{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T21:50:41Z","timestamp":1778709041366,"version":"3.51.4"},"reference-count":34,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["NSF-CCF-1331390"],"award-info":[{"award-number":["NSF-CCF-1331390"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["NSF-ECCS-1509420"],"award-info":[{"award-number":["NSF-ECCS-1509420"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["NSF-IIP-1602089"],"award-info":[{"award-number":["NSF-IIP-1602089"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007095","name":"Rockwell Collins through NSF-IUCRC, S2ERC","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100007095","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Syst. Man Cybern, Syst."],"published-print":{"date-parts":[[2020,10]]},"DOI":"10.1109\/tsmc.2019.2915940","type":"journal-article","created":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T19:54:05Z","timestamp":1558554845000},"page":"3488-3498","source":"Crossref","is-referenced-by-count":60,"title":["A2G2V: Automatic Attack Graph Generation and Visualization and Its Applications to Computer and SCADA Networks"],"prefix":"10.1109","volume":"50","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7029-4487","authenticated-orcid":false,"given":"Alaa T.","family":"Al Ghazo","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5683-3317","authenticated-orcid":false,"given":"Mariam","family":"Ibrahim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7101-6120","authenticated-orcid":false,"given":"Hao","family":"Ren","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3974-5790","authenticated-orcid":false,"given":"Ratnesh","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","year":"2018","journal-title":"Siemens common vulnerabilities"},{"key":"ref32","year":"2018","journal-title":"Secure Water Treatment"},{"key":"ref31","first-page":"35","article-title":"The complexity of temporal logic model checking","volume":"4","author":"schnoebelen","year":"2002","journal-title":"Advances in Modal Logic 5"},{"key":"ref30","year":"2016","journal-title":"Open source aadl tool environment for the sae architecture analysis and design language (aadl)"},{"key":"ref34","year":"2018","journal-title":"ICS-CERT"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSC.2014.6819595"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cps.2016.0042"},{"key":"ref12","year":"2004","journal-title":"Architecture Analysis and Design Language"},{"key":"ref13","year":"2016","journal-title":"The Assume Guarantee Reasoning Environment"},{"key":"ref14","author":"gacek","year":"2015","journal-title":"JKind"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2002.1021806"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3215466.3215468"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2014.31"},{"key":"ref18","first-page":"82","article-title":"Transforming graphical system models to graphical attack models","author":"ivanova","year":"2015","journal-title":"International workshop on Graphical Models for Security"},{"key":"ref19","first-page":"50","article-title":"How to generate security cameras: Towards defence generation for socio-technical systems","author":"gadyatskaya","year":"2015","journal-title":"International workshop on Graphical Models for Security"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2010.496"},{"key":"ref4","first-page":"24","article-title":"A generic architecture of the networked critical infrastructure system: GANetCI","author":"liu","year":"2006","journal-title":"Proc 3rd Int Conf Critical Infrastructures (CRIS)"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.39"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlp.2011.05.011"},{"key":"ref6","first-page":"10","article-title":"Survey of information security risk assessment","volume":"25","author":"feng","year":"2004","journal-title":"J China Inst Commun"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848453"},{"key":"ref5","first-page":"344","article-title":"Tools for generating and analyzing attack graphs","author":"sheyner","year":"2003","journal-title":"Proc Second Int l Symp Formal Methods for Components and Objects"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SCORED.2006.4339343"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1504\/IJCIS.2008.017440"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2016.2600405"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004377"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2010.2048028"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2013.51"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2423682"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2016.02.001"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2015.2503399"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2015.2452897"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.6"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/586139.586140"}],"container-title":["IEEE Transactions on Systems, Man, and Cybernetics: Systems"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/6221021\/9198254\/8720257-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221021\/9198254\/08720257.pdf?arnumber=8720257","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T17:20:34Z","timestamp":1651080034000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8720257\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10]]},"references-count":34,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/tsmc.2019.2915940","relation":{},"ISSN":["2168-2216","2168-2232"],"issn-type":[{"value":"2168-2216","type":"print"},{"value":"2168-2232","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10]]}}}