622085571},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.49797844886779785},{"id":"https://openalex.org/C2779136372","wikidata":"https://www.wikidata.org/wiki/Q10283002","display_name":"Information flow","level":2,"score":0.4957329034805298},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4748302400112152},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3685608506202698},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3314852714538574},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.18539994955062866},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12516745924949646},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/faia220251","is_oa":false,"landing_page_url":"https://doi.org/10.3233/faia220251","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2789681586","https://openalex.org/W2794361564","https://openalex.org/W4243392960","https://openalex.org/W3156820950","https://openalex.org/W3004173571","https://openalex.org/W4232791346","https://openalex.org/W2971069100","https://openalex.org/W1588330912","https://openalex.org/W2504553392","https://openalex.org/W4318604471"],"abstract_inverted_index":{"Cyber-Physical":[0],"Systems":[1],"change":[2],"at":[3],"runtime,":[4],"so":[5],"errors":[6],"are":[7],"very":[8],"difficult":[9],"to":[10,48,62,88],"trace.":[11],"The":[12,40],"Information":[13],"Flow":[14],"Monitor":[15],"is":[16,45],"a":[17,77,83],"tool":[18],"that":[19,85],"captures":[20],"semantic":[21],"dependencies":[22],"between":[23],"exchanged":[24],"information.":[25],"To":[26],"do":[27],"so,":[28],"we":[29,59,81],"use":[30],"spy":[31,92],"nodes":[32],"as":[33,50,54,68,70],"observing":[34],"instances":[35],"distributed":[36],"throughout":[37],"the":[38,43],"network.":[39],"positioning":[41],"of":[42],"spies":[44],"thus":[46],"important":[47],"cover":[49],"many":[51],"information":[52],"paths":[53],"possible.":[55],"In":[56],"this":[57],"paper,":[58],"examine":[60],"guidelines":[61],"achieve":[63],"high":[64],"path":[65],"coverage":[66],"with":[67],"less":[69],"possible":[71],"spies.":[72],"Using":[73],"an":[74],"evolutionary":[75],"algorithm,":[76],"machine":[78],"learning":[79],"technique,":[80],"develop":[82],"metaheuristic":[84],"enables":[86],"us":[87],"quickly":[89],"select":[90],"such":[91],"sets.":[93]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
