{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T05:58:10Z","timestamp":1767333490961,"version":"3.48.0"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T00:00:00Z","timestamp":1759708800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T00:00:00Z","timestamp":1759708800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,6]]},"DOI":"10.1109\/milcom64451.2025.11310767","type":"proceedings-article","created":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T18:35:33Z","timestamp":1767292533000},"page":"7-11","source":"Crossref","is-referenced-by-count":0,"title":["Security Risk Mitigation with Bayesian Attack Graphs is Weakly NP-Hard"],"prefix":"10.1109","author":[{"given":"Swapnoneel","family":"Roy","sequence":"first","affiliation":[{"name":"University of North Florida,School of Computing,Jacksonville,FL,USA"}]},{"given":"Prithviraj","family":"Dasgupta","sequence":"additional","affiliation":[{"name":"U.S. Naval Research Laboratory,Information Technology Division,Washington DC,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.34"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2014.07.001"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511803161"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1117\/12.604240"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2008.88"},{"issue":"1","key":"ref6","first-page":"135","article-title":"Measuring security risk of networks using attack graphs","volume":"1","author":"Noel","year":"2010","journal-title":"International Journal of Next-Generation Computing"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-24230-9_9"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CATCH.2009.19"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1456362.1456368"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70567-3_22"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1151454.1151493"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586140"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2025.104439"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.23919\/ACC60939.2024.10644873"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3434748"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3719658"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2025.111027"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-96-4506-0_4"}],"event":{"name":"MILCOM 2025 - 2025 IEEE Military Communications Conference (MILCOM)","start":{"date-parts":[[2025,10,6]]},"location":"Los Angeles, CA, USA","end":{"date-parts":[[2025,10,10]]}},"container-title":["MILCOM 2025 - 2025 IEEE Military Communications Conference (MILCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11309822\/11309347\/11310767.pdf?arnumber=11310767","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T05:56:34Z","timestamp":1767333394000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11310767\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,6]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/milcom64451.2025.11310767","relation":{},"subject":[],"published":{"date-parts":[[2025,10,6]]}}}