{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:25:04Z","timestamp":1772119504313,"version":"3.50.1"},"reference-count":152,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,12,23]],"date-time":"2024-12-23T00:00:00Z","timestamp":1734912000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,23]],"date-time":"2024-12-23T00:00:00Z","timestamp":1734912000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100006976","name":"Lilly Endowment","doi-asserted-by":"publisher","award":["nalytixIN"],"award-info":[{"award-number":["nalytixIN"]}],"id":[{"id":"10.13039\/100006976","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006976","name":"Lilly Endowment","doi-asserted-by":"publisher","award":["nalytixIN"],"award-info":[{"award-number":["nalytixIN"]}],"id":[{"id":"10.13039\/100006976","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Enhanced Mentoring Program with Opportunities for Ways to Ex- cel in Research"},{"name":"First Year Research Immersion Program (1RIP) grants from the office of the Vice Chancellor for Research at Indiana University- Purdue University Indianapolis."}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s10207-024-00964-3","type":"journal-article","created":{"date-parts":[[2024,12,23]],"date-time":"2024-12-23T10:28:24Z","timestamp":1734949704000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["PR-DRA: PageRank-based defense resource allocation methods for securing interdependent systems modeled by attack graphs"],"prefix":"10.1007","volume":"24","author":[{"given":"Mohammad Ryiad","family":"Al-Eiadeh","sequence":"first","affiliation":[]},{"given":"Mustafa","family":"Abdallah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,23]]},"reference":[{"key":"964_CR1","unstructured":"O\u2019Rourke, T.D.: Critical infrastructure, interdependencies, and resilience (2007)"},{"key":"964_CR2","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.ijcip.2014.12.004","volume":"8","author":"A Laug\u00e9","year":"2015","unstructured":"Laug\u00e9, A., Hernantes, J., Sarriegi, J.M.: Critical infrastructure dependencies: a holistic, dynamic and quantitative approach. Int. J. Crit. Infrastruct. Prot. 8, 16\u201323 (2015)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"issue":"1\u20132","key":"964_CR3","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1080\/23789689.2020.1753401","volume":"6","author":"N Sharma","year":"2021","unstructured":"Sharma, N., Nocera, F., Gardoni, P.: Classification and mathematical modeling of infrastructure interdependencies. Sustain. Resil. Infrastruct. 6(1\u20132), 4\u201325 (2021)","journal-title":"Sustain. Resil. Infrastruct."},{"key":"964_CR4","doi-asserted-by":"crossref","unstructured":"Kanich, C., Kreibich, C., Levchenko, K., Enright, B., Voelker, G.M., Paxson, V., Savage, S.: Spamalytics: An empirical analysis of spam marketing conversion. In: Proceedings of the 15th ACM conference on Computer and communications security. pp. 3\u201314 (2008)","DOI":"10.1145\/1455770.1455774"},{"key":"964_CR5","doi-asserted-by":"crossref","unstructured":"Sheyner, O., Haines, J., Jha, S., Lippmann, R., Wing, J.M.: Automated generation and analysis of attack graphs. In: Proceedings 2002 IEEE Symposium on Security and Privacy. pp. 273\u2013284. IEEE (2002)","DOI":"10.1109\/SECPRI.2002.1004377"},{"key":"964_CR6","doi-asserted-by":"crossref","unstructured":"Jauhar, S., Chen, B., Temple, W.G., Dong, X., Kalbarczyk, Z., Sanders, W.H., Nicol, D.M.: Model-based cybersecurity assessment with nescor smart grid failure scenarios. In: Dependable Computing (PRDC), 2015 IEEE 21st Pacific Rim International Symposium on. pp. 319\u2013324. IEEE (2015)","DOI":"10.1109\/PRDC.2015.37"},{"issue":"2","key":"964_CR7","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1145\/2635673","volume":"47","author":"A Laszka","year":"2015","unstructured":"Laszka, A., Felegyhazi, M., Buttyan, L.: A survey of interdependent information security games. ACM Comput. Surv. (CSUR) 47(2), 23 (2015)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"964_CR8","doi-asserted-by":"crossref","unstructured":"Yan, G., Lee, R., Kent, A., Wolpert, D.: Towards a bayesian network game framework for evaluating ddos attacks and defense. In: Proceedings of the 2012 ACM conference on Computer and communications security (CCS). pp. 553\u2013566 (2012)","DOI":"10.1145\/2382196.2382255"},{"key":"964_CR9","doi-asserted-by":"crossref","unstructured":"Shishika, D., Kumar, V.: A review of multi agent perimeter defense games. In: International Conference on Decision and Game Theory for Security. pp. 472\u2013485. Springer (2020)","DOI":"10.1007\/978-3-030-64793-3_26"},{"key":"964_CR10","volume-title":"Network security: a decision and game-theoretic approach","author":"T Alpcan","year":"2010","unstructured":"Alpcan, T., Baar, T.: Network security: a decision and game-theoretic approach, 1st edn. Cambridge University Press, New York, NY, USA (2010)","edition":"1"},{"key":"964_CR11","doi-asserted-by":"crossref","unstructured":"Hota, A.R., Clements, A., Sundaram, S., Bagchi, S.: Optimal and game-theoretic deployment of security investments in interdependent assets. In: International Conference on Decision and Game Theory for Security. pp. 101\u2013113 (2016)","DOI":"10.1007\/978-3-319-47413-7_6"},{"key":"964_CR12","doi-asserted-by":"crossref","unstructured":"Modelo-Howard, G., Bagchi, S., Lebanon, G.: Determining placement of intrusion detectors for a distributed application through bayesian network modeling. In: International Workshop on Recent Advances in Intrusion Detection. pp. 271\u2013290. Springer (2008)","DOI":"10.1007\/978-3-540-87403-4_15"},{"key":"964_CR13","doi-asserted-by":"crossref","unstructured":"Lippmann, R., Ingols, K., Scott, C., Piwowarski, K., Kratkiewicz, K., Artz, M., Cunningham, R.: Validating and restoring defense in depth using attack graphs. In: IEEE Military Communications Conference. pp. 1\u201310. IEEE (2006)","DOI":"10.1109\/MILCOM.2006.302434"},{"key":"964_CR14","unstructured":"Ma, H., Han, S., Kamhoua, C., Fu, J.: Optimal resource allocation for proactive defense with deception in probabilistic attack graphs"},{"key":"964_CR15","doi-asserted-by":"crossref","unstructured":"Sanjab, A., Saad, W., Ba\u015far, T.: Prospect theory for enhanced cyber-physical security of drone delivery systems: A network interdiction game. In: Communications (ICC), 2017 IEEE International Conference on. pp.