{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:59:28Z","timestamp":1773615568939,"version":"3.50.1"},"reference-count":19,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.3103\/s0146411624701232","type":"journal-article","created":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T14:23:19Z","timestamp":1741962199000},"page":"1436-1441","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Attack Graph-Based Data Presentation for Use in Automated Security Analysis Systems"],"prefix":"10.3103","volume":"58","author":[{"given":"E. M.","family":"Orel","sequence":"first","affiliation":[]},{"given":"D. A.","family":"Moskvin","sequence":"additional","affiliation":[]},{"given":"A. A.","family":"Lyashenko","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"7810_CR1","unstructured":"Schneier, B., Attack trees. https:\/\/www.schneier.com\/academic\/archives\/1999\/12\/attack_trees.html. Cited November 14, 2023."},{"key":"7810_CR2","doi-asserted-by":"publisher","unstructured":"Gorodetski, V. and Kotenko, I., Attacks against computer network: Formal grammar-based framework and simulation tool, Recent Advances in Intrusion Detection. RAID 2002, Wespi, A., Vigna, G., and Deri, L., Eds., Lecture Notes in Computer Science, vol. 2516, Berlin: Springer, 2002, pp. 219\u2013238. https:\/\/doi.org\/10.1007\/3-540-36084-0_12","DOI":"10.1007\/3-540-36084-0_12"},{"key":"7810_CR3","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1016\/S0167-4048(99)80115-1","volume":"18","author":"F. Cohen","year":"1999","unstructured":"Cohen, F., Simulating cyber attacks, defences, and consequences, Comput. Secur., 1999, vol. 18, no. 6, pp. 479\u2013518. https:\/\/doi.org\/10.1016\/S0167-4048(99)80115-1","journal-title":"Comput. Secur."},{"key":"7810_CR4","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1016\/s1389-1286(00)00142-0","volume":"34","author":"J. Yuill","year":"2000","unstructured":"Yuill, J., Wu, F., Settle, J., Gong, F., Forno, R., Huang, M., and Asbery, J., Intrusion-detection for incident-response, using a military battlefield-intelligence process, Comput. Networks, 2000, vol. 34, no. 4, pp. 671\u2013697. https:\/\/doi.org\/10.1016\/s1389-1286(00)00142-0","journal-title":"Comput. Networks"},{"key":"7810_CR5","volume-title":"Modeling network attacks: Extending the attack tree, Statistical and Machine Learning Techniques in Computer Intrusion Detection","author":"J. Dawkins","year":"2002","unstructured":"Dawkins, J., Campbell, C., and Hale, J., Modeling network attacks: Extending the attack tree, Statistical and Machine Learning Techniques in Computer Intrusion Detection, Baltimore, MD: Johns Hopkins University, 2002."},{"key":"7810_CR6","doi-asserted-by":"publisher","first-page":"211","DOI":"10.15622\/sp.57.9","volume":"2","author":"E.V. Doynikova","year":"2018","unstructured":"Doynikova, E.V. and Kotenko, I.V., Improvement of attack graphs for cybersecurity monitoring: Handling of inaccuracies, processing of cycles, mapping of incidents and automatic countermeasure selection, Trudy SPIIRAN, 2018, vol. 2, no. 57, pp. 211\u2013240. https:\/\/doi.org\/10.15622\/sp.57.9","journal-title":"Trudy SPIIRAN"},{"key":"7810_CR7","unstructured":"Kubrin, G.S. and Zegzhda, D.P., Software vulnerability search using ensemble of graph analysis algorithms, Metody i tekhnicheskie sredstva obespecheniya bezopasnosti informatsii. Materialy 32-i nauchno-tekhnicheskoi konferentsii (Methods and Technical Means of Information Security: Proceedings of the 32nd Scientific and Technical Conference), St. Petersburg: Izdatel\u2019stvo Politekhnicheskogo Universiteta, 2023, pp. 49\u201350."},{"key":"7810_CR8","unstructured":"Ivanov, D.V., Kalinin, M.O., and Krundyshev, V.M., Risk-based security management of reconfigurable information systems using an attack graph, Metody i tekhnicheskie sredstva obespecheniya bezopasnosti informatsii. Materialy 30-i nauchno-tekhnicheskoi konferentsii (Methods and Technical Means of Information Security: Proceedings of the 30th Scientific and Technical Conference), St. Petersburg: Izdatel\u2019stvo Politekhnicheskogo Universiteta, 2021, pp. 18\u201319."},{"key":"7810_CR9","first-page":"277","volume":"22","author":"A.S. Konoplev","year":"2019","unstructured":"Konoplev, A.S. and Kalinin, M.O., Graphanalytical model of key distribution in networks with dynamic architecture, Nonlinear Phenom. Complex Syst., 2019, vol. 22, no. 3, pp. 277\u2013284.","journal-title":"Nonlinear Phenom. Complex Syst."},{"key":"7810_CR10","unstructured":"Fnderson, B.M., Determining vulnerability using attack graphs: An expansion of the current fair model, Masters Thesis, Eastern Washington University, 2018."