{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T12:40:05Z","timestamp":1756471205888,"version":"3.44.0"},"reference-count":115,"publisher":"Association for Computing Machinery (ACM)","issue":"3","funder":[{"DOI":"10.13039\/100006976","name":"Lilly Endowment","doi-asserted-by":"crossref","award":["AnalytixIN"],"award-info":[{"award-number":["AnalytixIN"]}],"id":[{"id":"10.13039\/100006976","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Enhanced Mentoring Program with Opportunities for Ways to Excel in Research"},{"name":"1st Year Research Immersion Program"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Priv. Secur."],"published-print":{"date-parts":[[2025,8,31]]},"abstract":"<jats:p>Interdependent systems, with multiple interconnected assets, face escalating cybersecurity threats from external attackers. This article explores security decision-making, operating on complex interdependent systems and proposes a security resource allocation methodology to enhance their proactive security. Using attack graphs, we model vulnerabilities and propose different defense mechanisms integrating different network analysis algorithms, including degree, betweenness, and harmonic centralities, TrustRank, and Katz centrality. We introduce Average Based Node Ranking (ABNR) to average ranks from these methods. The resource allocation methods leverage four different graph-theoretic methods. Each ranking algorithm is combined with these four allocation techniques. Our methods show low sensitivity to simultaneous attacks on interdependent systems. We validate our framework using 11 attack graphs representing real-world systems, measuring security improvements against four well-known allocation algorithms: behavioral decision-making, defense-in-depth, risk-based defense, and min-cut. Our framework outperformed the baselines in most cases, with superior outcomes confirmed by the Friedman statistical test. We show that the main components in our framework have low-time overhead. We also evaluate our framework against multi-stage attacks and cascading failures Our framework enhances security decision-making across different scenarios, including top-1 and all attack paths for different attacks. We release the implementation of our resource allocation methodology to the research community<\/jats:p>","DOI":"10.1145\/3736760","type":"journal-article","created":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T07:27:37Z","timestamp":1747985257000},"page":"1-44","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["CBDRA-IS: Centrality-Based Defense Resource Allocation for Securing Interdependent Systems"],"prefix":"10.1145","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3924-0979","authenticated-orcid":false,"given":"Mohammad","family":"Aleiadeh","sequence":"first","affiliation":[{"name":"Electrical and Computer Engineering, Purdue University","place":["Indianapolis, United States"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9554-9260","authenticated-orcid":false,"given":"Mustafa","family":"Abdallah","sequence":"additional","affiliation":[{"name":"Computer and Information Technology, Purdue University","place":["Indianapolis, United States"]}]}],"member":"320","published-online":{"date-parts":[[2025,8,29]]},"reference":[{"issue":"4","key":"e_1_3_2_2_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2382438.2382441","article-title":"Detecting fake medical web sites using recursive trust labeling","volume":"30","author":"Abbasi Ahmed","year":"2012","unstructured":"Ahmed Abbasi, Fatemeh \u201cMariam\u201d Zahedi, and Siddharth Kaza. 2012. Detecting fake medical web sites using recursive trust labeling. ACM Transactions on Information Systems (TOIS) 30, 4 (2012), 1\u201336.","journal-title":"ACM Transactions on Information Systems (TOIS)"},{"issue":"4","key":"e_1_3_2_3_2","doi-asserted-by":"crossref","first-page":"1585","DOI":"10.1109\/TCNS.2020.2988007","article-title":"Behavioral and game-theoretic security investments in interdependent systems modeled by attack graphs","volume":"7","author":"Abdallah M.","year":"2020","unstructured":"M. Abdallah, P. Naghizadeh, A. R. Hota, T. Cason, S. Bagchi, and S. Sundaram. 2020. Behavioral and game-theoretic security investments in interdependent systems modeled by attack graphs. IEEE Transactions on Control of Network Systems 7, 4 (2020), 1585\u20131596.","journal-title":"IEEE Transactions on Control of Network Systems"},{"key":"e_1_3_2_4_2","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1145\/3433210.3437534","volume-title":"Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security","author":"Abdallah M.","year":"2021","unstructured":"M. Abdallah, D. Woods, P. Naghizadeh, I. Khalil, T. Cason, S. Sundaram, and S. Bagchi. 2021. Morshed: Guiding behavioral decision-makers towards better security investment in interdependent systems. In Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security. 378\u2013392."},{"key":"e_1_3_2_5_2","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1109\/SP46214.2022.9833591","volume-title":"Proceedings of the 2022 IEEE Symposium on Security and Privacy (SP\u201922)","author":"Abdallah Mustafa","year":"2022","unstructured":"Mustafa Abdallah, Daniel Woods, Parinaz Naghizadeh, Issa Khalil, Timothy Cason, Shreyas Sundaram, and Saurabh Bagchi. 2022. Tasharok: Using mechanism design for enhancing security resource allocation in interdependent systems. In Proceedings of the 2022 IEEE Symposium on Security and Privacy (SP\u201922). IEEE, 249\u2013266."},{"issue":"10","key":"e_1_3_2_6_2","doi-asserted-by":"crossref","first-page":"1659","DOI":"10.1287\/mnsc.1070.0711","article-title":"Loss aversion under prospect theory: A parameter-free measurement","volume":"53","author":"Abdellaoui Mohammed","year":"2007","unstructured":"Mohammed Abdellaoui, Han Bleichrodt, and Corina Paraschiv. 2007. Loss aversion under prospect theory: A parameter-free measurement. Management Science 53, 10 (2007), 1659\u20131674.","journal-title":"Management Science"},{"key":"e_1_3_2_7_2","doi-asserted-by":"crossref","first-page":"104883","DOI":"10.1016\/j.cor.2019.104883","article-title":"Modeling interdependencies in infrastructure systems using multi-layered network flows","volume":"117","author":"Ahangar Negin Enayaty","year":"2020","unstructured":"Negin Enayaty Ahangar, Kelly M. Sullivan, and Sarah G. Nurre. 2020. Modeling interdependencies in infrastructure systems using multi-layered network flows. Computers & Operations Research 117 (2020), 104883.","journal-title":"Computers & Operations Research"},{"key":"e_1_3_2_8_2","first-page":"604","volume-title":"Proceedings of the 10th International Conference on Intelligent Systems Design and Applications","author":"Ahmad F.","year":"2010","unstructured":"F. Ahmad, N. Isa, M. Osman, and Z. Hussain. 2010. Performance comparison of gradient descent and genetic algorithm based artificial neural networks training. In Proceedings of the 10th International Conference on Intelligent Systems Design and Applications. 604\u2013609."