\u00a01\u20136. IEEE (2017)","DOI":"10.1109\/ICC.2017.7996862"},{"key":"964_CR16","doi-asserted-by":"crossref","unstructured":"Abdallah, M., Woods, D., Naghizadeh, P., Khalil, I., Cason, T., Sundaram, S., Bagchi, S.: Morshed: Guiding behavioral decision-makers towards better security investment in interdependent systems. In: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security. pp. 378\u2013392 (2021)","DOI":"10.1145\/3433210.3437534"},{"issue":"1","key":"964_CR17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13638-019-1616-9","volume":"2019","author":"P Vamvakas","year":"2019","unstructured":"Vamvakas, P., Tsiropoulou, E.E., Papavassiliou, S.: Exploiting prospect theory and risk-awareness to protect uav-assisted network operation. EURASIP J. Wirel. Commun. Netw. 2019(1), 1\u201320 (2019)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"1","key":"964_CR18","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1007\/s10683-021-09714-x","volume":"25","author":"D Woods","year":"2022","unstructured":"Woods, D., Abdallah, M., Bagchi, S., Sundaram, S., Cason, T.: Network defense and behavioral biases: an experimental study. Exp. Econ. 25(1), 254\u2013286 (2022)","journal-title":"Exp. Econ."},{"key":"964_CR19","doi-asserted-by":"publisher","unstructured":"Abdallah, M., Woods, D., Naghizadeh, P., Khalil, I., Cason, T., Sundaram, S., Bagchi, S.: Tasharok: Using mechanism design for enhancing security resource allocation in interdependent systems. In: 2022 IEEE Symposium on Security and Privacy (SP). pp. 249\u2013266 (2022). https:\/\/doi.org\/10.1109\/SP46214.2022.9833591","DOI":"10.1109\/SP46214.2022.9833591"},{"key":"964_CR20","doi-asserted-by":"crossref","first-page":"263","DOI":"10.2307\/1914185","volume":"47","author":"D Kahneman","year":"1979","unstructured":"Kahneman, D., Tversky, A.: Prospect theory: an analysis of decision under risk. Econometrica: J. Econom. Soc. 47, 263\u2013291 (1979)","journal-title":"Econometrica: J. Econom. Soc."},{"issue":"4","key":"964_CR21","doi-asserted-by":"crossref","first-page":"561","DOI":"10.3233\/JCS-130475","volume":"21","author":"J Homer","year":"2013","unstructured":"Homer, J., Zhang, S., Ou, X., Schmidt, D., Du, Y., Rajagopalan, S.R., Singhal, A.: Aggregating vulnerability metrics in enterprise networks using attack graphs. J. Comput. Secur. 21(4), 561\u2013597 (2013)","journal-title":"J. Comput. Secur."},{"key":"964_CR22","unstructured":"Durkota, K., Lisy, V., Bo\u0161ansky, B., Kiekintveld, C.: Optimal network security hardening using attack graph games. In: Proceedings of IJCAI. pp. 7\u201314 (2015)"},{"issue":"1","key":"964_CR23","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/TDSC.2011.34","volume":"9","author":"N Poolsappasit","year":"2011","unstructured":"Poolsappasit, N., Dewri, R., Ray, I.: Dynamic security risk management using bayesian attack graphs. IEEE Trans. Dependable Secure Comput. 9(1), 61\u201374 (2011)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"964_CR24","unstructured":"Vanek, O., Yin, Z., Jain, M., Bosansk\u1ef3, B., Tambe, M., Pechoucek, M.: Game-theoretic resource allocation for malicious packet detection in computer networks. In: AAMAS. pp. 905\u2013912 (2012)"},{"issue":"3","key":"964_CR25","doi-asserted-by":"crossref","first-page":"894","DOI":"10.1016\/j.ejor.2019.04.035","volume":"278","author":"M Khouzani","year":"2019","unstructured":"Khouzani, M., Liu, Z., Malacaria, P.: Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs. Eur. J. Oper. Res. 278(3), 894\u2013903 (2019)","journal-title":"Eur. J. Oper. Res."},{"key":"964_CR26","doi-asserted-by":"crossref","unstructured":"Noel, S., Jacobs, M., Kalapa, P., Jajodia, S.: Multiple coordinated views for network attack graphs. In: IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC 05). pp. 99\u2013106. IEEE (2005)","DOI":"10.1109\/VIZSEC.2005.1532071"},{"key":"964_CR27","doi-asserted-by":"crossref","first-page":"112794","DOI":"10.1016\/j.rser.2022.112794","volume":"168","author":"A Vosughi","year":"2022","unstructured":"Vosughi, A., Tamimi, A., King, A.B., Majumder, S., Srivastava, A.K.: Cyber-physical vulnerability and resiliency analysis for der integration: a review, challenges and research needs. Renew. Sustain. Energy Rev. 168, 112794 (2022)","journal-title":"Renew. Sustain. Energy Rev."},{"issue":"10","key":"964_CR28","doi-asserted-by":"crossref","first-page":"2331","DOI":"10.1080\/01605682.2020.1784048","volume":"72","author":"R Peng","year":"2021","unstructured":"Peng, R., Wu, D., Sun, M., Wu, S.: An attack-defense game on interdependent networks. J. Oper. Res. Soc. 72(10), 2331\u20132341 (2021)","journal-title":"J. Oper. Res. Soc."},{"issue":"1","key":"964_CR29","doi-asserted-by":"crossref","first-page":"13","DOI":"10.3390\/g8010013","volume":"8","author":"H Chan","year":"2017","unstructured":"Chan, H., Ceyko, M., Ortiz, L.: Interdependent defense games with applications to internet security at the level of autonomous systems. Games 8(1), 13 (2017)","journal-title":"Games"},{"key":"964_CR30","unstructured":"Akwetey, H.M., Danquah, P., et\u00a0al.: Predicting cyber-attack using cyber situational awareness: The case of independent power producers (ipps). arXiv preprint arXiv:2202.01778 (2022)"},{"key":"964_CR31","doi-asserted-by":"crossref","unstructured":"Datta, P., Lodinger, N., Namin, A.S., Jones, K.S.: Predicting consequences of cyber-attacks. In: 2020 IEEE International Conference on Big Data (Big Data). pp. 2073\u20132078. IEEE (2020)","DOI":"10.1109\/BigData50022.2020.9377825"},{"key":"964_CR32","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s42400-019-0043-x","volume":"3","author":"AE Ibor","year":"2020","unstructured":"Ibor, A.E., Oladeji, F.A., Okunoye, O.B., Ekabua, O.O.: Conceptualisation of cyberattack prediction with deep learning. Cybersecurity 3, 1\u201314 (2020)","journal-title":"Cybersecurity"},{"issue":"1","key":"964_CR33","doi-asserted-by":"crossref","first-page":"tyab019","DOI":"10.1093\/cybsec\/tyab019","volume":"7","author":"KL Snider","year":"2021","unstructured":"Snider, K.L., Shandler, R., Zandani, S., Canetti, D.: Cyberattacks, cyber threats, and attitudes toward cybersecurity policies. J. Cybersecur. 7(1), tyab019 (2021)","journal-title":"J. Cybersecur."},{"issue":"3","key":"964_CR34","doi-asserted-by":"crossref","first-page":"573","DOI":"10.3390\/jcp2030029","volume":"2","author":"WJ Triplett","year":"2022","unstructured":"Triplett, W.J.: Addressing human factors in cybersecurity leadership. J. Cybersecur. Privacy 2(3), 573\u2013586 (2022)","journal-title":"J. Cybersecur. Privacy"},{"key":"964_CR35","doi-asserted-by":"crossref","unstructured":"Jia, X., Zhang, Y., Wu, B., Ma, K., Wang, J., Cao, X.: Las-at: adversarial training with learnable attack strategy. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. pp. 13398\u201313408 (2022)","DOI":"10.1109\/CVPR52688.2022.01304"},{"key":"964_CR36","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-019-0038-7","author":"A Khraisat","year":"2019","unstructured":"Khraisat, A., Gondal, I., Vamplew, P., Kamruzzaman, J.: Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity (2019). https:\/\/doi.org\/10.1186\/s42400-019-0038-7","journal-title":"Cybersecurity"},{"key":"964_CR37","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-023-01255-5","author":"X Li","year":"2023","unstructured":"Li, X., Li, Y., Zhang, J., Xu, X., Liu, D.: A hierarchical multi-agent allocation-action learning framework for multi-subtask games. Complex Intell. Syst. (2023). https:\/\/doi.org\/10.1007\/s40747-023-01255-5","journal-title":"Complex Intell. Syst."