
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A network attack path prediction method using attack graph
Xuguang Liu
Journal of Ambient Intelligence and Humanized Computing (2020)
Closed Access | Times Cited: 21
Xuguang Liu
Journal of Ambient Intelligence and Humanized Computing (2020)
Closed Access | Times Cited: 21
Showing 21 citing articles:
A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions
Omar Almazrouei, Pritheega Magalingam, Mohammad Kamrul Hasan, et al.
IEEE Access (2023) Vol. 11, pp. 44350-44376
Open Access | Times Cited: 16
Omar Almazrouei, Pritheega Magalingam, Mohammad Kamrul Hasan, et al.
IEEE Access (2023) Vol. 11, pp. 44350-44376
Open Access | Times Cited: 16
Comparative Analysis of Machine Learning Methods in Vulnerability Categories Prediction Based on Configuration Similarity
Dmitry Levshun
Studies in computational intelligence (2024), pp. 70-81
Closed Access | Times Cited: 1
Dmitry Levshun
Studies in computational intelligence (2024), pp. 70-81
Closed Access | Times Cited: 1
CL-AP2 : A composite learning approach to attack prediction via attack portraying
Yingze Liu, Yuanbo Guo
Journal of Network and Computer Applications (2024) Vol. 230, pp. 103963-103963
Closed Access | Times Cited: 1
Yingze Liu, Yuanbo Guo
Journal of Network and Computer Applications (2024) Vol. 230, pp. 103963-103963
Closed Access | Times Cited: 1
Vulnerability Categorization for Fast Multistep Attack Modelling
Dmitry Levshun, Andrey Chechulin
(2023), pp. 169-175
Closed Access | Times Cited: 2
Dmitry Levshun, Andrey Chechulin
(2023), pp. 169-175
Closed Access | Times Cited: 2
Network Attack Path Selection and Evaluation Based on Q-Learning
Runze Wu, Jinxin Gong, Weiyue Tong, et al.
Applied Sciences (2020) Vol. 11, Iss. 1, pp. 285-285
Open Access | Times Cited: 6
Runze Wu, Jinxin Gong, Weiyue Tong, et al.
Applied Sciences (2020) Vol. 11, Iss. 1, pp. 285-285
Open Access | Times Cited: 6
A Review of CPS Design and Vulnerability Analysis
Andrea Vilán, Peter Walker
Journal of Computing and Natural Science (2022), pp. 110-119
Open Access | Times Cited: 3
Andrea Vilán, Peter Walker
Journal of Computing and Natural Science (2022), pp. 110-119
Open Access | Times Cited: 3
Research on Power Cyber-Physical Cross-Domain Attack Paths Based on Graph Knowledge
Shenjian Qiu, Zhipeng Shao, Jian Wang, et al.
Applied Sciences (2024) Vol. 14, Iss. 14, pp. 6189-6189
Open Access
Shenjian Qiu, Zhipeng Shao, Jian Wang, et al.
Applied Sciences (2024) Vol. 14, Iss. 14, pp. 6189-6189
Open Access
Research on Software Isomerization Technology Based on Diversified Compilation
He Chuan, Bo Zhang, Zesheng Xi, et al.
2022 7th International Conference on Intelligent Computing and Signal Processing (ICSP) (2024), pp. 1445-1450
Closed Access
He Chuan, Bo Zhang, Zesheng Xi, et al.
2022 7th International Conference on Intelligent Computing and Signal Processing (ICSP) (2024), pp. 1445-1450
Closed Access
PWAGAT: Potential Web attacker detection based on graph attention network
Yijia Xu, Yong Fang, Zhonglin Liu, et al.
Neurocomputing (2023) Vol. 557, pp. 126725-126725
Closed Access | Times Cited: 1
Yijia Xu, Yong Fang, Zhonglin Liu, et al.
Neurocomputing (2023) Vol. 557, pp. 126725-126725
Closed Access | Times Cited: 1
Study on the Application of Graph Theory Algorithms and Attack Graphs in Cybersecurity Assessment
Jinghan Zhang, Wei Wang, Enrico Zio
(2023), pp. 558-564
Open Access | Times Cited: 1
Jinghan Zhang, Wei Wang, Enrico Zio
(2023), pp. 558-564
Open Access | Times Cited: 1
Attack Graph Embedded Machine Learning Platform For Cyber Situational Awareness
Md Ariful Haque, Sachin Shetty, Charles Kamhoua, et al.
MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM) (2022), pp. 464-469
Closed Access | Times Cited: 2
Md Ariful Haque, Sachin Shetty, Charles Kamhoua, et al.
MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM) (2022), pp. 464-469
Closed Access | Times Cited: 2
A Prioritizing Interdiction Surface-Based Vulnerability Remediation Composite Metric for Industrial Control Systems
Zibo Wang, Yaofang Zhang, Zhiyao Liu, et al.
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-16
Open Access | Times Cited: 1
Zibo Wang, Yaofang Zhang, Zhiyao Liu, et al.
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-16
Open Access | Times Cited: 1
Attribute attack graph generation method based on attack stage
ShuChen Teng, Bin Wu
2021 2nd International Conference on Electronics, Communications and Information Technology (CECIT) (2021), pp. 286-291
Closed Access | Times Cited: 1
ShuChen Teng, Bin Wu
2021 2nd International Conference on Electronics, Communications and Information Technology (CECIT) (2021), pp. 286-291
Closed Access | Times Cited: 1
Comparative Analysis of Machine Learning Methods in Vulnerability Metrics Transformation
Dmitry Levshun
Lecture notes in networks and systems (2023), pp. 60-70
Closed Access
Dmitry Levshun
Lecture notes in networks and systems (2023), pp. 60-70
Closed Access
An intelligent method for building attack paths based on Bayesian attack graphs
Yanfang Fu, Cheng Wang, Fang Wang, et al.
(2022), pp. 20-20
Closed Access
Yanfang Fu, Cheng Wang, Fang Wang, et al.
(2022), pp. 20-20
Closed Access
Attack Graphs for Standalone Non-Public 5G Networks
Arpit Tripathi, Abhishek Thakur, Bheemarjuna Reddy Tamma
(2022), pp. 158-163
Open Access
Arpit Tripathi, Abhishek Thakur, Bheemarjuna Reddy Tamma
(2022), pp. 158-163
Open Access
A Markov Game Model for AI-based Cyber Security Attack Mitigation.
Hooman Alavizadeh, Julian Jang‐Jaccard, Tansu Alpcan, et al.
arXiv (Cornell University) (2021)
Closed Access
Hooman Alavizadeh, Julian Jang‐Jaccard, Tansu Alpcan, et al.
arXiv (Cornell University) (2021)
Closed Access
An Attack Path Prediction Method based on The Attack-Defense Game Theory in CBTC
Naiyue Chen, Hongwei Wang, Lingshuai Meng, et al.
2021 China Automation Congress (CAC) (2021), pp. 1824-1829
Closed Access
Naiyue Chen, Hongwei Wang, Lingshuai Meng, et al.
2021 China Automation Congress (CAC) (2021), pp. 1824-1829
Closed Access
Protecting Resources Against Volumetric and Non-volumetric Network Attacks
Rajorshi Biswas, Jie Wu
(2021), pp. 387-395
Closed Access
Rajorshi Biswas, Jie Wu
(2021), pp. 387-395
Closed Access