},{"issue":"6","key":"e_1_3_2_9_2","doi-asserted-by":"crossref","first-page":"566","DOI":"10.1109\/TEVC.2002.804323","article-title":"A genetic algorithm for shortest path routing problem and the sizing of populations","volume":"6","author":"Ahn Chang Wook","year":"2002","unstructured":"Chang Wook Ahn and Rudrapatna S. Ramakrishna. 2002. A genetic algorithm for shortest path routing problem and the sizing of populations. IEEE Transactions on Evolutionary Computation 6, 6 (2002), 566\u2013579.","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","unstructured":"Akwetey Henry Matey Paul Danquah and Godfred Yaw Koi-Akrofi. 2022. Predicting cyber-attack using cyber situational awareness: The case of independent power producers (IPPs). International Journal of Advanced Computer Science and Applications 13 1 (2022). DOI:10.14569\/IJACSA.2022.0130181","DOI":"10.14569\/IJACSA.2022.0130181"},{"issue":"4","key":"e_1_3_2_11_2","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1504\/IJCSM.2024.139088","article-title":"An improved binary Crow-JAYA optimisation system with various evolution operators, such as mutation for finding the max clique in the dens graph","volume":"19","author":"Al-Batah Mohammad","year":"2024","unstructured":"Mohammad Al-Batah and Mohammad Ryiad Al-Eiadeh. 2024. An improved binary Crow-JAYA optimisation system with various evolution operators, such as mutation for finding the max clique in the dens graph. International Journal of Computing Science and Mathematics 19, 4 (2024), 327\u2013338.","journal-title":"International Journal of Computing Science and Mathematics"},{"key":"e_1_3_2_12_2","doi-asserted-by":"crossref","first-page":"103927","DOI":"10.1016\/j.cose.2024.103927","article-title":"GeniGraph: A genetic-based novel security defense resource allocation method for interdependent systems modeled by attack graphs","author":"Al-Eiadeh M. R.","year":"2024","unstructured":"M. R. Al-Eiadeh and M. Abdallah. 2024. GeniGraph: A genetic-based novel security defense resource allocation method for interdependent systems modeled by attack graphs. Computers & Security 144 (2024), 103927.","journal-title":"Computers & Security"},{"key":"e_1_3_2_13_2","doi-asserted-by":"crossref","first-page":"44350","DOI":"10.1109\/ACCESS.2023.3272053","article-title":"A review on attack graph analysis for IoT vulnerability assessment: Challenges, open issues, and future directions","volume":"11","author":"Almazrouei O.","year":"2023","unstructured":"O. Almazrouei, P. Magalingam, M. Hasan, and M. Shanmugam. 2023. A review on attack graph analysis for IoT vulnerability assessment: Challenges, open issues, and future directions. IEEE Access 11, May (2023), 44350\u201344376.","journal-title":"IEEE Access"},{"issue":"1","key":"e_1_3_2_14_2","doi-asserted-by":"crossref","DOI":"10.1016\/j.patter.2020.100003","article-title":"Interdependent networks: A data science perspective","volume":"1","author":"Amini M.","year":"2020","unstructured":"M. Amini, A. Imteaj, and P. Pardalos. 2020. Interdependent networks: A data science perspective. Patterns 1, 1 (2020).","journal-title":"Patterns"},{"key":"e_1_3_2_15_2","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1145\/2420950.2420971","volume-title":"Proceedings of the 28th Annual Computer Security Applications Conference","author":"Anderson R.","year":"2012","unstructured":"R. Anderson. 2012. Security economics: A personal perspective. In Proceedings of the 28th Annual Computer Security Applications Conference. ACM, 139\u2013144."},{"key":"e_1_3_2_16_2","doi-asserted-by":"crossref","first-page":"419","DOI":"10.15439\/2015F178","volume-title":"Proceedings of the 2015 Federated Conference on Computer Science and Information Systems","author":"Angelova M.","year":"2015","unstructured":"M. Angelova, O. Roeva, and T. Pencheva. 2015. InterCriteria analysis of crossover and mutation rates relations in simple genetic algorithm. In Proceedings of the 2015 Federated Conference on Computer Science and Information Systems. IEEE, 419\u2013424."},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","unstructured":"Md. Reya Shad Azim Timothy Cason and Mustafa Abdallah. 2024. A quantal response analysis of human decision-making in interdependent security games modeled by attack graphs. IEEE Access 12 (2024) 56159\u201356178. DOI:10.1109\/ACCESS.2024.3391305","DOI":"10.1109\/ACCESS.2024.3391305"},{"issue":"1","key":"e_1_3_2_18_2","doi-asserted-by":"crossref","first-page":"1118","DOI":"10.1038\/s41467-022-28432-3","article-title":"In-degree centrality in a social network is linked to coordinated neural activity","volume":"13","author":"Baek Elisa C.","year":"2022","unstructured":"Elisa C. Baek, Ryan Hyon, Karina L\u00f3pez, Emily S. Finn, Mason A. Porter, and Carolyn Parkinson. 2022. In-degree centrality in a social network is linked to coordinated neural activity. Nature Communications 13, 1 (2022), 1118.","journal-title":"Nature Communications"},{"key":"e_1_3_2_19_2","first-page":"102","volume-title":"Proceedings of the International Conference on Complex Networks and Their Applications","author":"Boldi P.","year":"2023","unstructured":"P. Boldi, D. D\u2019Ascenzo, F. Furia, and S. Vigna. 2023. Score and rank semi-monotonicity for closeness, betweenness and harmonic centrality. In Proceedings of the International Conference on Complex Networks and Their Applications. Springer, 102\u2013113."},{"key":"e_1_3_2_20_2","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1145\/1035429.1035434","volume-title":"Proceedings of the 2003 ACM Workshop on Formal Methods in Security Engineering","author":"Braynov Sviatoslav","year":"2003","unstructured":"Sviatoslav Braynov and Murtuza Jadliwala. 2003. Representation and analysis of coordinated attacks. In Proceedings of the 2003 ACM Workshop on Formal Methods in Security Engineering. 43\u201351."},{"issue":"1","key":"e_1_3_2_21_2","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/S0169-7552(98)00110-X","article-title":"The anatomy of a large-scale hypertextual web search engine","volume":"30","author":"Brin Sergey","year":"1998","unstructured":"Sergey Brin and Lawrence Page. 1998. The anatomy of a large-scale hypertextual web search engine. Computer Networks and ISDN Systems 30, 1\u20137 (1998), 107\u2013117.","journal-title":"Computer Networks and ISDN Systems"},{"key":"e_1_3_2_22_2","unstructured":"Piotr Br\u00f3dka and Przemys\u0142aw Kazienko. 2012. Multi-layered social networks. Retrieved from https:\/\/arxiv.org\/abs\/1212.2425"},{"issue":"287","key":"e_1_3_2_23_2","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1111\/j.0013-0427.2005.00421.x","article-title":"Are people inequality-averse, or just risk-averse?","volume":"72","author":"Carlsson Fredrik","year":"2005","unstructured":"Fredrik Carlsson, Dinky Daruvala, and Olof Johansson-Stenman. 2005. Are people inequality-averse, or just risk-averse? Economica 72, 287 (2005), 375\u2013396.","journal-title":"Economica"},{"key":"e_1_3_2_24_2","first-page":"1268","volume-title":"Proceedings of the 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom\u201920)","author":"Chamotra Saurabh","year":"2020","unstructured":"Saurabh Chamotra and Ferdous Ahmed Barbhuiya. 