},{"key":"964_CR38","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/2031063","author":"J Zeng","year":"2019","unstructured":"Zeng, J., Wu, S., Chen, Y., Zeng, R., Wu, C.: Survey of attack graph analysis methods from the perspective of data and knowledge processing. Secur. Commun. Netw. (2019). https:\/\/doi.org\/10.1155\/2019\/2031063","journal-title":"Secur. Commun. Netw."},{"key":"964_CR39","doi-asserted-by":"crossref","unstructured":"Rossi, R.A., Ahmed, N.K.: The network data repository with interactive graph analytics and visualization. In: Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence (2015), http:\/\/networkrepository.com","DOI":"10.1609\/aaai.v29i1.9277"},{"issue":"4","key":"964_CR40","doi-asserted-by":"publisher","first-page":"1585","DOI":"10.1109\/TCNS.2020.2988007","volume":"7","author":"M Abdallah","year":"2020","unstructured":"Abdallah, M., Naghizadeh, P., Hota, A.R., Cason, T., Bagchi, S., Sundaram, S.: Behavioral and game-theoretic security investments in interdependent systems modeled by attack graphs. IEEE Trans. Control Netw. Syst. 7(4), 1585\u20131596 (2020). https:\/\/doi.org\/10.1109\/TCNS.2020.2988007","journal-title":"IEEE Trans. Control Netw. Syst."},{"key":"964_CR41","doi-asserted-by":"crossref","first-page":"103927","DOI":"10.1016\/j.cose.2024.103927","volume":"144","author":"MR Al-Eiadeh","year":"2024","unstructured":"Al-Eiadeh, M.R., Abdallah, M.: Genigraph: a genetic-based novel security defense resource allocation method for interdependent systems modeled by attack graphs. Comput. Secur. 144, 103927 (2024)","journal-title":"Comput. Secur."},{"key":"964_CR42","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1016\/j.asoc.2015.12.028","volume":"41","author":"B Zeng","year":"2016","unstructured":"Zeng, B., Dong, Y.: An improved harmony search based energy-efficient routing algorithm for wireless sensor networks. Appl. Soft Comput. J. 41, 135\u2013147 (2016). https:\/\/doi.org\/10.1016\/j.asoc.2015.12.028","journal-title":"Appl. Soft Comput. J."},{"issue":"Special Issue B","key":"964_CR43","first-page":"115","volume":"50","author":"FI Sapundzhi","year":"2018","unstructured":"Sapundzhi, F.I., Popstoilov, M.S.: Optimization algorithms for finding the shortest paths. Bul. Chem. Commun. 50(Special Issue B), 115\u2013120 (2018)","journal-title":"Bul. Chem. Commun."},{"key":"964_CR44","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.measurement.2016.06.050","volume":"93","author":"A Ebrahimnejad","year":"2016","unstructured":"Ebrahimnejad, A., Tavana, M., Alrezaamiri, H.: A novel artificial bee colony algorithm for shortest path problems with fuzzy arc weights. Meas.: J. Int. Meas. Confed. 93, 48\u201356 (2016). https:\/\/doi.org\/10.1016\/j.measurement.2016.06.050","journal-title":"Meas.: J. Int. Meas. Confed."},{"issue":"1","key":"964_CR45","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/s10589-008-9210-9","volume":"47","author":"O Bozorg Haddad","year":"2010","unstructured":"Bozorg Haddad, O., Mirmomeni, M., Zarezadeh Mehrizi, M., Mari\u00f1o, M.A.: Finding the shortest path with honey-bee mating optimization algorithm in project management problems with constrained\/unconstrained resources. Comput. Optim. Appl. 47(1), 97\u2013128 (2010)","journal-title":"Comput. Optim. Appl."},{"issue":"4","key":"964_CR46","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/s12530-014-9126-9","volume":"6","author":"AH Mazinan","year":"2015","unstructured":"Mazinan, A.H., Sagharichiha, F.: A novel hybrid PSO-ACO approach with its application to SPP. Evol. Syst. 6(4), 293\u2013302 (2015). https:\/\/doi.org\/10.1007\/s12530-014-9126-9","journal-title":"Evol. Syst."},{"issue":"14","key":"964_CR47","doi-asserted-by":"crossref","first-page":"12505","DOI":"10.1109\/JIOT.2021.3137331","volume":"9","author":"Z Qadir","year":"2021","unstructured":"Qadir, Z., Zafar, M.H., Moosavi, S.K.R., Le, K.N., Mahmud, M.P.: Autonomous uav path-planning optimization using metaheuristic approach for predisaster assessment. IEEE Internet Things J. 9(14), 12505\u201312514 (2021)","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"964_CR48","first-page":"346","volume":"12","author":"RB Pedditi","year":"2024","unstructured":"Pedditi, R.B., Debasis, K.: Macr: a novel meta-heuristic approach to optimize clustering and routing in iot-based wsn. Int. J. Intell. Syst. Appl. Eng. 12(1), 346\u2013359 (2024)","journal-title":"Int. J. Intell. Syst. Appl. Eng."},{"key":"964_CR49","doi-asserted-by":"crossref","unstructured":"Perelman, L., Amin, S.: A network interdiction model for analyzing the vulnerability of water distribution systems. In: Proceedings of the 3rd international conference on High confidence networked systems. pp. 135\u2013144. ACM (2014)","DOI":"10.1145\/2566468.2566480"},{"key":"964_CR50","doi-asserted-by":"publisher","unstructured":"Shishika, D., Guan, Y., Dorothy, M., Kumar, V.: Dynamic Defender-Attacker Blotto Game. Proc. Am. Control Conf. 2022, 4422\u20134428 (2022). https:\/\/doi.org\/10.23919\/ACC53348.2022.9867318","DOI":"10.23919\/ACC53348.2022.9867318"},{"issue":"3","key":"964_CR51","doi-asserted-by":"publisher","first-page":"1909","DOI":"10.1109\/TDSC.2022.3165624","volume":"20","author":"AV Outkin","year":"2023","unstructured":"Outkin, A.V., Schulz, P.V., Schulz, T., Tarman, T.D., Pinar, A.: Defender policy evaluation and resource allocation with MITRE ATT-CK evaluations data. IEEE Trans. Dependable Secure Comput. 20(3), 1909\u20131926 (2023). https:\/\/doi.org\/10.1109\/TDSC.2022.3165624","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"5","key":"964_CR52","doi-asserted-by":"publisher","first-page":"1086","DOI":"10.1111\/risa.13837","volume":"42","author":"C Shao","year":"2022","unstructured":"Shao, C., Li, Y.F.: Multistage attack-defense graph game analysis for protection resources allocation optimization against cyber attacks considering rationality evolution. Risk Anal. 42(5), 1086\u20131105 (2022). https:\/\/doi.org\/10.1111\/risa.13837","journal-title":"Risk Anal."},{"key":"964_CR53","unstructured":"Van\u011bd, O., Yin, Z., Jain, M., Bo\u0161ansk\u00fd, B., Tambe, M., P\u011bchou\u010dek, M.: Game-theoretic resource allocation for malicious packet detection in computer networks. 11th International Conference on Autonomous Agents and Multiagent Systems 2012, AAMAS 2012: Innovative Applications Track 2(1), 840\u2013847 (2012)"},{"issue":"9","key":"964_CR54","doi-asserted-by":"crossref","first-page":"5793","DOI":"10.1109\/TCOMM.2020.2999628","volume":"68","author":"H Ren","year":"2020","unstructured":"Ren, H., Pan, C., Deng, Y., Elkashlan, M., Nallanathan, A.: Resource allocation for secure urllc in mission-critical iot scenarios. IEEE Trans. Commun. 