{"id":"https://openalex.org/W4213117553","doi":"https://doi.org/10.3390/s22041398","title":"Modeling Analysis of SM2 Construction Attacks in the Open Secure Sockets Layer Based on Petri Net","display_name":"Modeling Analysis of SM2 Construction Attacks in the Open Secure Sockets Layer Based on Petri Net","publication_year":2022,"publication_date":"2022-02-11","ids":{"openalex":"https://openalex.org/W4213117553","doi":"https://doi.org/10.3390/s22041398","pmid":"https://pubmed.ncbi.nlm.nih.gov/35214301"},"language":"en","primary_location":{"id":"doi:10.3390/s22041398","is_oa":true,"landing_page_url":"https://doi.org/10.3390/s22041398","pdf_url":"https://www.mdpi.com/1424-8220/22/4/1398/pdf?version=1645166855","source":{"id":"https://openalex.org/S101949793","display_name":"Sensors","issn_l":"1424-8220","issn":["1424-8220"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Sensors","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj","pubmed"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1424-8220/22/4/1398/pdf?version=1645166855","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100577288","display_name":"Xi Deng","orcid":"https://orcid.org/0009-0001-8846-9879"},"institutions":[{"id":"https://openalex.org/I181903023","display_name":"Xi'an Shiyou University","ror":"https://ror.org/040c7js64","country_code":"CN","type":"education","lineage":["https://openalex.org/I181903023"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xi Deng","raw_affiliation_strings":["School of Computer Science, Xi\u2019an Shiyou University, Xi\u2019an 710065, China","School of Computer Science, Xi'an Shiyou University, Xi'an 710065, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Xi\u2019an Shiyou University, Xi\u2019an 710065, China","institution_ids":["https://openalex.org/I181903023"]},{"raw_affiliation_string":"School of Computer Science, Xi'an Shiyou University, Xi'an 710065, China","institution_ids":["https://openalex.org/I181903023"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015944074","display_name":"Liumei Zhang","orcid":"https://orcid.org/0000-0002-1834-5424"},"institutions":[{"id":"https://openalex.org/I181903023","display_name":"Xi'an Shiyou University","ror":"https://ror.org/040c7js64","country_code":"CN","type":"education","lineage":["https://openalex.org/I181903023"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Liumei Zhang","raw_affiliation_strings":["School of Computer Science, Xi\u2019an Shiyou University, Xi\u2019an 710065, China","School of Computer Science, Xi'an Shiyou University, Xi'an 710065, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Xi\u2019an Shiyou University, Xi\u2019an 710065, China","institution_ids":["https://openalex.org/I181903023"]},{"raw_affiliation_string":"School of Computer Science, Xi'an Shiyou University, Xi'an 710065, China","institution_ids":["https://openalex.org/I181903023"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100773308","display_name":"Yichuan Wang","orcid":"https://orcid.org/0000-0001-6575-1954"},"institutions":[{"id":"https://openalex.org/I4210131919","display_name":"Xi'an University of Technology","ror":"https://ror.org/038avdt50","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210131919"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yichuan Wang","raw_affiliation_strings":["School of Computer Science and Engineering, Xi\u2019an University of Technology, Xi\u2019an 710048, China","Shaanxi Key Laboratory for Network Computing and Security Technology, Xi\u2019an 710048, China","Shaanxi Key Laboratory for Network Computing and Security Technology, Xi'an 710048, China","School of Computer Science and Engineering, Xi'an University of Technology, Xi'an 710048, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Xi\u2019an University of Technology, Xi\u2019an 710048, China","institution_ids":["https://openalex.org/I4210131919"]},{"raw_affiliation_string":"Shaanxi Key Laboratory for Network Computing and Security Technology, Xi\u2019an 710048, China","institution_ids":[]},{"raw_affiliation_string":"Shaanxi Key Laboratory for Network Computing and Security Technology, Xi'an 710048, China","institution_ids":[]},{"raw_affiliation_string":"School of Computer Science and Engineering, Xi'an University of Technology, Xi'an 710048, China","institution_ids":["https://openalex.org/I4210131919"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088091724","display_name":"Fanzhi Jiang","orcid":"https://orcid.org/0000-0001-7229-9732"},"institutions":[{"id":"https://openalex.org/I181903023","display_name":"Xi'an Shiyou University","ror":"https://ror.org/040c7js64","country_code":"CN","type":"education","lineage":["https://openalex.org/I181903023"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fanzhi Jiang","raw_affiliation_strings":["School of Computer Science, Xi\u2019an Shiyou University, Xi\u2019an 710065, China","School of Computer Science, Xi'an Shiyou University, Xi'an 710065, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Xi\u2019an Shiyou University, Xi\u2019an 710065, China","institution_ids":["https://openalex.org/I181903023"]},{"raw_affiliation_string":"School of Computer Science, Xi'an Shiyou University, Xi'an 