2020. Analysis and modelling of multi-stage attacks. In Proceedings of the 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom\u201920). IEEE, 1268\u20131275."},{"key":"e_1_3_2_25_2","unstructured":"John C. Checco. 2022. Cyber-physical coordinated attacks: The emerging complexity of crisis management. The Cyber Defense Review 7 4 (2022)."},{"key":"e_1_3_2_26_2","volume-title":"Network Graph Analysis and Visualization with Gephi","author":"Cherven Ken","year":"2013","unstructured":"Ken Cherven. 2013. Network Graph Analysis and Visualization with Gephi. Vol. 24. Packt Publishing Birmingham."},{"issue":"2","key":"e_1_3_2_27_2","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1145\/358923.358929","article-title":"An updated survey of GA-based multiobjective optimization techniques","volume":"32","author":"Coello Carlos A.","year":"2000","unstructured":"Carlos A. Coello. 2000. An updated survey of GA-based multiobjective optimization techniques. ACM Computing Surveys (CSUR) 32, 2 (2000), 109\u2013143.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"e_1_3_2_28_2","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1007\/978-3-540-75563-0_26","volume-title":"Conceptual Modeling-ER 2007: Proceedings of the 26th International Conference on Conceptual Modeling","author":"Elahi Golnaz","year":"2007","unstructured":"Golnaz Elahi and Eric Yu. 2007. A goal oriented approach for modeling and analyzing security trade-offs. In Conceptual Modeling-ER 2007: Proceedings of the 26th International Conference on Conceptual Modeling. Springer, 375\u2013390."},{"key":"e_1_3_2_29_2","first-page":"1","volume-title":"Proceedings of the 2016 New Security Paradigms Workshop","author":"Fioravanti Mark E.","year":"2016","unstructured":"Mark E. Fioravanti, Matt Bishop, and Richard Ford. 2016. I\u2019m not sure if we\u2019re okay: Uncertainty for attackers and defenders. In Proceedings of the 2016 New Security Paradigms Workshop. 1\u201310."},{"key":"e_1_3_2_30_2","volume-title":"Proceedings of the 9th Nordic Workshop on Secure IT Systems Encouraging Cooperation","author":"Garcia J.","year":"2004","unstructured":"J. Garcia, F. Autrel, J. Borrell, Y. Bouzida, S. Castillo, F. Cuppens, and G. Navarro. 2004. Preventing coordinated attacks via alert correlation. In Proceedings of the 9th Nordic Workshop on Secure IT Systems Encouraging Cooperation."},{"key":"e_1_3_2_31_2","first-page":"2505","volume-title":"Proceedings of the 28th Annual ACM-SIAM Symposium on Discrete Algorithms","author":"Ghaffari Mohsen","year":"2017","unstructured":"Mohsen Ghaffari and Hsin-Hao Su. 2017. Distributed degree splitting, edge coloring, and orientations. In Proceedings of the 28th Annual ACM-SIAM Symposium on Discrete Algorithms. SIAM, 2505\u20132523."},{"key":"e_1_3_2_32_2","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/978-1-4757-1895-9_17","volume-title":"Adaptive and Learning Systems: Theory and Applications","author":"Goldberg David E.","year":"1986","unstructured":"David E. Goldberg. 1986. The genetic algorithm approach: Why, how, and what next? In Adaptive and Learning Systems: Theory and Applications, Kumpati S. Narendra (Ed.). Springer, 247\u2013253."},{"key":"e_1_3_2_33_2","first-page":"69","volume-title":"Foundations of Genetic Algorithms","author":"Goldberg David E.","year":"1991","unstructured":"David E. Goldberg and Kalyanmoy Deb. 1991. A comparative analysis of selection schemes used in genetic algorithms. In Foundations of Genetic Algorithms, Gregory J. E. Rawlins (Ed.). Vol. 1, Elsevier, 69\u201393."},{"key":"e_1_3_2_34_2","doi-asserted-by":"crossref","unstructured":"Oded Goldreich Arnold L. Rosenberg and Alan L. Selman. 2006. Theoretical computer science: Essays in memory of Shimon Even. Springer.","DOI":"10.1007\/11685654"},{"issue":"400","key":"e_1_3_2_35_2","first-page":"900","article-title":"Optimal population size and the genetic algorithm","volume":"100","author":"Gotshall S.","year":"2002","unstructured":"S. Gotshall and B. Rylander. 2002. Optimal population size and the genetic algorithm. Population 100, 400 (2002), 900.","journal-title":"Population"},{"key":"e_1_3_2_36_2","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1016\/j.rser.2017.05.206","article-title":"A critical review of cascading failure analysis and modeling of power system","volume":"80","author":"Guo Hengdao","year":"2017","unstructured":"Hengdao Guo, Ciyan Zheng, Herbert Ho-Ching Iu, and Tyrone Fernando. 2017. A critical review of cascading failure analysis and modeling of power system. Renewable and Sustainable Energy Reviews 80 (2017), 9\u201322.","journal-title":"Renewable and Sustainable Energy Reviews"},{"issue":"3","key":"e_1_3_2_37_2","first-page":"165","article-title":"Time constraint influence maximization algorithm in the age of big data","volume":"15","author":"Han Meng","year":"2017","unstructured":"Meng Han, Zhuojun Duan, Chunyu Ai, Forrest Wong Lybarger, Yingshu Li, and Anu G. Bourgeois. 2017. Time constraint influence maximization algorithm in the age of big data. International Journal of Computational Science and Engineering 15, 3\u20134 (2017), 165\u2013175.","journal-title":"International Journal of Computational Science and Engineering"},{"key":"e_1_3_2_38_2","doi-asserted-by":"crossref","first-page":"102938","DOI":"10.1016\/j.cose.2022.102938","article-title":"Attack dynamics: An automatic attack graph generation framework based on system topology, CAPEC, CWE, and CVE databases","volume":"123","year":"2022","unstructured":"Ferda Ozdemir Sonmez, Chris Hankin, and Pasquale Malacaria. 2022. Attack dynamics: An automatic attack graph generation framework based on system topology, CAPEC, CWE, and CVE databases. Computers & Security 123 (2022), 102938.","journal-title":"Computers & Security"},{"issue":"1","key":"e_1_3_2_39_2","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1038\/scientificamerican0792-66","article-title":"Genetic algorithms","volume":"267","author":"Holland John H.","year":"1992","unstructured":"John H. Holland. 1992. Genetic algorithms. Scientific American 267, 1 (1992), 66\u201373.","journal-title":"Scientific American"},{"issue":"1","key":"e_1_3_2_40_2","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1145\/3041027.3041033","article-title":"Toward a taxonomy and attacker model for secure routing protocols","volume":"47","author":"Hollick M.","year":"2017","unstructured":"M. Hollick, C. Nita-Rotaru, P. Papadimitratos, A. Perrig, and S. Schmid. 2017. Toward a taxonomy and attacker model for secure routing protocols. ACM SIGCOMM Computer Communication Review 47, 1 (2017), 43\u201348.","journal-title":"ACM SIGCOMM Computer Communication Review"},{"issue":"4","key":"e_1_3_2_41_2","doi-asserted-by":"crossref","first-page":"561","DOI":"10.3233\/JCS-130475","article-title":"Aggregating vulnerability metrics in enterprise networks using attack graphs","volume":"21","author":"Homer J.","year":"2013","unstructured":"J. Homer, S. Zhang, X. Ou, D. Schmidt, Y. Du, S. R. Rajagopalan, and A. Singhal. 