68(9), 5793\u20135807 (2020)","journal-title":"IEEE Trans. Commun."},{"issue":"6","key":"964_CR55","doi-asserted-by":"crossref","first-page":"162303","DOI":"10.1007\/s11432-020-3125-y","volume":"64","author":"Z Ning","year":"2021","unstructured":"Ning, Z., Sun, S., Wang, X., Guo, L., Wang, G., Gao, X., Kwok, R.Y.: Intelligent resource allocation in mobile blockchain for privacy and security transactions: a deep reinforcement learning based approach. Sci. China Inf. Sci. 64(6), 162303 (2021)","journal-title":"Sci. China Inf. Sci."},{"issue":"1","key":"964_CR56","first-page":"1","volume":"7","author":"ANU Sing","year":"2015","unstructured":"Sing, A.N.U., Raphs, A.T.G.: A predictive framework for cyber security analytics using attack graphs. Int. J. Comput. Netw. Commun. 7(1), 1\u201317 (2015)","journal-title":"Int. J. Comput. Netw. Commun."},{"key":"964_CR57","doi-asserted-by":"publisher","first-page":"44350","DOI":"10.1109\/ACCESS.2023.3272053","volume":"11","author":"OSMBH Almazrouei","year":"2023","unstructured":"Almazrouei, O.S.M.B.H., Magalingam, P., Hasan, M.K., Shanmugam, M.: A review on attack graph analysis for IoT vulnerability assessment: challenges, open issues, and future directions. IEEE Access 11, 44350\u201344376 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3272053","journal-title":"IEEE Access"},{"issue":"2","key":"964_CR58","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1108\/ICS-12-2013-0090","volume":"23","author":"M Shahpasand","year":"2015","unstructured":"Shahpasand, M., Shajari, M., Hashemi Golpaygani, S.A., Ghavamipoor, H.: A comprehensive security control selection model for inter-dependent organizational assets structure. Inf. Comput. Secur. 23(2), 218\u2013242 (2015)","journal-title":"Inf. Comput. Secur."},{"key":"964_CR59","doi-asserted-by":"crossref","unstructured":"Kay, B., Lu, H., Devineni, P., Tabassum, A., Chintavali, S., Lee, S.M.: Identification of critical infrastructure via pagerank. In: 2021 IEEE International Conference on Big Data (Big Data). pp. 3685\u20133690. IEEE (2021)","DOI":"10.1109\/BigData52589.2021.9671620"},{"key":"964_CR60","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.cose.2016.09.006","volume":"63","author":"D Dor","year":"2016","unstructured":"Dor, D., Elovici, Y.: A model of the information security investment decision-making process. Comput. Secur. 63, 1\u201313 (2016)","journal-title":"Comput. Secur."},{"key":"964_CR61","doi-asserted-by":"crossref","unstructured":"Abdallah, M., Cason, T., Bagchi, S., Sundaram, S.: The effect of behavioral probability weighting in a sequential defender-attacker game. In: 2020 59th IEEE Conference on Decision and Control (CDC). pp. 3255\u20133260. IEEE (2020)","DOI":"10.1109\/CDC42340.2020.9304311"},{"key":"964_CR62","doi-asserted-by":"crossref","unstructured":"Ahire, A., Abdallah, M.: Reinforcement learning for enhancing human security resource allocation in protecting assets with heterogeneous losses. In: Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems. pp. 9\u201315 (2023)","DOI":"10.1145\/3579988.3585057"},{"key":"964_CR63","doi-asserted-by":"crossref","unstructured":"Abraham, S., Nair, S.: A predictive framework for cyber security analytics using attack graphs. arXiv preprint arXiv:1502.01240 (2015)","DOI":"10.5121\/ijcnc.2015.7101"},{"issue":"6","key":"964_CR64","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/MSP.2009.163","volume":"7","author":"A Acquisti","year":"2009","unstructured":"Acquisti, A.: Nudging privacy: the behavioral economics of personal information. IEEE Secur. Priv. 7(6), 82\u201385 (2009)","journal-title":"IEEE Secur. Priv."},{"key":"964_CR65","doi-asserted-by":"crossref","unstructured":"Redmiles, E.M., Mazurek, M.L., Dickerson, J.P.: Dancing pigs or externalities?: Measuring the rationality of security decisions. In: Proceedings of the 2018 ACM Conference on Economics and Computation. pp. 215\u2013232. ACM (2018)","DOI":"10.1145\/3219166.3219185"},{"key":"964_CR66","doi-asserted-by":"crossref","unstructured":"Anderson, R.: Security economics: a personal perspective. In: Proceedings of the 28th Annual Computer Security Applications Conference. pp. 139\u2013144. ACM (2012)","DOI":"10.1145\/2420950.2420971"},{"issue":"2","key":"964_CR67","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1016\/j.comnet.2012.07.021","volume":"57","author":"SS Silva","year":"2013","unstructured":"Silva, S.S., Silva, R.M., Pinto, R.C., Salles, R.M.: Botnets: A survey. Comput. Netw. 57(2), 378\u2013403 (2013)","journal-title":"Comput. Netw."},{"issue":"4","key":"964_CR68","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1145\/1402946.1402979","volume":"38","author":"Y Xie","year":"2008","unstructured":"Xie, Y., Yu, F., Achan, K., Panigrahy, R., Hulten, G., Osipkov, I.: Spamming botnets: signatures and characteristics. ACM SIGCOMM Comput. Commun. Rev. 38(4), 171\u2013182 (2008)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"issue":"4","key":"964_CR69","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1145\/581271.581274","volume":"5","author":"LA Gordon","year":"2002","unstructured":"Gordon, L.A., Loeb, M.P.: The economics of information security investment. ACM Trans. Inf. Syst. Secur. (TISSEC) 5(4), 438\u2013457 (2002)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"issue":"3","key":"964_CR70","doi-asserted-by":"crossref","first-page":"1432","DOI":"10.1109\/TPWRD.2010.2103331","volume":"26","author":"J Shin","year":"2011","unstructured":"Shin, J., Lee, J., Jeong, J.: Channel modeling for indoor broadband power-line communications networks with arbitrary topologies by taking adjacent nodes into account. IEEE Trans. Power Delivery 26(3), 1432\u20131439 (2011)","journal-title":"IEEE Trans. Power Delivery"},{"key":"964_CR71","doi-asserted-by":"crossref","unstructured":"Zhang, W., Wang, X., Zhao, D., Tang, X.: Graph degree linkage: Agglomerative clustering on a directed graph. In: Computer Vision\u2013ECCV 2012: 12th European Conference on Computer Vision, Florence, Italy, October 7-13, 2012, Proceedings, Part I 12. pp. 428\u2013441. Springer (2012)","DOI":"10.1007\/978-3-642-33718-5_31"},{"issue":"7","key":"964_CR72","first-page":"1295","volume":"9","author":"JP Pellet","year":"2008","unstructured":"Pellet, J.P., Elisseeff, A.: Using Markov blankets for causal structure learning. J. Mach. Learn. Res. 9(7), 1295 (2008)","journal-title":"J. Mach. Learn. Res."