},{"key":"7810_CR11","doi-asserted-by":"publisher","first-page":"27974","DOI":"10.1109\/access.2023.3257721","volume":"11","author":"D. Tayouri","year":"2023","unstructured":"Tayouri, D., Baum, N., Shabtai, A., and Puzis, R., A survey of MulVAL extensions and their attack scenarios coverage, IEEE Access, 2023, vol. 11, pp. 27974\u201327991. https:\/\/doi.org\/10.1109\/access.2023.3257721","journal-title":"IEEE Access"},{"key":"7810_CR12","first-page":"251","volume":"22","author":"M. Poltavtseva","year":"2019","unstructured":"Poltavtseva, M. and Shenets, N., Applying homomorphic cryptography methods to the development of secure big data management systems, Nonlinear Phenom. Complex Syst., 2019, vol. 22, no. 3, pp. 251\u2013259.","journal-title":"Nonlinear Phenom. Complex Syst."},{"key":"7810_CR13","doi-asserted-by":"publisher","unstructured":"Novokhrestov, A.K., Konev, A.A., Kovalenko, N.I., and Sermavkin, N.I., System attack modeling techniques critical information infrastructure, arXiv Preprint, 2023. https:\/\/doi.org\/10.48550\/arXiv.2112.09932","DOI":"10.48550\/arXiv.2112.09932"},{"key":"7810_CR14","doi-asserted-by":"publisher","first-page":"4123","DOI":"10.3390\/en15114123","volume":"15","author":"M. Kalinin","year":"2022","unstructured":"Kalinin, M., Zegzhda, D., and Zavadskii, E., Protection of energy network infrastructures applying a dynamic topology virtualization, Energies, 2022, vol. 15, no. 11, p. 4123. https:\/\/doi.org\/10.3390\/en15114123","journal-title":"Energies"},{"key":"7810_CR15","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1049\/iet-ifs.2011.0103","volume":"6","author":"P. Bhattacharya","year":"2012","unstructured":"Bhattacharya, P. and Ghosh, S.K., Analytical framework for measuring network security using exploit dependency graph, IET Inf. Secur., 2012, vol. 6, no. 4, pp. 264\u2013270. https:\/\/doi.org\/10.1049\/iet-ifs.2011.0103","journal-title":"IET Inf. Secur."},{"key":"7810_CR16","doi-asserted-by":"publisher","first-page":"977","DOI":"10.3103\/s0146411620080222","volume":"54","author":"D.S. Lavrova","year":"2020","unstructured":"Lavrova, D.S. and Shtyrkina, A.A., The analysis of artificial neural network structure recovery possibilities based on the theory of graphs, Autom. Control Comput. Sci., 2020, vol. 54, no. 8, pp. 977\u2013982. https:\/\/doi.org\/10.3103\/s0146411620080222","journal-title":"Autom. Control Comput. Sci."},{"key":"7810_CR17","doi-asserted-by":"publisher","unstructured":"Dakhnovich, A., Moskvin, D., and Zegzhda, D., A necessary condition for industrial Internet of Things sustainability, Mobile Internet Security. MobiSec 2021, You, I., Kim, H., Youn, T.Y., Palmieri, F., and Kotenko, I., Eds., Communications in Computer and Information Science, vol. 1544, Singapore: Springer, 2022, pp. 79\u201389. https:\/\/doi.org\/10.1007\/978-981-16-9576-6_7","DOI":"10.1007\/978-981-16-9576-6_7"},{"key":"7810_CR18","unstructured":"Zaitseva, E.A., Lavrova, D.S., and Zegzhda, D.P., Neutralizing the effects of disruptive influences by applying graph theory to reconfigure the system structure, Metody i tekhnicheskie sredstva obespecheniya bezopasnosti informatsii. Materialy 28-i nauchno-tekhnicheskoi konferentsii (Methods and Technical Means of Information Security: Proceedings of the 28th Scientific and Technical Conference), St. Petersburg: Izdatel\u2019stvo Politekhnicheskogo Universiteta, 2019, pp. 7\u20138."},{"key":"7810_CR19","unstructured":"Shtyrkina, A.A., Pavlenko, E.Yu., and Lavrova, D.S., Approach to structural stability assessment of cyber-physical systems based on spectral graph theory, Metody i tekhnicheskie sredstva obespecheniya bezopasnosti informatsii. Materialy 28-i nauchno-tekhnicheskoi konferentsii (Methods and Technical Means of Information Security: Proceedings of the 28th Scientific and Technical Conference), St. Petersburg: Izdatel\u2019stvo Politekhnicheskogo Universiteta, 2019, pp. 21\u201323."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624701232.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411624701232","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624701232.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:01:39Z","timestamp":1773612099000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411624701232"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":19,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["7810"],"URL":"https:\/\/doi.org\/10.3103\/s0146411624701232","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"15 December 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 February 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 March 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}