2013. Aggregating vulnerability metrics in enterprise networks using attack graphs. Journal of Computer Security 21, 4 (2013), 561\u2013597.","journal-title":"Journal of Computer Security"},{"key":"e_1_3_2_42_2","first-page":"101","volume-title":"Proceedings of the International Conference on Decision and Game Theory for Security","author":"Hota A. R.","year":"2016","unstructured":"A. R. Hota, A. Clements, S. Sundaram, and S. Bagchi. 2016. Optimal and game-theoretic deployment of security investments in interdependent assets. In Proceedings of the International Conference on Decision and Game Theory for Security. 101\u2013113."},{"issue":"1","key":"e_1_3_2_43_2","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1109\/TCNS.2016.2600484","article-title":"Interdependent security games on networks under behavioral probability weighting","volume":"5","author":"Hota A. R.","year":"2018","unstructured":"A. R. Hota and S. Sundaram. 2018. Interdependent security games on networks under behavioral probability weighting. IEEE Transactions on Control of Network Systems 5, 1 (March2018), 262\u2013273.","journal-title":"IEEE Transactions on Control of Network Systems"},{"issue":"8","key":"e_1_3_2_44_2","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1016\/j.ipl.2010.02.001","article-title":"The Floyd\u2013Warshall algorithm on graphs with negative cycles","volume":"110","author":"Hougardy Stefan","year":"2010","unstructured":"Stefan Hougardy. 2010. The Floyd\u2013Warshall algorithm on graphs with negative cycles. Information Processing Letters 110, 8\u20139 (2010), 279\u2013281.","journal-title":"Information Processing Letters"},{"key":"e_1_3_2_45_2","first-page":"271","volume-title":"Proceedings of the International Workshop on Recent Advances in Intrusion Detection","author":"Howard G.","year":"2008","unstructured":"G. Howard, S. Bagchi, and G. Lebanon. 2008. Determining placement of intrusion detectors for a distributed application through Bayesian network modeling. In Proceedings of the International Workshop on Recent Advances in Intrusion Detection. 271\u2013290."},{"key":"e_1_3_2_46_2","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1145\/3447548.3467300","volume-title":"Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining","author":"Huang Zexi","year":"2021","unstructured":"Zexi Huang, Arlei Silva, and Ambuj Singh. 2021. A broader picture of random-walk based graph embedding. In Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining. 685\u2013695."},{"key":"e_1_3_2_47_2","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1109\/ISCAS.1999.780114","volume-title":"Proceedings of the 1999 IEEE International Symposium on Circuits and Systems (ISCAS\u201999)","volume":"6","author":"Inagaki Jun","year":"1999","unstructured":"Jun Inagaki, Miki Haseyama, and Hideo Kitajima. 1999. A genetic algorithm for determining multiple routes and its applications. In Proceedings of the 1999 IEEE International Symposium on Circuits and Systems (ISCAS\u201999), Vol. 6. IEEE, 137\u2013140."},{"key":"e_1_3_2_48_2","first-page":"319","volume-title":"Proceedings of the 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC)","author":"Jauhar S.","year":"2015","unstructured":"S. Jauhar, B. Chen, W. G. Temple, X. Dong, Z. Kalbarczyk, W. H. Sanders, and D. M. Nicol. 2015. Model-based cybersecurity assessment with nescor smart grid failure scenarios. In Proceedings of the 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, 319\u2013324."},{"key":"e_1_3_2_49_2","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1142\/9789814417358_0006","volume-title":"Handbook of the Fundamentals of Financial Decision Making: Part I","author":"Kahneman Daniel","year":"2013","unstructured":"Daniel Kahneman and Amos Tversky. 2013. Prospect theory: An analysis of decision under risk. In Handbook of the Fundamentals of Financial Decision Making: Part I, Leonard C. MacLean and William T. Ziemba (Eds.). World Scientific, 99\u2013127."},{"key":"e_1_3_2_50_2","first-page":"1","volume-title":"Proceedings of the 7th Annual Workshop on Cyber Security and Information Intelligence Research","author":"Katipally Rajeshwar","year":"2011","unstructured":"Rajeshwar Katipally, Li Yang, and Anyi Liu. 2011. Attacker behavior analysis in multi-stage attack detection system. In Proceedings of the 7th Annual Workshop on Cyber Security and Information Intelligence Research. 1\u20131."},{"key":"e_1_3_2_51_2","first-page":"3685","volume-title":"Proceedings of the 2021 IEEE International Conference on Big Data (Big Data\u201921)","author":"Kay Bill","year":"2021","unstructured":"Bill Kay, Hao Lu, Pravallika Devineni, Anika Tabassum, Supriya Chintavali, and Sangkeun Matt Lee. 2021. Identification of critical infrastructure via pagerank. In Proceedings of the 2021 IEEE International Conference on Big Data (Big Data\u201921). IEEE, 3685\u20133690."},{"key":"e_1_3_2_52_2","unstructured":"Angelos D. Keromytis. 2010. A look at VoIP vulnerabilities. ; Login: The Magazine of USENIX & SAGE 35 1 (2010) 41\u201350."},{"issue":"3","key":"e_1_3_2_53_2","doi-asserted-by":"crossref","first-page":"894","DOI":"10.1016\/j.ejor.2019.04.035","article-title":"Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs","volume":"278","author":"Khouzani M. H. R.","year":"2019","unstructured":"M. H. R. Khouzani, Zhengliang Liu, and Pasquale Malacaria. 2019. Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs. European Journal of Operational Research 278, 3 (2019), 894\u2013903.","journal-title":"European Journal of Operational Research"},{"key":"e_1_3_2_54_2","volume-title":"Practical Statistics: A Quick and Easy Guide to IBM\u00ae SPSS\u00ae Statistics, STATA, and Other Statistical Software","author":"Kremelberg David","year":"2010","unstructured":"David Kremelberg. 2010. Practical Statistics: A Quick and Easy Guide to IBM\u00ae SPSS\u00ae Statistics, STATA, and Other Statistical Software. SAGE Publications."},{"key":"e_1_3_2_55_2","first-page":"37","volume-title":"AIRWeb","author":"Krishnan V.","year":"2006","unstructured":"V. Krishnan and R. Raj. 2006. Web spam detection with anti-trust rank.. In AIRWeb, Vol. 6. Seattle, WA, 37\u201340."},{"issue":"2","key":"e_1_3_2_56_2","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1145\/2635673","article-title":"A survey of interdependent information security games","volume":"47","author":"Laszka A.","year":"2015","unstructured":"A. Laszka, M. Felegyhazi, and L. Buttyan. 2015. A survey of interdependent information security games. ACM Computing Surveys (CSUR) 47, 2 (2015), 23.","journal-title":"ACM Computing Surveys (CSUR)"},{"issue":"11","key":"e_1_3_2_57_2","first-page":"1082","article-title":"A self-adaptive genetic algorithm for the shortest path planning of vehicles and its comparison with Dijkstra and A* algorithms","volume":"28","author":"Li Q.","year":"2006","unstructured":"Q. Li, S. Xie, X. Tong, and Z. Wang. 2006. A self-adaptive genetic algorithm for the shortest path planning of vehicles and its comparison with Dijkstra and A* algorithms. Chinese Journal of Engineering 28, 11 (2006), 1082\u20131086.","journal-title":"Chinese Journal of Engineering"},{"key":"e_1_3_2_58_2","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-023-01255-5"},{"key":"e_1_3_2_59_2","first-page":"1","volume-title":"Proceedings of the IEEE Military Communications Conference","author":"Lippmann R.","year":"2006","unstructured":"R. Lippmann, K. Ingols, C. Scott, K. Piwowarski, K. Kratkiewicz, M. Artz, and R. Cunningham. 