},{"key":"964_CR73","doi-asserted-by":"crossref","unstructured":"Yuan, J., Bae, E., Tai, X.C.: A study on continuous max-flow and min-cut approaches. In: 2010 ieee computer society conference on computer vision and pattern recognition. pp. 2217\u20132224. IEEE (2010)","DOI":"10.1109\/CVPR.2010.5539903"},{"issue":"1\u20137","key":"964_CR74","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/S0169-7552(98)00110-X","volume":"30","author":"S Brin","year":"1998","unstructured":"Brin, S., Page, L.: The anatomy of a large-scale hypertextual web search engine. Comput. Netw. ISDN Syst. 30(1\u20137), 107\u2013117 (1998)","journal-title":"Comput. Netw. ISDN Syst."},{"issue":"1","key":"964_CR75","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1038\/scientificamerican0792-66","volume":"267","author":"JH Holland","year":"1992","unstructured":"Holland, J.H.: Genetic algorithms. Sci. Am. 267(1), 66\u201373 (1992)","journal-title":"Sci. Am."},{"key":"964_CR76","doi-asserted-by":"crossref","unstructured":"Vericat, F., Stoico, C.O., Carlevaro, C.M., Renzi, D.G.: Genetic algorithm for the pair distribution function of the electron gas. Interdiscip. Sci. Comput. Life Sci. 3, 283\u2013289 (2011)","DOI":"10.1007\/s12539-011-0108-3"},{"key":"964_CR77","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/978-3-319-93025-1_4","volume":"780","author":"S Mirjalili","year":"2019","unstructured":"Mirjalili, S., Mirjalili, S.: Genetic algorithm. Evolut. Algorithms Neural Netw.: Theory Appl. 780, 43\u201355 (2019)","journal-title":"Evolut. Algorithms Neural Netw.: Theory Appl."},{"key":"964_CR78","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/BF00175354","volume":"4","author":"D Whitley","year":"1994","unstructured":"Whitley, D.: A genetic algorithm tutorial. Stat. Comput. 4, 65\u201385 (1994)","journal-title":"Stat. Comput."},{"issue":"5","key":"964_CR79","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1016\/j.ipl.2007.03.010","volume":"103","author":"XH Shi","year":"2007","unstructured":"Shi, X.H., Liang, Y.C., Lee, H.P., Lu, C., Wang, Q.: Particle swarm optimization-based algorithms for tsp and generalized tsp. Inf. Process. Lett. 103(5), 169\u2013176 (2007)","journal-title":"Inf. Process. Lett."},{"key":"964_CR80","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/s12293-017-0232-7","volume":"10","author":"A Rezoug","year":"2018","unstructured":"Rezoug, A., Bader-El-Den, M., Boughaci, D.: Guided genetic algorithm for the multidimensional knapsack problem. Memetic Comput. 10, 29\u201342 (2018)","journal-title":"Memetic Comput."},{"issue":"4","key":"964_CR81","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1504\/IJCSM.2024.139088","volume":"19","author":"M Al-Batah","year":"2024","unstructured":"Al-Batah, M., Al-Eiadeh, M.R.: An improved binary crow-jaya optimisation system with various evolution operators, such as mutation for finding the max clique in the dens graph. Int. J. Comput. Sci. Math. 19(4), 327\u2013338 (2024)","journal-title":"Int. J. Comput. Sci. Math."},{"key":"964_CR82","doi-asserted-by":"crossref","unstructured":"Gen, M., Cheng, R., Wang, D.: Genetic algorithms for solving shortest path problems. In: Proceedings of 1997 IEEE International Conference on Evolutionary Computation (ICEC\u201997) (pp. 401\u2013406). IEEE","DOI":"10.1109\/ICEC.1997.592343"},{"key":"964_CR83","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1016\/j.asoc.2014.02.010","volume":"19","author":"KK Bhattacharjee","year":"2014","unstructured":"Bhattacharjee, K.K., Sarmah, S.P.: Shuffled frog leaping algorithm and its application to 0\/1 knapsack problem. Appl. Soft Comput. 19, 252\u2013263 (2014). https:\/\/doi.org\/10.1016\/j.asoc.2014.02.010","journal-title":"Appl. Soft Comput."},{"key":"964_CR84","doi-asserted-by":"publisher","first-page":"817","DOI":"10.1016\/j.asoc.2015.10.043","volume":"38","author":"Y Zhou","year":"2016","unstructured":"Zhou, Y., Chen, X., Zhou, G.: An improved monkey algorithm for a 0\u20131 knapsack problem. Appl. Soft Comput. J. 38, 817\u2013830 (2016). https:\/\/doi.org\/10.1016\/j.asoc.2015.10.043","journal-title":"Appl. Soft Comput. J."},{"key":"964_CR85","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2023.3238420","author":"B Ahadzadeh","year":"2023","unstructured":"Ahadzadeh, B., Abdar, M., Safara, F., Khosravi, A., Menhaj, M.B., Suganthan, P.N.: SFE: a simple, fast and efficient feature selection algorithm for high-dimensional data. IEEE Trans. Evol. Comput. (2023). https:\/\/doi.org\/10.1109\/TEVC.2023.3238420","journal-title":"IEEE Trans. Evol. Comput."},{"issue":"4","key":"964_CR86","doi-asserted-by":"publisher","first-page":"2911","DOI":"10.1007\/s00500-020-05349-x","volume":"25","author":"M Kelidari","year":"2021","unstructured":"Kelidari, M., Hamidzadeh, J.: Feature selection by using chaotic cuckoo optimization algorithm with levy flight, opposition-based learning and disruption operator. Soft. Comput. 25(4), 2911\u20132933 (2021). https:\/\/doi.org\/10.1007\/s00500-020-05349-x","journal-title":"Soft. Comput."},{"issue":"23","key":"964_CR87","doi-asserted-by":"publisher","first-page":"4421","DOI":"10.1016\/j.ins.2008.07.031","volume":"178","author":"M Lozano","year":"2008","unstructured":"Lozano, M., Herrera, F., Cano, J.R.: Replacement strategies to preserve useful diversity in steady-state genetic algorithms. Inf. Sci. 178(23), 4421\u20134433 (2008). https:\/\/doi.org\/10.1016\/j.ins.2008.07.031","journal-title":"Inf. Sci."},{"issue":"1","key":"964_CR88","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/S0965-9978(00)00070-3","volume":"32","author":"J Andre","year":"2001","unstructured":"Andre, J., Siarry, P., Dognon, T.: An improvement of the standard genetic algorithm fighting premature convergence in continuous optimization. Adv. Eng. Softw. 32(1), 49\u201360 (2001). https:\/\/doi.org\/10.1016\/S0965-9978(00)00070-3","journal-title":"Adv. Eng. Softw."},{"key":"964_CR89","first-page":"1","volume":"15","author":"FB Naqvi","year":"2021","unstructured":"Naqvi, F.B., Shad, M.Y.: Seeking a balance between population diversity and premature convergence for real-coded genetic algorithms with crossover operator. Evolut. Intell. 15, 1\u201316 (2021)","journal-title":"Evolut. Intell."},{"issue":"3","key":"964_CR90","doi-asserted-by":"crossref","first-page":"484","DOI":"10.1109\/TEVC.2017.2724201","volume":"22","author":"DC Dang","year":"2017","unstructured":"Dang, D.C., Friedrich, T., K\u00f6tzing, T., Krejca, M.S., Lehre, P.K., Oliveto, P.S., Sudholt, D., Sutton, A.M.: Escaping local optima using crossover with emergent diversity. IEEE Trans. Evol. Comput. 22(3), 484\u2013497 (2017)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"964_CR91","doi-asserted-by":"publisher","unstructured":"Umbarkar, A.J. and Sheth, P.D.: Crossover operators in genetic algorithms: a review. ICTACT J. Soft Comput. 