{"id":"https://openalex.org/W4387914226","doi":"https://doi.org/10.1109/codit58514.2023.10284423","title":"Mode Recognition in Attack Graphs Based on Conditional State Probability","display_name":"Mode Recognition in Attack Graphs Based on Conditional State Probability","publication_year":2023,"publication_date":"2023-07-03","ids":{"openalex":"https://openalex.org/W4387914226","doi":"https://doi.org/10.1109/codit58514.2023.10284423"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/codit58514.2023.10284423","pdf_url":null,"source":{"id":"https://openalex.org/S4363607900","display_name":"2022 8th International Conference on Control, Decision and Information Technologies (CoDIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5104033824","display_name":"Omar Amri","orcid":null},"institutions":[{"id":"https://openalex.org/I141576021","display_name":"Universit\u00e9 Le Havre Normandie","ror":"https://ror.org/05v509s40","country_code":"FR","type":"education","lineage":["https://openalex.org/I141576021","https://openalex.org/I4210105918"]},{"id":"https://openalex.org/I4392021253","display_name":"Groupe de Recherche en Electrotechnique et Automatique du Havre","ror":"https://ror.org/03qcqf034","country_code":null,"type":"facility","lineage":["https://openalex.org/I141576021","https://openalex.org/I4210105918","https://openalex.org/I4392021253"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Omar Amri","raw_affiliation_strings":["GREAH - Groupe de Recherche en Electrotechnique et Automatique du Havre (75 rue Bellot - BP 1123 -\r\n76063 Le Havre Cedex - France)"],"affiliations":[{"raw_affiliation_string":"GREAH - Groupe de Recherche en Electrotechnique et Automatique du Havre (75 rue Bellot - BP 1123 -\r\n76063 Le Havre Cedex - France)","institution_ids":["https://openalex.org/I141576021","https://openalex.org/I4392021253"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003454609","display_name":"Dimitri Lefebvre","orcid":"https://orcid.org/0000-0001-7060-756X"},"institutions":[{"id":"https://openalex.org/I4392021253","display_name":"Groupe de Recherche en Electrotechnique et Automatique du Havre","ror":"https://ror.org/03qcqf034","country_code":null,"type":"facility","lineage":["https://openalex.org/I141576021","https://openalex.org/I4210105918","https://openalex.org/I4392021253"]},{"id":"https://openalex.org/I141576021","display_name":"Universit\u00e9 Le Havre Normandie","ror":"https://ror.org/05v509s40","country_code":"FR","type":"education","lineage":["https://openalex.org/I141576021","https://openalex.org/I4210105918"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Dimitri Lefebvre","raw_affiliation_strings":["GREAH - Groupe de Recherche en Electrotechnique et Automatique du Havre (75 rue Bellot - BP 1123 -\r\n76063 Le Havre Cedex - France)"],"affiliations":[{"raw_affiliation_string":"GREAH - Groupe de Recherche en Electrotechnique et Automatique du Havre (75 rue Bellot - BP 1123 -\r\n76063 Le Havre Cedex - France)","institution_ids":["https://openalex.org/I4392021253","https://openalex.org/I141576021"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":67},"biblio":{"volume":null,"issue":null,"first_page":"999","last_page":"1004"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9996,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9973,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience","score":0.5490013},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.5125525},{"id":"https://openalex.org/keywords/mode","display_name":"Mode (computer interface)","score":0.44523177}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.74159616},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.56744766},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.5490013},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.5125525},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.49548995},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.47698814},{"id":"https://openalex.org/C48677424","wikidata":"https://www.wikidata.org/wiki/Q6888088","display_name":"Mode (computer interface)","level":2,"score":0.44523177},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.37904254},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.14243868},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/codit58514.2023.10284423","pdf_url":null,"source":{"id":"https://openalex.org/S4363607900","display_name":"2022 8th International Conference on Control, Decision and Information Technologies (CoDIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":false,"landing_page_url":"https://hal.science/hal-04469012","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[{"funder":"https://openalex.org/F4320320883","funder_display_name":"Agence Nationale de la Recherche","award_id":"ANR-22-CE10-0002"}],"datasets":[],"versions":[],"referenced_works_count":25,"referenced_works":["https://openalex.org/W1493327060","https://openalex.org/W1512037836","https://openalex.org/W1590752147","https://openalex.org/W2093058609","https://openalex.org/W2118414426","https://openalex.org/W2157840034","https://openalex.org/W2187280856","https://openalex.org/W2489040287","https://openalex.org/W2518347239","https://openalex.org/W2520060407","https://openalex.org/W2536179434","https://openalex.org/W2539955859","https://openalex.org/W2909507365","https://openalex.org/W2962980096","https://openalex.org/W2973936458","https://openalex.org/W2996949461","https://openalex.org/W3012250252","https://openalex.org/W3048251358","https://openalex.org/W3094707279","https://openalex.org/W3123583891","https://openalex.org/W3159745868","https://openalex.org/W3197442817","https://openalex.org/W4248986893","https://openalex.org/W4281719253","https://openalex.org/W4283214545"],"related_works":["https://openalex.org/W82848659","https://openalex.org/W4402320089","https://openalex.org/W4378555281","https://openalex.org/W4229446828","https://openalex.org/W3027216454","https://openalex.org/W2953081822","https://openalex.org/W2752145644","https://openalex.org/W2284759612","https://openalex.org/W2016027324","https://openalex.org/W1887981150"],"abstract_inverted_index":{"Attack":[0,51],"Graphs":[1],"are":[2,53,107],"modeling":[3],"tools":[4],"to":[5,57,77,117],"visualize":[6],"the":[7,14,20,25,28,34,38,46,59,79,86,103,119,128],"behaviour":[8],"of":[9,27,37,61,82,121],"an":[10,83],"attacker":[11,39,84],"(intruder)":[12],"throughout":[13,85],"network.":[15],"By":[16],"using":[17,93],"attack":[18,92,104,125],"graphs,":[19],"cyber-security":[21],"agent":[22],"can":[23,48,72],"evaluate":[24],"security":[26],"network":[29,63],"as":[30,32],"well":[31],"know":[33,42],"potential":[35],"actions":[36,81],"or":[40],"even":[41],"at":[43],"what":[44],"level":[45],"system":[47],"be":[49,74],"compromised.":[50],"graphs":[52],"usually":[54],"used":[55,75,116],"offline":[56],"measure":[58],"resilience":[60],"a":[62,94],"against":[64],"cyber-attacks.":[65],"This":[66,113],"paper":[67],"shows":[68],"that":[69,101],"such":[70],"models":[71],"also":[73],"online":[76],"recognize":[78],"current":[80],"network,":[87],"while":[88],"it":[89],"is":[90,100,115],"under":[91],"conditional":[95],"state":[96],"probability.":[97],"Our":[98],"setting":[99],"during":[102],"some":[105],"events":[106],"observed":[108],"with":[109],"their":[110],"time":[111],"stamps.":[112],"information":[114],"refine":[118],"estimation":[120],"each":[122],"mode":[123],"i.e.,":[124],"action,":[126],"in":[127],"graph":[129],"over":[130],"time.":[131]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4387914226","counts_by_year":[],"updated_date":"2025-01-04T02:10:02.942657","created_date":"2023-10-25"}