2006. Validating and restoring defense in depth using attack graphs. In Proceedings of the IEEE Military Communications Conference. IEEE, 1\u201310."},{"key":"e_1_3_2_60_2","unstructured":"Haoxiang Ma Shuo Han Nandi Leslie Charles Kamhoua and Jie Fu. 2023. Optimal decoy resource allocation for proactive defense in probabilistic attack graphs. Retrieved from https:\/\/arxiv.org\/abs\/2301.01336"},{"key":"e_1_3_2_61_2","first-page":"1","volume-title":"Proceedings of the 2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA\u201914)","year":"2014","unstructured":"Warih Maharani, Adiwijaya, and Alfian Akbar Gozali. 2014. Degree centrality and eigenvector centrality in Twitter. In Proceedings of the 2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA\u201914). IEEE, 1\u20135."},{"issue":"3","key":"e_1_3_2_62_2","doi-asserted-by":"crossref","first-page":"539","DOI":"10.1016\/S0378-4371(00)00311-3","article-title":"Harmony in the small-world","volume":"285","author":"Marchiori Massimo","year":"2000","unstructured":"Massimo Marchiori and Vito Latora. 2000. Harmony in the small-world. Physica A: Statistical Mechanics and its Applications 285, 3\u20134 (2000), 539\u2013546.","journal-title":"Physica A: Statistical Mechanics and its Applications"},{"issue":"1","key":"e_1_3_2_63_2","doi-asserted-by":"crossref","first-page":"71","DOI":"10.3200\/JMBR.40.1.71-80","article-title":"Implicit motor learning and complex decision making in time-constrained environments","volume":"40","author":"Masters R. S. W.","year":"2008","unstructured":"R. S. W. Masters, Jamie M. Poolton, Jon P. Maxwell, and Markus Raab. 2008. Implicit motor learning and complex decision making in time-constrained environments. Journal of Motor Behavior 40, 1 (2008), 71\u201379.","journal-title":"Journal of Motor Behavior"},{"issue":"6","key":"e_1_3_2_64_2","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1109\/MSP.2006.145","article-title":"Common vulnerability scoring system","volume":"4","author":"Mell P.","year":"2006","unstructured":"P. Mell, K. Scarfone, and S. Romanosky. 2006. Common vulnerability scoring system. IEEE Security & Privacy 4, 6 (2006), 85\u201389.","journal-title":"IEEE Security & Privacy"},{"key":"e_1_3_2_65_2","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/978-3-319-93025-1_4","article-title":"Genetic algorithm","author":"Mirjalili Seyedali","year":"2019","unstructured":"Seyedali Mirjalili and Seyedali Mirjalili. 2019. Genetic algorithm. Evolutionary Algorithms and Neural Networks: Theory and Applications (2019), 43\u201355.","journal-title":"Evolutionary Algorithms and Neural Networks: Theory and Applications"},{"key":"e_1_3_2_66_2","article-title":"When will a genetic algorithm outperform hill climbing","author":"Mitchell Melanie","year":"1993","unstructured":"Melanie Mitchell, John Holland, and Stephanie Forrest. 1993. When will a genetic algorithm outperform hill climbing. In Proceedings of the 7th International Conference on Neural Information Processing Systems.","journal-title":"Proceedings of the 7th International Conference on Neural Information Processing Systems"},{"issue":"9","key":"e_1_3_2_67_2","doi-asserted-by":"crossref","first-page":"1758","DOI":"10.3844\/jcssp.2014.1758.1765","article-title":"A survey: Particle swarm optimization based algorithms to solve premature convergence problem","volume":"10","author":"Nakisa Bahareh","year":"2014","unstructured":"Bahareh Nakisa, Mohd Zakree Ahmad Nazri, Mohammad Naim Rastgoo, and Salwani Abdullah. 2014. A survey: Particle swarm optimization based algorithms to solve premature convergence problem. Journal of Computer Science 10, 9 (2014), 1758\u20131765.","journal-title":"Journal of Computer Science"},{"issue":"1","key":"e_1_3_2_68_2","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/TSMCB.2006.880136","article-title":"Implementation of an effective hybrid GA for large-scale traveling salesman problems","volume":"37","author":"Nguyen H. D.","year":"2007","unstructured":"H. D. Nguyen, I. Yoshihara, K. Yamamori, and M. Yasunaga. 2007. Implementation of an effective hybrid GA for large-scale traveling salesman problems. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 37, 1 (2007), 92\u201399.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics)"},{"key":"e_1_3_2_69_2","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1145\/3140549.3140562","volume-title":"Proceedings of the 2017 Workshop on Moving Target Defense","author":"Nguyen T. H.","year":"2017","unstructured":"T. H. Nguyen, M. Wright, M. P. Wellman, and S. Baveja. 2017. Multi-stage attack graph security games: Heuristic strategies, with empirical game-theoretic analysis. In Proceedings of the 2017 Workshop on Moving Target Defense. 87\u201397."},{"issue":"6","key":"e_1_3_2_70_2","doi-asserted-by":"crossref","first-page":"162303","DOI":"10.1007\/s11432-020-3125-y","article-title":"Intelligent resource allocation in mobile blockchain for privacy and security transactions: A deep reinforcement learning based approach","volume":"64","author":"Ning Zhaolong","year":"2021","unstructured":"Zhaolong Ning, Shouming Sun, Xiaojie Wang, Lei Guo, Guoyin Wang, Xinbo Gao, and Ricky YK Kwok. 2021. Intelligent resource allocation in mobile blockchain for privacy and security transactions: A deep reinforcement learning based approach. Science China Information Sciences 64, 6 (2021), 162303.","journal-title":"Science China Information Sciences"},{"key":"e_1_3_2_71_2","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1109\/VIZSEC.2005.1532071","volume-title":"Proceedings of the IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC\u201905).","author":"Noel Steven","year":"2005","unstructured":"Steven Noel, Michael Jacobs, Pramod Kalapa, and Sushil Jajodia. 2005. Multiple coordinated views for network attack graphs. In Proceedings of the IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC\u201905). IEEE, 99\u2013106."},{"key":"e_1_3_2_72_2","first-page":"2316","volume-title":"Smc 2000 Conference Proceedings. Proceedings of the 2000 IEEE International Conference on Systems, Man and Cybernetics.\u2019Cybernetics Evolving to Systems, Humans, Organizations, and their Complex Interactions\u2019(cat. no. 0","volume":"3","author":"Noto Masato","year":"2000","unstructured":"Masato Noto and Hiroaki Sato. 2000. A method for the shortest path search by extended Dijkstra algorithm. In Smc 2000 Conference Proceedings. Proceedings of the 2000 IEEE International Conference on Systems, Man and Cybernetics.\u2019Cybernetics Evolving to Systems, Humans, Organizations, and their Complex Interactions\u2019(cat. no. 0, Vol. 3. IEEE, 2316\u20132320."