710065, China","institution_ids":["https://openalex.org/I181903023"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5015944074"],"corresponding_institution_ids":["https://openalex.org/I181903023"],"apc_list":{"value":2400,"currency":"CHF","value_usd":2598},"apc_paid":{"value":2400,"currency":"CHF","value_usd":2598},"fwci":0.2839,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.54811786,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"22","issue":"4","first_page":"1398","last_page":"1398"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/petri-net","display_name":"Petri net","score":0.7629236578941345},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7527062892913818},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.7249720096588135},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5958924293518066},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5576754808425903},{"id":"https://openalex.org/keywords/layer","display_name":"Layer (electronics)","score":0.4768751263618469},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.4747921824455261},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4645768105983734},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.46149927377700806},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.4159408211708069},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4036244750022888},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.32583850622177124},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.16543123126029968},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.10072308778762817},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.09313857555389404},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.08320322632789612}],"concepts":[{"id":"https://openalex.org/C38677869","wikidata":"https://www.wikidata.org/wiki/Q724168","display_name":"Petri net","level":2,"score":0.7629236578941345},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7527062892913818},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.7249720096588135},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5958924293518066},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5576754808425903},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.4768751263618469},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.4747921824455261},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4645768105983734},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.46149927377700806},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.4159408211708069},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4036244750022888},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.32583850622177124},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.16543123126029968},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.10072308778762817},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.09313857555389404},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.08320322632789612},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0}],"mesh":[{"descriptor_ui":"D003198","descriptor_name":"Computer Simulation","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D003198","descriptor_name":"Computer Simulation","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D003198","descriptor_name":"Computer Simulation","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D012984","descriptor_name":"Software","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D012984","descriptor_name":"Software","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D012984","descriptor_name":"Software","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true}],"locations_count":5,"locations":[{"id":"doi:10.3390/s22041398","is_oa":true,"landing_page_url":"https://doi.org/10.3390/s22041398","pdf_url":"https://www.mdpi.com/1424-8220/22/4/1398/pdf?version=1645166855","source":{"id":"https://openalex.org/S101949793","display_name":"Sensors","issn_l":"1424-8220","issn":["1424-8220"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Sensors","raw_type":"journal-article"},{"id":"pmid:35214301","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/35214301","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Sensors (Basel, Switzerland)","raw_type":null},{"id":"pmh:oai:doaj.org/article:0bbcf06d52fc4a45854d7e4189070adb","is_oa":true,"landing_page_url":"https://doaj.org/article/0bbcf06d52fc4a45854d7e4189070adb","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Sensors, Vol 22, Iss 4, p 1398 (2022)","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/1424-8220/22/4/1398/","is_oa":true,"landing_page_url":"https://dx.doi.org/10.3390/s22041398","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Sensors; Volume 22; Issue 4; Pages: 1398","raw_type":"Text"},{"id":"pmh:oai:pubmedcentral.nih.gov:8963028","is_oa":true,"landing_page_url":"https://www.ncbi.nlm.nih.gov/pmc/articles/8963028","pdf_url":null,"source":{"id":"https://openalex.org/S2764455111","display_name":"PubMed Central","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Sensors (Basel)","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/s22041398","is_oa":true,"landing_page_url":"https://doi.org/10.3390/s22041398","pdf_url":"https://www.mdpi.com/1424-8220/22/4/1398/pdf?version=1645166855","source":{"id":"https://openalex.org/S101949793","display_name":"Sensors","issn_l":"1424-8220","issn":["1424-8220"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Sensors","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7599999904632568}],"awards":[{"id":"https://openalex.org/G1906728897","display_name":null,"funder_award_id":"U20B2050","funder_id":"https://openalex.org/F4320336350","funder_display_name":"Key Research and Development Projects of Shaanxi Province"},{"id":"https://openalex.org/G2330603153","display_name":null,"funder_award_id":"2021ZDLGY05-09","funder_id":"https://openalex.org/F4320336350","funder_display_name":"Key Research and Development Projects of Shaanxi Province"},{"id":"https://openalex.org/G2422959752","display_name":null,"funder_award_id":"2020GY-039","funder_id":"https://openalex.org/F4320336350","funder_display_name":"Key Research and Development Projects of Shaanxi Province"},{"id":"https://openalex.org/G7972219819","display_name":null,"funder_award_id":"62072368","funder_id":"https://openalex.org/F4320336350","funder_display_name":"Key Research and Development Projects of Shaanxi Province"}],"funders":[{"id":"https://openalex.org/F4320327331","display_name":"National Commission for Science and Technology","ror":"https://ror.org/04gm1wq32"},{"id":"https://openalex.org/F4320336350","display_name":"Key Research and Development Projects of Shaanxi Province","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4213117553.pdf","grobid_xml":"https://content.openalex.org/works/W4213117553.grobid-xml"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W2033500335","https://openalex.org/W2109567464","https://openalex.org/W2122408829","https://openalex.org/W2559404560","https://openalex.org/W2700774434","https://openalex.org/W2805938964","https://openalex.org/W2809592759","https://openalex.org/W2914442069","https://openalex.org/W2920178021","https://openalex.org/W2923501234","https://openalex.org/W2968093167","https://openalex.org/W2991118826","https://openalex.org/W2993412939","https://openalex.org/W2994801901","https://openalex.org/W2996841597","https://openalex.org/W2998977406","https://openalex.org/W3000594736","https://openalex.org/W3007993592","https://openalex.org/W3008482685","https://openalex.org/W3034614954","https://openalex.org/W3127734392","https://openalex.org/W3127782461","https://openalex.org/W3144955302","https://openalex.org/W3171515419","https://openalex.org/W3175385336","https://openalex.org/W4200611687","https://openalex.org/W6628696594","https://openalex.org/W6760492777","https://openalex.org/W6760679213","https://openalex.org/W6772693032"],"related_works":["https://openalex.org/W2141388993","https://openalex.org/W1978034799","https://openalex.org/W2999607548","https://openalex.org/W2956597637","https://openalex.org/W2044639210","https://openalex.org/W2293245356","https://openalex.org/W4225160120","https://openalex.org/W23486959","https://openalex.org/W1588942021","https://openalex.org/W4384518368"],"abstract_inverted_index":{"The":[0,120],"detection":[1],"and":[2,20,66,80,110,134,167],"defense":[3,31],"of":[4,13,23,99,163],"malicious":[5],"attacks":[6],"are":[7],"critical":[8],"to":[9,17,43,54,86,95,153,160],"the":[10,18,24,77,97,103,107,111,115,124,130,142,148,161],"proper":[11],"functioning":[12],"network":[14,47,56,143],"security.":[15,57],"Due":[16],"diversity":[19],"rapid":[21],"updates":[22],"attack":[25,132],"methods":[26],"used":[27,76],"by":[28,106,114],"attackers,":[29],"traditional":[30],"mechanisms":[32],"have":[33],"been":[34],"challenged.":[35],"In":[36,58],"this":[37,59,100,146],"context,":[38],"a":[39,63,88,175],"more":[40],"effective":[41],"method":[42,173,177],"predict":[44],"vulnerabilities":[45],"in":[46],"systems":[48],"is":[49],"considered":[50],"an":[51,156],"urgent":[52],"need":[53],"protect":[55],"paper,":[60],"we":[61],"propose":[62],"formal":[64],"modeling":[65,141],"analysis":[67],"approach":[68],"based":[69],"on":[70],"Petri":[71,164],"net":[72],"vulnerability":[73,83],"exploitation.":[74],"We":[75],"Common":[78],"Vulnerabilities":[79],"Exposures":[81],"(CVE)-2021-3711":[82],"source":[84],"code":[85],"build":[87],"model.":[89,101],"A":[90],"patch":[91],"model":[92,149],"was":[93,127],"built":[94],"address":[96],"problems":[98],"Finally,":[102],"time":[104,112,126],"injected":[105],"actual":[108,131],"attacker":[109],"simulated":[113],"software":[116],"were":[117],"calculated":[118],"separately.":[119],"results":[121],"showed":[122],"that":[123],"simulation":[125,136],"shorter":[128],"than":[129],"time,":[133],"ultra-real-time":[135],"could":[137],"be":[138,151],"achieved.":[139],"By":[140],"system":[144],"with":[145],"method,":[147],"can":[150],"found":[152],"arrive":[154],"at":[155],"illegitimate":[157],"state":[158],"according":[159],"structure":[162],"nets":[165],"themselves":[166],"thus":[168],"discover":[169],"unknown":[170,180],"vulnerabilities.":[171,181],"This":[172],"provides":[174],"reference":[176],"for":[178],"exploring":[179]},"counts_by_year":[{"year":2024,"cited_by_count":2}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
