{"id":"https://openalex.org/W4318698958","doi":"https://doi.org/10.4018/ijdcf.317100","title":"Key Node Identification Based on Vulnerability Life Cycle and the Importance of Network Topology","display_name":"Key Node Identification Based on Vulnerability Life Cycle and the Importance of Network Topology","publication_year":2023,"publication_date":"2023-01-20","ids":{"openalex":"https://openalex.org/W4318698958","doi":"https://doi.org/10.4018/ijdcf.317100"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.4018/ijdcf.317100","pdf_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=317100&isxn=9781668479261","source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=317100&isxn=9781668479261","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089905807","display_name":"Yuwen Zhu","orcid":"https://orcid.org/0000-0002-4052-5501"},"institutions":[],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuwen Zhu","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085388590","display_name":"Lei Yu","orcid":"https://orcid.org/0000-0002-9254-7585"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Yu","raw_affiliation_strings":["Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I19820366"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.449,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":2,"citation_normalized_percentile":{"value":0.390913,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":77,"max":82},"biblio":{"volume":"15","issue":"1","first_page":"1","last_page":"16"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9985,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9985,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9974,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12592","display_name":"Opinion Dynamics and Social Influence","score":0.9964,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability","score":0.69764006},{"id":"https://openalex.org/keywords/identification","display_name":"Identification","score":0.6679045}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8364153},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.7272008},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.69764006},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.6840699},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.6679045},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.6179806},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.4636226},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4306479},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3366183},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27411848},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10041571},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.4018/ijdcf.317100","pdf_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=317100&isxn=9781668479261","source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.4018/ijdcf.317100","pdf_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=317100&isxn=9781668479261","source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"display_name":"Responsible consumption and production","id":"https://metadata.un.org/sdg/12","score":0.56}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":15,"referenced_works":["https://openalex.org/W1971937094","https://openalex.org/W1979820341","https://openalex.org/W2004584049","https://openalex.org/W2015953751","https://openalex.org/W2048095866","https://openalex.org/W2056944867","https://openalex.org/W2085426790","https://openalex.org/W2099775215","https://openalex.org/W2124477160","https://openalex.org/W2133131640","https://openalex.org/W2273503696","https://openalex.org/W2489040287","https://openalex.org/W2781101438","https://openalex.org/W3150511728","https://openalex.org/W3208552130"],"related_works":["https://openalex.org/W600422426","https://openalex.org/W3081478936","https://openalex.org/W2785612136","https://openalex.org/W2170882281","https://openalex.org/W2133122801","https://openalex.org/W2096179639","https://openalex.org/W2086397253","https://openalex.org/W2007156430","https://openalex.org/W1988224651","https://openalex.org/W1539291615"],"abstract_inverted_index":{"The":[0,24],"key":[1,26,77,115,140],"network":[2,19,60,76,92,119,126,143],"node":[3,27,61,78],"identification":[4,28,79],"technology":[5],"plays":[6],"an":[7],"important":[8],"role":[9],"in":[10,18,136],"comprehending":[11],"unknown":[12],"terrains":[13],"and":[14,21,87,112],"rapid":[15],"action":[16],"planning":[17],"attack":[20],"defense":[22],"confrontation.":[23],"conventional":[25],"algorithm":[29],"only":[30],"takes":[31],"one":[32],"type":[33],"of":[34,42,46,59,90,105,117,124,133,139],"relationship":[35],"into":[36],"consideration;":[37],"therefore,":[38],"it":[39,52,129],"is":[40],"incapable":[41],"representing":[43],"the":[44,55,69,83,88,91,96,102,106,114,118,122,125,131,134,137],"characteristics":[45],"multiple":[47],"relationships":[48],"between":[49],"nodes.":[50],"Additionally,":[51],"typically":[53],"disregards":[54],"periodic":[56],"change":[57],"law":[58],"vulnerability":[62,84,107],"over":[63],"time.":[64],"In":[65],"order":[66],"to":[67],"solve":[68],"above":[70],"problems,":[71],"this":[72,99],"paper":[73,100],"proposes":[74,101],"a":[75],"method":[80,104,135],"based":[81,120],"on":[82,95,121],"life":[85,108],"cycle":[86,109],"significance":[89],"topology.":[93,127],"Based":[94],"CVSS":[97],"score,":[98],"calculation":[103],"risk":[110],"value,":[111],"identifies":[113],"nodes":[116,141],"importance":[123],"Finally,":[128],"demonstrates":[130],"effectiveness":[132],"selection":[138],"through":[142],"instance":[144],"analysis.":[145]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4318698958","counts_by_year":[{"year":2024,"cited_by_count":2}],"updated_date":"2025-03-21T14:28:09.951603","created_date":"2023-02-01"}