},{"issue":"12","key":"e_1_3_2_73_2","doi-asserted-by":"crossref","first-page":"1077","DOI":"10.14778\/2994509.2994525","article-title":"Dynamic influence analysis in evolving networks","volume":"9","author":"Ohsaka Naoto","year":"2016","unstructured":"Naoto Ohsaka, Takuya Akiba, Yuichi Yoshida, and Ken-ichi Kawarabayashi. 2016. Dynamic influence analysis in evolving networks. Proceedings of the VLDB Endowment 9, 12 (2016), 1077\u20131088.","journal-title":"Proceedings of the VLDB Endowment"},{"key":"e_1_3_2_74_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3165624"},{"issue":"3","key":"e_1_3_2_75_2","first-page":"38","article-title":"The optimal crossover or mutation rates in genetic algorithm: A review","volume":"5","author":"Patil V. P.","year":"2015","unstructured":"V. P. Patil and D. D. Pawar. 2015. The optimal crossover or mutation rates in genetic algorithm: A review. International Journal of Applied Engineering and Technology 5, 3 (2015), 38\u201341.","journal-title":"International Journal of Applied Engineering and Technology"},{"issue":"7","key":"e_1_3_2_76_2","article-title":"Using Markov blankets for causal structure learning.","volume":"9","author":"Pellet Jean-Philippe","year":"2008","unstructured":"Jean-Philippe Pellet and Andr\u00e9 Elisseeff. 2008. Using Markov blankets for causal structure learning. Journal of Machine Learning Research 9, 7 (2008), 1295\u20131342.","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_77_2","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1145\/2566468.2566480","volume-title":"Proceedings of the 3rd International Conference on High Confidence Networked Systems","author":"Perelman L.","year":"2014","unstructured":"L. Perelman and S. Amin. 2014. A network interdiction model for analyzing the vulnerability of water distribution systems. In Proceedings of the 3rd International Conference on High Confidence Networked Systems. ACM, 135\u2013144."},{"issue":"14","key":"e_1_3_2_78_2","doi-asserted-by":"crossref","first-page":"12505","DOI":"10.1109\/JIOT.2021.3137331","article-title":"Autonomous UAV path-planning optimization using metaheuristic approach for predisaster assessment","volume":"9","author":"Qadir Zakria","year":"2021","unstructured":"Zakria Qadir, Muhammad Hamza Zafar, Syed Kumayl Raza Moosavi, Khoa N. Le, and M. A. Parvez Mahmud. 2021. Autonomous UAV path-planning optimization using metaheuristic approach for predisaster assessment. IEEE Internet of Things Journal 9, 14 (2021), 12505\u201312514.","journal-title":"IEEE Internet of Things Journal"},{"key":"e_1_3_2_79_2","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1145\/3219166.3219185","volume-title":"Proceedings of the 2018 ACM Conference on Economics and Computation","author":"Redmiles E. M.","year":"2018","unstructured":"E. M. Redmiles, M. L. Mazurek, and J. P. Dickerson. 2018. Dancing pigs or externalities?: Measuring the rationality of security decisions. In Proceedings of the 2018 ACM Conference on Economics and Computation. ACM, 215\u2013232."},{"issue":"9","key":"e_1_3_2_80_2","doi-asserted-by":"crossref","first-page":"5793","DOI":"10.1109\/TCOMM.2020.2999628","article-title":"Resource allocation for secure URLLC in mission-critical IoT scenarios","volume":"68","author":"Ren Hong","year":"2020","unstructured":"Hong Ren, Cunhua Pan, Yansha Deng, Maged Elkashlan, and Arumugam Nallanathan. 2020. Resource allocation for secure URLLC in mission-critical IoT scenarios. IEEE Transactions on Communications 68, 9 (2020), 5793\u20135807.","journal-title":"IEEE Transactions on Communications"},{"key":"e_1_3_2_81_2","volume-title":"Proceedings of the 29th AAAI Conference on Artificial Intelligence","author":"Rossi R. A.","year":"2015","unstructured":"R. A. Rossi and N. K. Ahmed. 2015. The network data repository with interactive graph analytics and visualization. In Proceedings of the 29th AAAI Conference on Artificial Intelligence. Retrieved from http:\/\/networkrepository.com"},{"key":"e_1_3_2_82_2","doi-asserted-by":"crossref","unstructured":"David Ruano-Ord\u00e1s. 2024. Machine Learning-Based Feature Extraction and Selection. MDPI.","DOI":"10.3390\/app14156567"},{"issue":"4","key":"e_1_3_2_83_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3139293","article-title":"Pareto optimal security resource allocation for Internet of Things","volume":"20","author":"Rullo Antonino","year":"2017","unstructured":"Antonino Rullo, Daniele Midi, Edoardo Serra, and Elisa Bertino. 2017. Pareto optimal security resource allocation for Internet of Things. ACM Transactions on Privacy and Security (TOPS) 20, 4 (2017), 1\u201330.","journal-title":"ACM Transactions on Privacy and Security (TOPS)"},{"key":"e_1_3_2_84_2","first-page":"1","volume-title":"Proceedings of the 2017 IEEE International Conference on Communications (ICC)","author":"Sanjab A.","year":"2017","unstructured":"A. Sanjab, W. Saad, and T. Ba\u015far. 2017. Prospect theory for enhanced cyber-physical security of drone delivery systems: A network interdiction game. In Proceedings of the 2017 IEEE International Conference on Communications (ICC). IEEE, 1\u20136."},{"key":"e_1_3_2_85_2","first-page":"115","article-title":"Optimization algorithms for finding the shortest paths","volume":"50","author":"Sapundzhi F. I.","year":"2018","unstructured":"F. I. Sapundzhi and M. S. Popstoilov. 2018. Optimization algorithms for finding the shortest paths. Bulgarian Chemical Communications 50, Special Issue B (2018), 115\u2013120.","journal-title":"Bulgarian Chemical Communications"},{"issue":"2","key":"e_1_3_2_86_2","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1108\/ICS-12-2013-0090","article-title":"A comprehensive security control selection model for inter-dependent organizational assets structure","volume":"23","author":"Shahpasand M.","year":"2015","unstructured":"M. Shahpasand, M. Shajari, S. H. Golpaygani, and H. Ghavamipoor. 2015. A comprehensive security control selection model for inter-dependent organizational assets structure. Information & Computer Security 23, 2 (2015), 218\u2013242.","journal-title":"Information & Computer Security"},{"issue":"5","key":"e_1_3_2_87_2","doi-asserted-by":"crossref","first-page":"1086","DOI":"10.1111\/risa.13837","article-title":"Multistage attack\u2013defense graph game analysis for protection resources allocation optimization against cyber attacks considering rationality evolution","volume":"42","author":"Shao C.","year":"2022","unstructured":"C. Shao and Y.-F. Li. 2022. Multistage attack\u2013defense graph game analysis for protection resources allocation optimization against cyber attacks considering rationality evolution. Risk Analysis 42, 5 (2022), 1086\u20131105.","journal-title":"Risk Analysis"},{"issue":"1","key":"e_1_3_2_88_2","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1080\/23789689.2020.1753401","article-title":"Classification and mathematical modeling of infrastructure interdependencies","volume":"6","author":"Sharma Neetesh","year":"2021","unstructured":"Neetesh Sharma, Fabrizio Nocera, and Paolo Gardoni. 