{"id":"https://openalex.org/W2150890217","doi":"https://doi.org/10.4304/jnw.5.5.543-550","title":"A Scalable Approach to Analyzing Network Security using Compact Attack Graphs","display_name":"A Scalable Approach to Analyzing Network Security using Compact Attack Graphs","publication_year":2010,"publication_date":"2010-04-01","ids":{"openalex":"https://openalex.org/W2150890217","doi":"https://doi.org/10.4304/jnw.5.5.543-550","mag":"2150890217"},"language":"en","primary_location":{"id":"doi:10.4304/jnw.5.5.543-550","is_oa":false,"landing_page_url":"https://doi.org/10.4304/jnw.5.5.543-550","pdf_url":null,"source":{"id":"https://openalex.org/S189188848","display_name":"Journal of Networks","issn_l":"1796-2056","issn":["1796-2056"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https://openalex.org/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100352749","display_name":"Feng Chen","orcid":"https://orcid.org/0000-0003-3508-8834"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Feng Chen","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042785326","display_name":"Dehui Liu","orcid":"https://orcid.org/0000-0002-8677-022X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dehui Liu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100653787","display_name":"Yi Zhang","orcid":"https://orcid.org/0000-0001-5526-866X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yi Zhang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5055375948","display_name":"Jinshu Su","orcid":"https://orcid.org/0000-0001-9273-616X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jinshu Su","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100352749"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":6.937,"has_fulltext":false,"cited_by_count":34,"citation_normalized_percentile":{"value":0.96882135,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"5","issue":"5","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9760000109672546,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.964900016784668,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9462733268737793},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6153707504272461},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5385090112686157},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5165318846702576},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.403540700674057},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3749752938747406},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.12010234594345093}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9462733268737793},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6153707504272461},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5385090112686157},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5165318846702576},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.403540700674057},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3749752938747406},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.12010234594345093}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.4304/jnw.5.5.543-550","is_oa":false,"landing_page_url":"https://doi.org/10.4304/jnw.5.5.543-550","pdf_url":null,"source":{"id":"https://openalex.org/S189188848","display_name":"Journal of Networks","issn_l":"1796-2056","issn":["1796-2056"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https://openalex.org/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Networks","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W1527726406","https://openalex.org/W2364921833","https://openalex.org/W2388030554","https://openalex.org/W2302028273","https://openalex.org/W1525643724","https://openalex.org/W2382623646","https://openalex.org/W3087771547","https://openalex.org/W3007967230","https://openalex.org/W3164196226","https://openalex.org/W2389099973"],"abstract_inverted_index":{"The":[0,72,99,118,173],"compact":[1],"attack":[2,43,78,97,192],"graphs":[3,44,193],"implicitly":[4],"reveal":[5],"the":[6,20,35,41,53,58,81,85,89,110,127,144,150,157,164,191],"threat":[7],"of":[8,16,30,49,55,109,197],"sophisticated":[9],"multi-step":[10],"attacks":[11],"by":[12],"enumerating":[13],"possible":[14,46],"sequences":[15],"exploits":[17],"leading":[18],"to":[19,39,75,103,125,129,162,181,190],"compromising":[21],"given":[22,86,113,137],"critical":[23,114,138],"resources":[24,139],"in":[25,95,132],"enterprise":[26,201],"networks":[27],"with":[28,45,80,194],"thousands":[29,48,196],"hosts.":[31],"For":[32],"security":[33,54,105],"analysts,":[34],"challenge":[36],"is":[37,74,101,124,177],"how":[38,102],"analyze":[40],"complex":[42],"ten":[47,195],"nodes":[50,198],"for":[51,146],"defending":[52],"network.":[56],"In":[57],"paper,":[59],"we":[60],"will":[61],"essentially":[62],"discuss":[63],"three":[66,168],"issues":[69,171],"about":[70],"it.":[71],"first":[73],"compute":[76],"non-loop":[77],"paths":[79],"distance":[82],"less":[83],"than":[84],"number":[87],"that":[88,136],"real":[90],"attacker":[91],"may":[92],"take":[93],"practically":[94],"realistic":[96],"scenarios.":[98],"second":[100],"measure":[104],"risk":[106],"resources.":[115],"third":[121],"find":[126],"solution":[128],"removing":[130],"vulnerabilities":[131],"such":[133,147],"a":[134,183],"way":[135],"cannot":[140],"be":[141],"compromised":[142],"while":[143],"cost":[145],"removal":[148],"incurs":[149],"least":[151],"cost.":[152],"We":[153],"propose":[154],"scalable":[160],"approach":[161,174],"solve":[163],"above":[165],"respectively.":[172],"proved":[180],"have":[182],"polynomial":[184],"time":[185],"complexity":[186],"and":[187],"can":[188],"scale":[189],"corresponding":[199],"large":[200],"networks.":[202]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