06(01), 1083\u20131092 (2015). https:\/\/doi.org\/10.21917\/ijsc.2015.0150","DOI":"10.21917\/ijsc.2015.0150"},{"key":"964_CR92","doi-asserted-by":"crossref","unstructured":"Ribeiro Filho, J.L., Treleaven, P.C., Alippi, C.: Genetic-algorithm programming environments. Computer 27(6), 28\u201343 (1994)","DOI":"10.1109\/2.294850"},{"key":"964_CR93","doi-asserted-by":"crossref","first-page":"e183","DOI":"10.1017\/S0140525X21002351","volume":"45","author":"J Bruineberg","year":"2022","unstructured":"Bruineberg, J., Do\u0142\u0119ga, K., Dewhurst, J., Baltieri, M.: The emperor\u2019s new Markov blankets. Behav. Brain Sci. 45, e183 (2022)","journal-title":"Behav. Brain Sci."},{"issue":"1","key":"964_CR94","first-page":"499","volume":"14","author":"A Statnikov","year":"2013","unstructured":"Statnikov, A., Lytkin, N.I., Lemeire, J., Aliferis, C.F.: Algorithms for discovery of multiple Markov boundaries. J. Mach. Learn. Res. 14(1), 499\u2013566 (2013)","journal-title":"J. Mach. Learn. Res."},{"key":"964_CR95","unstructured":"Goldreich, O., Rosenberg, A.L., Selman, A.L.: LNCS 3895 - Theoretical Computer Science. https:\/\/link-springer-com.ezproxy.lib.gla.ac.uk\/content\/pdf\/10.1007%2F11685654.pdf"},{"key":"964_CR96","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.neucom.2022.09.115","volume":"513","author":"B Finkelshtein","year":"2022","unstructured":"Finkelshtein, B., Baskin, C., Zheltonozhskii, E., Alon, U.: Single-node attacks for fooling graph neural networks. Neurocomputing 513, 1\u201312 (2022)","journal-title":"Neurocomputing"},{"key":"964_CR97","doi-asserted-by":"crossref","unstructured":"Chen, D., Zhang, J., Lv, Y., Wang, J., Ni, H., Yu, S., Wang, Z., Xuan, Q.: Single-node injection label specificity attack on graph neural networks via reinforcement learning. In: IEEE Transactions on Computational Social Systems (2024)","DOI":"10.1109\/TCSS.2024.3377554"},{"key":"964_CR98","doi-asserted-by":"crossref","unstructured":"Mehta, V., Bartzis, C., Zhu, H., Clarke, E., Wing, J.: Ranking attack graphs. In: International Workshop on Recent Advances in Intrusion Detection. pp. 127\u2013144. Springer (2006)","DOI":"10.1007\/11856214_7"},{"key":"964_CR99","doi-asserted-by":"publisher","unstructured":"Aparicio-Navarro, F.J., Kyriakopoulos, K.G., Ghafir, I., Lambotharan, S., Chambers, J.A.: Multi-stage attack detection using contextual information. In: MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM). pp.\u00a01\u20139 (2018). https:\/\/doi.org\/10.1109\/MILCOM.2018.8599708","DOI":"10.1109\/MILCOM.2018.8599708"},{"key":"964_CR100","doi-asserted-by":"crossref","unstructured":"Nguyen, T.H., Wright, M., Wellman, M.P., Baveja, S.: Multi-stage attack graph security games: Heuristic strategies, with empirical game-theoretic analysis. In: Proceedings of the 2017 Workshop on Moving Target Defense. pp. 87\u201397 (2017)","DOI":"10.1145\/3140549.3140562"},{"key":"964_CR101","unstructured":"Gamarra, M.A.: A Multi-Agent Systems Approach for Analysis of Stepping Stone Attacks. Ph.D. thesis, Old Dominion University (2019)"},{"key":"964_CR102","doi-asserted-by":"crossref","unstructured":"Nicol, D.M., Mallapura, V.: Modeling and analysis of stepping stone attacks. In: Proceedings of the Winter Simulation Conference 2014. pp. 3036\u20133047. IEEE (2014)","DOI":"10.1109\/WSC.2014.7020142"},{"issue":"5","key":"964_CR103","doi-asserted-by":"crossref","first-page":"1612","DOI":"10.1109\/TSP.2006.890881","volume":"55","author":"T He","year":"2007","unstructured":"He, T., Tong, L.: Detecting encrypted stepping-stone connections. IEEE Trans. Signal Process. 55(5), 1612\u20131623 (2007)","journal-title":"IEEE Trans. Signal Process."},{"issue":"1","key":"964_CR104","doi-asserted-by":"crossref","first-page":"276","DOI":"10.1186\/s13638-018-1303-2","volume":"2018","author":"L Wang","year":"2018","unstructured":"Wang, L., Yang, J.: A research survey in stepping-stone intrusion detection. EURASIP J. Wirel. Commun. Netw. 2018(1), 276 (2018)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"964_CR105","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1016\/j.rser.2017.05.206","volume":"80","author":"H Guo","year":"2017","unstructured":"Guo, H., Zheng, C., Iu, H.H.C., Fernando, T.: A critical review of cascading failure analysis and modeling of power system. Renew. Sustain. Energy Rev. 80, 9\u201322 (2017)","journal-title":"Renew. Sustain. Energy Rev."},{"issue":"6","key":"964_CR106","doi-asserted-by":"crossref","first-page":"2247","DOI":"10.1109\/JIOT.2017.2761353","volume":"4","author":"W Liao","year":"2017","unstructured":"Liao, W., Salinas, S., Li, M., Li, P., Loparo, K.A.: Cascading failure attacks in the power system: a stochastic game perspective. IEEE Internet Things J. 4(6), 2247\u20132259 (2017)","journal-title":"IEEE Internet Things J."},{"issue":"26","key":"964_CR107","doi-asserted-by":"crossref","first-page":"6671","DOI":"10.1016\/j.physa.2008.08.037","volume":"387","author":"J Wang","year":"2008","unstructured":"Wang, J., Rong, L., Zhang, L., Zhang, Z.: Attack vulnerability of scale-free networks due to cascading failures. Phys. A 387(26), 6671\u20136678 (2008)","journal-title":"Phys. A"},{"key":"964_CR108","doi-asserted-by":"crossref","unstructured":"Schiela, A.: Copyright by SIAM. Unauthorized reproduction of this article is prohibited . Society 20(2), 1002\u20131031 (2009)","DOI":"10.1137\/070692789"},{"issue":"4","key":"964_CR109","doi-asserted-by":"crossref","first-page":"952","DOI":"10.1137\/S0895479804439808","volume":"27","author":"IC Ipsen","year":"2006","unstructured":"Ipsen, I.C., Kirkland, S.: Convergence analysis of a pagerank updating algorithm by langville and meyer. SIAM J. Matrix Anal. Appl. 27(4), 952\u2013967 (2006)","journal-title":"SIAM J. Matrix Anal. Appl."},{"issue":"12","key":"964_CR110","doi-asserted-by":"crossref","first-page":"3255","DOI":"10.1109\/TAC.2013.2264553","volume":"58","author":"W Zhao","year":"2013","unstructured":"Zhao, W., Chen, H.F., Fang, H.T.: Convergence of distributed randomized pagerank algorithms. IEEE Trans. Autom. Control 58(12), 3255\u20133259 (2013)","journal-title":"IEEE Trans. Autom. Control"},{"key":"964_CR111","doi-asserted-by":"crossref","unstructured":"Sommestad, T., Ericsson, G.N., Nordlander, J.: Scada system cyber security\u2013a comparison of standards. In: IEEE PES general meeting. pp.\u00a01\u20138. IEEE (2010)","DOI":"10.1109\/PES.2010.5590215"},{"key":"964_CR112","unstructured":"Keromytis, A.D.: A look at voip vulnerabilities (2010)"},{"key":"964_CR113","doi-asserted-by":"crossref","unstructured":"Sheyner, O., Wing, J.: Tools for generating and analyzing attack graphs. In: International Symposium on Formal Methods for Components and Objects. pp. 344\u2013371. Springer (2003)","DOI":"10.1007\/978-3-540-30101-1_17"},{"key":"964_CR114","first-page":"171","volume":"1","author":"F Wilcoxon","year":"1970","unstructured":"Wilcoxon, F., Katti, S., Wilcox, R.A., et al.: Critical values and probability levels for the wilcoxon rank sum test and the wilcoxon signed rank test. Sel. Tables Math. Stat. 1, 171\u2013259 (1970)","journal-title":"Sel. Tables Math. Stat."