2021. Classification and mathematical modeling of infrastructure interdependencies. Sustainable and Resilient Infrastructure 6, 1\u20132 (2021), 4\u201325.","journal-title":"Sustainable and Resilient Infrastructure"},{"issue":"2","key":"e_1_3_2_89_2","first-page":"416","article-title":"Comparison of Dijkstra\u2019s shortest path algorithm with genetic algorithm for static and dynamic routing network","volume":"1","author":"Sharma Y.","year":"2012","unstructured":"Y. Sharma, S. C. Saini, and M. Bhandhari. 2012. Comparison of Dijkstra\u2019s shortest path algorithm with genetic algorithm for static and dynamic routing network. International Journal of Electronics and Computer Science Engineering 1, 2 (2012), 416\u2013425.","journal-title":"International Journal of Electronics and Computer Science Engineering"},{"key":"e_1_3_2_90_2","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1109\/SECPRI.2002.1004377","volume-title":"Proceedings of the 2002 IEEE Symposium on Security and Privacy","author":"Sheyner O.","year":"2002","unstructured":"O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. M. Wing. 2002. Automated generation and analysis of attack graphs. In Proceedings of the 2002 IEEE Symposium on Security and Privacy. IEEE, 273\u2013284."},{"issue":"3","key":"e_1_3_2_91_2","doi-asserted-by":"crossref","first-page":"1432","DOI":"10.1109\/TPWRD.2010.2103331","article-title":"Channel modeling for indoor broadband power-line communications networks with arbitrary topologies by taking adjacent nodes into account","volume":"26","author":"Shin J.","year":"2011","unstructured":"J. Shin, J. Lee, and J. Jeong. 2011. Channel modeling for indoor broadband power-line communications networks with arbitrary topologies by taking adjacent nodes into account. IEEE Transactions on Power Delivery 26, 3 (2011), 1432\u20131439.","journal-title":"IEEE Transactions on Power Delivery"},{"key":"e_1_3_2_92_2","first-page":"4422","article-title":"Dynamic defender-attacker blotto game","volume":"2022","author":"Shishika Daigo","year":"2022","unstructured":"Daigo Shishika, Yue Guan, Michael Dorothy, and Vijay Kumar. 2022. Dynamic defender-attacker blotto game. Proceedings of the American Control Conference 2022-June (2022), 4422\u20134428. arxiv:2112.09890","journal-title":"Proceedings of the American Control Conference"},{"key":"e_1_3_2_93_2","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1007\/978-3-030-64793-3_26","volume-title":"Proceedings of the International Conference on Decision and Game Theory for Security","author":"Shishika Daigo","year":"2020","unstructured":"Daigo Shishika and Vijay Kumar. 2020. A review of multi agent perimeter defense games. In Proceedings of the International Conference on Decision and Game Theory for Security. Springer, 472\u2013485."},{"issue":"1","key":"e_1_3_2_94_2","doi-asserted-by":"crossref","first-page":"tyab019","DOI":"10.1093\/cybsec\/tyab019","article-title":"Cyberattacks, cyber threats, and attitudes toward cybersecurity policies","volume":"7","author":"Snider Keren L. G.","year":"2021","unstructured":"Keren L. G. Snider, Ryan Shandler, Shay Zandani, and Daphna Canetti. 2021. Cyberattacks, cyber threats, and attitudes toward cybersecurity policies. Journal of Cybersecurity 7, 1 (2021), tyab019.","journal-title":"Journal of Cybersecurity"},{"key":"e_1_3_2_95_2","first-page":"1","volume-title":"IEEE PES General Meeting","author":"Sommestad Teodor","year":"2010","unstructured":"Teodor Sommestad, G\u00f6ran N. Ericsson, and Jakob Nordlander. 2010. SCADA system cyber security\u2013A comparison of standards. In IEEE PES General Meeting. IEEE, 1\u20138."},{"key":"e_1_3_2_96_2","first-page":"8\u2013pp","volume-title":"Proceedings of the IEEE Conference on Local Computer Networks 30th Anniversary (LCN\u201905) l","author":"Strayer W. T.","year":"2005","unstructured":"W. T. Strayer, C. E. Jones, B. I. Schwartz, J. Mikkelson, and C. Livadas. 2005. Architecture for multi-stage network attack traceback. In Proceedings of the IEEE Conference on Local Computer Networks 30th Anniversary (LCN\u201905) l. IEEE, 8\u2013pp."},{"key":"e_1_3_2_97_2","doi-asserted-by":"crossref","first-page":"27974","DOI":"10.1109\/ACCESS.2023.3257721","article-title":"A survey of MulVAL extensions and their attack scenarios coverage","volume":"11","author":"Tayouri David","year":"2023","unstructured":"David Tayouri, Nick Baum, Asaf Shabtai, and Rami Puzis. 2023. A survey of MulVAL extensions and their attack scenarios coverage. IEEE Access 11 (2023), 27974\u201327991.","journal-title":"IEEE Access"},{"issue":"3","key":"e_1_3_2_98_2","doi-asserted-by":"crossref","first-page":"573","DOI":"10.3390\/jcp2030029","article-title":"Addressing human factors in cybersecurity leadership","volume":"2","author":"Triplett William J.","year":"2022","unstructured":"William J. Triplett. 2022. Addressing human factors in cybersecurity leadership. Journal of Cybersecurity and Privacy 2, 3 (2022), 573\u2013586.","journal-title":"Journal of Cybersecurity and Privacy"},{"issue":"1","key":"e_1_3_2_99_2","first-page":"840","article-title":"Game-theoretic resource allocation for malicious packet detection in computer networks","volume":"2","author":"Van\u011bd Ond\u0159ej","year":"2012","unstructured":"Ond\u0159ej Van\u011bd, Zhengyu Yin, Manish Jain, Branislav Bo\u0161ansk\u00fd, Milind Tambe, and Michal P\u011bchou\u010dek. 2012. Game-theoretic resource allocation for malicious packet detection in computer networks. 11th International Conference on Autonomous Agents and Multiagent Systems 2012, AAMAS 2012: Innovative Applications Track 2, 1 (2012), 840\u2013847.","journal-title":"11th International Conference on Autonomous Agents and Multiagent Systems 2012, AAMAS 2012: Innovative Applications Track"},{"key":"e_1_3_2_100_2","doi-asserted-by":"crossref","first-page":"112794","DOI":"10.1016\/j.rser.2022.112794","article-title":"Cyber\u2013physical vulnerability and resiliency analysis for DER integration: A review, challenges and research needs","volume":"168","author":"Vosughi A.","year":"2022","unstructured":"A. Vosughi, A. Tamimi, A. B. King, S. Majumder, and A. K. Srivastava. 2022. Cyber\u2013physical vulnerability and resiliency analysis for DER integration: A review, challenges and research needs. Renewable and Sustainable Energy Reviews 168 (2022), 112794.","journal-title":"Renewable and Sustainable Energy Reviews"},{"issue":"10","key":"e_1_3_2_101_2","doi-asserted-by":"crossref","first-page":"1332","DOI":"10.1016\/j.ssci.2009.02.002","article-title":"Cascade-based attack vulnerability on the US power grid","volume":"47","author":"Wang J.-W.","year":"2009","unstructured":"J.-W. Wang and L.-L. Rong. 2009. Cascade-based attack vulnerability on the US power grid. Safety Science 47, 10 (2009), 1332\u20131336.","journal-title":"Safety Science"},{"key":"e_1_3_2_102_2","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1145\/3474374.3486918","volume-title":"Proceedings of the 3rd Workshop on Cyber-Security Arms Race","author":"Wilkens Florian","year":"2021","unstructured":"Florian Wilkens, Felix Ortmann, Steffen Haas, Matthias Vallentin, and Mathias Fischer. 