{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T15:31:12Z","timestamp":1762097472917,"version":"build-2065373602"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,22]],"date-time":"2023-11-22T00:00:00Z","timestamp":1700611200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,22]],"date-time":"2023-11-22T00:00:00Z","timestamp":1700611200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["72101221"],"award-info":[{"award-number":["72101221"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,22]]},"DOI":"10.1109\/icsrs59833.2023.10381005","type":"proceedings-article","created":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T19:33:05Z","timestamp":1704742385000},"page":"558-564","source":"Crossref","is-referenced-by-count":2,"title":["Study on the Application of Graph Theory Algorithms and Attack Graphs in Cybersecurity Assessment"],"prefix":"10.1109","author":[{"given":"Jinghan","family":"Zhang","sequence":"first","affiliation":[{"name":"City University of Hong Kong,Department of Mechanical Engineering,Hong Kong,China"}]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[{"name":"City University of Hong Kong,Department of Mechanical Engineering,Hong Kong,China"}]},{"given":"Enrico","family":"Zio","sequence":"additional","affiliation":[{"name":"Politecnico di Milano,Department of Energy,Milano,Italy"}]}],"member":"263","reference":[{"volume-title":"The Global Risks Report 2022","year":"2022","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3850\/978-981-14-8593-0_5058-cd"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4073158"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s007660200016"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s13314-011-0015-9"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.21236\/ada387544"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/366173.366183"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2004.10.011"},{"key":"ref9","article-title":"Quantitative Assessment of Operational SecurityModels and Tools","volume-title":"Technical Report Research Report 96493","author":"Dacier","year":"1996"},{"key":"ref10","first-page":"71","article-title":"Phillips and Swiler are the first to put forward the concept of attack graph [Phillips C, Swiler L P. A graph-based system for network-vulnerability analysis","volume-title":"Proceedings of the 1998 workshop on New security paradigms","year":"1998"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848453"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/secpri.2002.1004377"},{"key":"ref13","first-page":"AAI3126929","volume-title":"Scenario graphs and attack graphs","author":"Sheyner","year":"2004"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586140"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.6"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2006.302434"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.39"},{"key":"ref18","first-page":"113","article-title":"MulVal: a logic-based network security analyzer","volume-title":"the 14th USENIX Security Symposium","author":"Ou","year":"2005"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180446"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2002.1021806"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/11856214_7"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1052934.1052938"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2004.1286496"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/11427995_10"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2008.88"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1456362.1456368"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.34"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2017.09.001"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.21236\/ADA431826"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2019.100219"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02206-5"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2002.1021806"},{"journal-title":"Using dijkstra algorithm in calculating alternative shortest paths for public transportation with transfers and walking","year":"2014","author":"Al-Tameemi","key":"ref33"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2000.886462"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(99)00071-X"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-69514-9_11"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2926441"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC55051.2022.9911122"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CPRE.2017.8090056"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-82e2008"}],"event":{"name":"2023 7th International Conference on System Reliability and Safety (ICSRS)","start":{"date-parts":[[2023,11,22]]},"location":"Bologna, Italy","end":{"date-parts":[[2023,11,24]]}},"container-title":["2023 7th International Conference on System Reliability and Safety (ICSRS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10380806\/10380972\/10381005.pdf?arnumber=10381005","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T05:23:16Z","timestamp":1706073796000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10381005\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,22]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/icsrs59833.2023.10381005","relation":{},"subject":[],"published":{"date-parts":[[2023,11,22]]}}}