},{"issue":"1","key":"964_CR115","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1080\/00220973.1993.9943832","volume":"62","author":"DW Zimmerman","year":"1993","unstructured":"Zimmerman, D.W., Zumbo, B.D.: Relative power of the wilcoxon test, the friedman test, and repeated-measures ANOVA on ranks. J. Exp. Edu. 62(1), 75\u201386 (1993). https:\/\/doi.org\/10.1080\/00220973.1993.9943832","journal-title":"J. Exp. Edu."},{"key":"964_CR116","doi-asserted-by":"crossref","unstructured":"Kremelberg, D.: Practical statistics: A quick and easy guide to IBM\u00ae SPSS\u00ae Statistics, STATA, and other statistical software. SAGE publications (2010)","DOI":"10.4135\/9781483385655"},{"key":"964_CR117","doi-asserted-by":"crossref","unstructured":"Kahneman, D., Tversky, A.: Prospect theory: An analysis of decision under risk. In: Handbook of the fundamentals of financial decision making: Part I, pp. 99\u2013127. World Scientific (2013)","DOI":"10.1142\/9789814417358_0006"},{"issue":"5","key":"964_CR118","doi-asserted-by":"crossref","first-page":"1071","DOI":"10.1109\/TIFS.2016.2516916","volume":"11","author":"M Zhang","year":"2016","unstructured":"Zhang, M., Wang, L., Jajodia, S., Singhal, A., Albanese, M.: Network diversity: a security metric for evaluating the resilience of networks against zero-day attacks. IEEE Trans. Inf. Forensics Secur. 11(5), 1071\u20131086 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"964_CR119","doi-asserted-by":"crossref","unstructured":"Michail, D., Kinable, J., Naveh, B., Sichi, J.V.: JGraphT\u2013A Java Library for Graph Data Structures and Algorithms. ACM Trans. Math. Softw. 46(2) (2020)","DOI":"10.1145\/3381449"},{"issue":"1","key":"964_CR120","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/TSMCB.2006.880136","volume":"37","author":"HD Nguyen","year":"2007","unstructured":"Nguyen, H.D., Yoshihara, I., Yamamori, K., Yasunaga, M.: Implementation of an effective hybrid ga for large-scale traveling salesman problems. IEEE Trans. Syst., Man, and Cybernet., Part B (Cybernetics) 37(1), 92\u201399 (2007)","journal-title":"IEEE Trans. Syst., Man, and Cybernet., Part B (Cybernetics)"},{"issue":"6","key":"964_CR121","doi-asserted-by":"crossref","first-page":"566","DOI":"10.1109\/TEVC.2002.804323","volume":"6","author":"CW Ahn","year":"2002","unstructured":"Ahn, C.W., Ramakrishna, R.S.: A genetic algorithm for shortest path routing problem and the sizing of populations. IEEE Trans. Evol. Comput. 6(6), 566\u2013579 (2002)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"964_CR122","unstructured":"Mathew, T.V.: Genetic algorithm. Report submitted at IIT Bombay 53 (2012)"},{"key":"964_CR123","doi-asserted-by":"crossref","unstructured":"Ahmad, F., Isa, N., Osman, M., Hussain, Z.: Performance comparison of gradient descent and genetic algorithm based artificial neural networks training. In: 10th International Conference on Intelligent Systems Design and Applications. pp. 604\u2013609 (2010)","DOI":"10.1109\/ISDA.2010.5687199"},{"key":"964_CR124","doi-asserted-by":"crossref","unstructured":"Noto, M., Sato, H.: A method for the shortest path search by extended dijkstra algorithm. In: Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics.\u2019cybernetics evolving to systems, humans, organizations, and their complex interactions\u2019(cat. no. 0. vol.\u00a03, pp. 2316\u20132320. IEEE (2000)","DOI":"10.1109\/ICSMC.2000.886462"},{"issue":"8\u20139","key":"964_CR125","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1016\/j.ipl.2010.02.001","volume":"110","author":"S Hougardy","year":"2010","unstructured":"Hougardy, S.: The floyd-warshall algorithm on graphs with negative cycles. Inf. Process. Lett. 110(8\u20139), 279\u2013281 (2010)","journal-title":"Inf. Process. Lett."},{"key":"964_CR126","doi-asserted-by":"crossref","unstructured":"Goldberg, D.E.: The genetic algorithm approach: why, how, and what next? In: Adaptive and learning systems: Theory and applications, pp. 247\u2013253. Springer (1986)","DOI":"10.1007\/978-1-4757-1895-9_17"},{"issue":"2","key":"964_CR127","first-page":"416","volume":"1","author":"Y Sharma","year":"2012","unstructured":"Sharma, Y., Saini, S.C., Bhandhari, M.: Comparison of dijkstra\u2019s shortest path algorithm with genetic algorithm for static and dynamic routing network. Int. J. Elect. Comput. Sci. Eng. 1(2), 416\u2013425 (2012)","journal-title":"Int. J. Elect. Comput. Sci. Eng."},{"issue":"11","key":"964_CR128","first-page":"1082","volume":"28","author":"Q Li","year":"2006","unstructured":"Li, Q., Xie, S., Tong, X., Wang, Z.: A self-adaptive genetic algorithm for the shortest path planning of vehicles and its comparison with dijkstra and a* algorithms. Chin. J. Eng. 28(11), 1082\u20131086 (2006)","journal-title":"Chin. J. Eng."},{"issue":"2","key":"964_CR129","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1080\/002075400189473","volume":"38","author":"C Zhao","year":"2000","unstructured":"Zhao, C., Wu, Z.: A genetic algorithm for manufacturing cell formation with multiple routes and multiple objectives. Int. J. Prod. Res. 38(2), 385\u2013395 (2000)","journal-title":"Int. J. Prod. Res."},{"key":"964_CR130","doi-asserted-by":"crossref","unstructured":"Inagaki, J., Haseyama, M., Kitajima, H.: A genetic algorithm for determining multiple routes and its applications. In: 1999 IEEE International Symposium on Circuits and Systems (ISCAS). 6, 137\u2013140. IEEE (1999)","DOI":"10.1109\/ISCAS.1999.780114"},{"issue":"3","key":"964_CR131","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1109\/JSYST.2010.2059212","volume":"4","author":"AY Saber","year":"2010","unstructured":"Saber, A.Y., Venayagamoorthy, G.K.: Efficient utilization of renewable energy sources by gridable vehicles in cyber-physical energy systems. IEEE Syst. J. 4(3), 285\u2013294 (2010)","journal-title":"IEEE Syst. J."},{"key":"964_CR132","doi-asserted-by":"crossref","unstructured":"Zhu, G., Chen, M., Yuan, C., Huang, Y.: Simple and efficient partial graph adversarial attack: A new perspective. In: IEEE Transactions on Knowledge and Data Engineering (2024)","DOI":"10.1109\/TKDE.2024.3364972"},{"key":"964_CR133","doi-asserted-by":"crossref","unstructured":"Lippmann, R.P., Ingols, K.W., et\u00a0al.: An annotated review of past papers on attack graphs (2005)","DOI":"10.21236\/ADA431826"},{"key":"964_CR134","doi-asserted-by":"crossref","unstructured":"Chen, F., Su, J., Zhang, Y.: A scalable approach to full attack graphs generation. In: Engineering Secure Software and Systems: First International Symposium ESSoS 2009, Leuven, Belgium, February 4-6, 2009. Proceedings 1. pp. 150\u2013163. Springer (2009)","DOI":"10.1007\/978-3-642-00199-4_13"},{"key":"964_CR135","doi-asserted-by":"crossref","unstructured":"Ma, J., Chai, K., Xiao, Y., Lan, T., Huang, W.: High-interaction honeypot system for sql injection analysis. In: 2011 International Conference of Information Technology, Computer Engineering and Management Sciences. 