2021. Multi-stage attack detection via kill chain state machines. In Proceedings of the 3rd Workshop on Cyber-Security Arms Race. 13\u201324."},{"issue":"1","key":"e_1_3_2_103_2","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1007\/s10683-021-09714-x","article-title":"Network defense and behavioral biases: An experimental study","volume":"25","author":"Woods D.","year":"2022","unstructured":"D. Woods, M. Abdallah, S. Bagchi, S. Sundaram, and T. Cason. 2022. Network defense and behavioral biases: An experimental study. Experimental Economics 25, 1 (2022), 254\u2013286.","journal-title":"Experimental Economics"},{"key":"e_1_3_2_104_2","first-page":"63","volume-title":"Proceedings of the 15th International Conference on World Wide Web","author":"Wu Baoning","year":"2006","unstructured":"Baoning Wu, Vinay Goel, and Brian D. Davison. 2006. Topical trustrank: Using topicality to combat web spam. In Proceedings of the 15th International Conference on World Wide Web. 63\u201372."},{"key":"e_1_3_2_105_2","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1109\/GreenTech58819.2024.10520466","volume-title":"Proceedings of the 2024 IEEE Green Technologies Conference (GreenTech\u201924)","author":"Yadav Mukesh","year":"2024","unstructured":"Mukesh Yadav and Peter Hawrylak. 2024. Exploring node ranking algorithms in attack graphs: A study on structure, observations, and algorithmic variants. In Proceedings of the 2024 IEEE Green Technologies Conference (GreenTech\u201924). 101\u2013105."},{"key":"e_1_3_2_106_2","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1145\/2382196.2382255","volume-title":"Proceedings of the 2012 ACM Conference on Computer and Communications Security","author":"Yan G.","year":"2012","unstructured":"G. Yan, R. Lee, A. Kent, and D. Wolpert. 2012. Towards a Bayesian network game framework for evaluating DDoS attacks and defense. In Proceedings of the 2012 ACM Conference on Computer and Communications Security. 553\u2013566."},{"key":"e_1_3_2_107_2","first-page":"2217","volume-title":"Proceedings of the 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition","author":"Yuan Jing","year":"2010","unstructured":"Jing Yuan, Egil Bae, and Xue-Cheng Tai. 2010. A study on continuous max-flow and min-cut approaches. In Proceedings of the 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. IEEE, 2217\u20132224."},{"key":"e_1_3_2_108_2","first-page":"249","volume-title":"Proceedings of the 2016 IEEE International Conference on Computer and Information Technology (CIT\u201916)","author":"Yusuf Simon Enoch","year":"2016","unstructured":"Simon Enoch Yusuf, Mengmeng Ge, Jin B. Hong, Huy Kang Kim, Paul Kim, and Dong Seong Kim. 2016. Security modelling and analysis of dynamic enterprise networks. In Proceedings of the 2016 IEEE International Conference on Computer and Information Technology (CIT\u201916). IEEE, 249\u2013256."},{"key":"e_1_3_2_109_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.12.028"},{"key":"e_1_3_2_110_2","doi-asserted-by":"crossref","unstructured":"Jianping Zeng Shuang Wu Yanyu Chen Rui Zeng and Chengrong Wu. 2019. Survey of attack graph analysis methods from the perspective of data and knowledge processing. Security and Communication Networks 2019 1 (2019) 2031063.","DOI":"10.1155\/2019\/2031063"},{"issue":"1","key":"e_1_3_2_111_2","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1186\/s40537-017-0076-5","article-title":"Identification of top-K nodes in large networks using Katz centrality","volume":"4","author":"Zhan Justin","year":"2017","unstructured":"Justin Zhan, Sweta Gurung, and Sai Phani Krishna Parsa. 2017. Identification of top-K nodes in large networks using Katz centrality. Journal of Big Data 4, 1 (2017), 16.","journal-title":"Journal of Big Data"},{"key":"e_1_3_2_112_2","first-page":"238","volume-title":"Proceedings of the 2017 IEEE 2nd International Conference on Data Science in Cyberspace (DSC\u201917)","author":"Zhang H.","year":"2017","unstructured":"H. Zhang, F. Lou, Y. Fu, and Z. Tian. 2017. A conditional probability computation method for vulnerability exploitation based on CVSS. In Proceedings of the 2017 IEEE 2nd International Conference on Data Science in Cyberspace (DSC\u201917). IEEE, 238\u2013241."},{"key":"e_1_3_2_113_2","first-page":"300","volume-title":"Proceedings of the 2017 2nd International Conference on Modelling, Simulation and Applied Mathematics","author":"Zhang J.","year":"2017","unstructured":"J. Zhang and Y. Luo. 2017. Degree centrality, betweenness centrality, and closeness centrality in social network. In Proceedings of the 2017 2nd International Conference on Modelling, Simulation and Applied Mathematics. Atlantis Press, 300\u2013303."},{"issue":"5","key":"e_1_3_2_114_2","doi-asserted-by":"crossref","first-page":"1071","DOI":"10.1109\/TIFS.2016.2516916","article-title":"Network diversity: A security metric for evaluating the resilience of networks against zero-day attacks","volume":"11","author":"Zhang M.","year":"2016","unstructured":"M. Zhang, L. Wang, S. Jajodia, A. Singhal, and M. Albanese. 2016. Network diversity: A security metric for evaluating the resilience of networks against zero-day attacks. IEEE Transactions on Information Forensics and Security 11, 5 (2016), 1071\u20131086.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"e_1_3_2_115_2","first-page":"428","volume-title":"Proceedings of the 12th European Conference on Computer Vision, Part I 12","author":"Zhang W.","year":"2012","unstructured":"W. Zhang, X. Wang, D. Zhao, and X. Tang. 2012. Graph degree linkage: Agglomerative clustering on a directed graph. In Proceedings of the 12th European Conference on Computer Vision, Part I 12. Springer, 428\u2013441."},{"key":"e_1_3_2_116_2","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1109\/TIFS.2019.2922277","article-title":"How to securely outsource finding the min-cut of undirected edge-weighted graphs","volume":"15","author":"Zhao Pu","year":"2019","unstructured":"Pu Zhao, Jia Yu, Hanlin Zhang, Zhan Qin, and Cong Wang. 2019. How to securely outsource finding the min-cut of undirected edge-weighted graphs. IEEE Transactions on Information Forensics and Security 15 (2019), 315\u2013328.","journal-title":"IEEE Transactions on Information Forensics and Security"}],"container-title":["ACM Transactions on Privacy and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3736760","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T12:11:28Z","timestamp":1756469488000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3736760"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,29]]},"references-count":115,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,8,31]]}},"alternative-id":["10.1145\/3736760"],"URL":"https:\/\/doi.org\/10.1145\/3736760","relation":{},"ISSN":["2471-2566","2471-2574"],"issn-type":[{"type":"print","value":"2471-2566"},{"type":"electronic","value":"2471-2574"}],"subject":[],"published":{"date-parts":[[2025,8,29]]},"assertion":[{"value":"2024-07-15","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-26","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}