3, 274\u2013277. IEEE (2011)","DOI":"10.1109\/ICM.2011.287"},{"key":"964_CR136","doi-asserted-by":"crossref","first-page":"101793","DOI":"10.1016\/j.cose.2020.101793","volume":"95","author":"CL Tan","year":"2020","unstructured":"Tan, C.L., Chiew, K.L., Yong, K.S., Abdullah, J., Sebastian, Y., et al.: A graph-theoretic approach for the detection of phishing webpages. Comput. Secur. 95, 101793 (2020)","journal-title":"Comput. Secur."},{"issue":"4","key":"964_CR137","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1007\/s11416-021-00414-x","volume":"18","author":"F Manavi","year":"2022","unstructured":"Manavi, F., Hamzeh, A.: A novel approach for ransomware detection based on pe header using graph embedding. J. Comput. Virol. Hack. Tech. 18(4), 285\u2013296 (2022)","journal-title":"J. Comput. Virol. Hack. Tech."},{"key":"964_CR138","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4614-9491-1","volume-title":"Distributed denial of service attack and defense","author":"S Yu","year":"2014","unstructured":"Yu, S.: Distributed denial of service attack and defense. Springer, Cham (2014)"},{"key":"964_CR139","unstructured":"Schindler, T.: Anomaly detection in log data using graph databases and machine learning to defend advanced persistent threats. arXiv preprint arXiv:1802.00259 (2018)"},{"key":"964_CR140","doi-asserted-by":"crossref","unstructured":"Presekal, A., \u015etefanov, A., Rajkumar, V.S., Palensky, P.: Attack graph model for cyber-physical power systems using hybrid deep learning. IEEE Trans. Smart Grid 14(5), 4007\u20134020 (2023)","DOI":"10.1109\/TSG.2023.3237011"},{"issue":"9","key":"964_CR141","doi-asserted-by":"crossref","first-page":"3511","DOI":"10.1007\/s10115-023-01860-3","volume":"65","author":"LF Sikos","year":"2023","unstructured":"Sikos, L.F.: Cybersecurity knowledge graphs. Knowl. Inf. Syst. 65(9), 3511\u20133531 (2023)","journal-title":"Knowl. Inf. Syst."},{"key":"964_CR142","unstructured":"Grossklags, J., Christin, N., Chuang, J.: Security investment (failures) in five economic environments: A comparison of homogeneous and heterogeneous user agents. In: WEIS (2008)"},{"issue":"2","key":"964_CR143","first-page":"98","volume":"6","author":"Y Du","year":"2014","unstructured":"Du, Y., Wu, J., Yan, B., Du, J.: Loss heterogeneity, behavior of asset restructuring and the financial value of the companies. Int. J. Econ. Financ. 6(2), 98 (2014)","journal-title":"Int. J. Econ. Financ."},{"key":"964_CR144","doi-asserted-by":"crossref","unstructured":"G\u00e2rleanu, N.B., Panageas, S.: Heterogeneity and asset prices: A different approach. Tech. rep, National Bureau of Economic Research (2020)","DOI":"10.3386\/w26607"},{"key":"964_CR145","doi-asserted-by":"crossref","unstructured":"Bilge, L., Dumitra\u015f, T.: Before we knew it: an empirical study of zero-day attacks in the real world. In: Proceedings of the 2012 ACM conference on Computer and communications security. pp. 833\u2013844 (2012)","DOI":"10.1145\/2382196.2382284"},{"key":"964_CR146","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1016\/j.comcom.2022.11.001","volume":"198","author":"Y Guo","year":"2023","unstructured":"Guo, Y.: A review of machine learning-based zero-day attack detection: Challenges and future directions. Comput. Commun. 198, 175\u2013185 (2023)","journal-title":"Comput. Commun."},{"issue":"10","key":"964_CR147","doi-asserted-by":"publisher","first-page":"2506","DOI":"10.1109\/TIFS.2018.2821095","volume":"13","author":"X Sun","year":"2018","unstructured":"Sun, X., Dai, J., Liu, P., Singhal, A., Yen, J.: Using bayesian networks for probabilistic identification of zero-day attack paths. IEEE Trans. Inf. Forensics Secur. 13(10), 2506\u20132521 (2018). https:\/\/doi.org\/10.1109\/TIFS.2018.2821095","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"964_CR148","doi-asserted-by":"publisher","unstructured":"Sun, X., Dai, J., Liu, P., Singhal, A., Yen, J.: Towards probabilistic identification of zero-day attack paths. In: 2016 IEEE Conference on Communications and Network Security (CNS). pp. 64\u201372 (2016). https:\/\/doi.org\/10.1109\/CNS.2016.7860471","DOI":"10.1109\/CNS.2016.7860471"},{"issue":"2","key":"964_CR149","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/MAHC.2021.3072582","volume":"44","author":"RR Brooks","year":"2021","unstructured":"Brooks, R.R., Yu, L., Ozcelik, I., Oakley, J., Tusing, N.: Distributed denial of service (ddos): a history. IEEE Ann. Hist. Comput. 44(2), 44\u201354 (2021)","journal-title":"IEEE Ann. Hist. Comput."},{"key":"964_CR150","doi-asserted-by":"crossref","first-page":"102938","DOI":"10.1016\/j.cose.2022.102938","volume":"123","author":"C Hankin","year":"2022","unstructured":"Hankin, C., Malacaria, P., et al.: Attack dynamics: an automatic attack graph generation framework based on system topology, capec, cwe, and cve databases. Comput. Secur. 123, 102938 (2022)","journal-title":"Comput. Secur."},{"issue":"2","key":"964_CR151","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1016\/0095-8956(71)90070-0","volume":"10","author":"FS Roberts","year":"1971","unstructured":"Roberts, F.S., Spencer, J.H.: A characterization of clique graphs. J. Comb. Theory, Ser. B 10(2), 102\u2013108 (1971)","journal-title":"J. Comb. Theory, Ser. B"},{"key":"964_CR152","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/TPAMI.1983.4767341","volume":"1","author":"GR Cross","year":"1983","unstructured":"Cross, G.R., Jain, A.K.: Markov random field texture models. IEEE Trans. Pattern Anal. Mach. Intell. 1, 25\u201339 (1983)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00964-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00964-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00964-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T00:17:41Z","timestamp":1739319461000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00964-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,23]]},"references-count":152,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["964"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00964-3","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-4826395\/v1","asserted-by":"object"}]},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,23]]},"assertion":[{"value":"23 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no Conflict of interest as defined by Springer, or other interests that might be perceived to influence the results and\/or discussion reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The authors declare full compliance with ethical standards.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"This paper does not contain any studies involving humans or animals performed by any of the authors.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human or animal rights"}}],"article-number":"50"}}