Optimizing physical protection system using domain experienced exploration method Article Swipe
YOU?
·
· 2019
· Open Access
·
· DOI: https://doi.org/10.1080/00051144.2019.1698192
Assessing physical protection system efficiency is mostly done manually by security experts due to the complexity of the assessment process and lack of tools. Computer aided numerical vulnerability analysis has been developed to quantitatively assess physical protection systems. A variety of methods have been proposed to optimize physical protection systems, where one of the most advanced approaches entails precisely defining which security components should be selected and where they should be placed at protected facilities, taking into consideration adversary type, to maximize the probability that an adversary will be stopped at minimum system cost. The most computationally intensive part of the optimization process is the evaluation. The evaluation involves recreating search space and finding optimal adversary’s attack paths from each entry point. We present the domain experienced exploration method that optimizes evaluation process during the search for optimum solutions, considering results from previous evaluations. Performed experiments show that using the presented method, in real-world domains, results in a reduction of evaluation iterations.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1080/00051144.2019.1698192
- https://www.tandfonline.com/doi/pdf/10.1080/00051144.2019.1698192?needAccess=true
- OA Status
- gold
- Cited By
- 6
- References
- 24
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W2994616295
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W2994616295Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1080/00051144.2019.1698192Digital Object Identifier
- Title
-
Optimizing physical protection system using domain experienced exploration methodWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2019Year of publication
- Publication date
-
2019-12-09Full publication date if available
- Authors
-
Dejan Čakija, Željko Ban, Marin Golub, Dino ČakijaList of authors in order
- Landing page
-
https://doi.org/10.1080/00051144.2019.1698192Publisher landing page
- PDF URL
-
https://www.tandfonline.com/doi/pdf/10.1080/00051144.2019.1698192?needAccess=trueDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://www.tandfonline.com/doi/pdf/10.1080/00051144.2019.1698192?needAccess=trueDirect OA link when available
- Concepts
-
Adversary, Process (computing), Vulnerability (computing), Computer science, Domain (mathematical analysis), Reduction (mathematics), Variety (cybernetics), Reliability engineering, Physical security, Point (geometry), Distributed computing, Computer security, Engineering, Artificial intelligence, Mathematics, Geometry, Mathematical analysis, Operating systemTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
6Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 1, 2022: 4, 2021: 1Per-year citation counts (last 5 years)
- References (count)
-
24Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W2994616295 |
|---|---|
| doi | https://doi.org/10.1080/00051144.2019.1698192 |
| ids.doi | https://doi.org/10.1080/00051144.2019.1698192 |
| ids.mag | 2994616295 |
| ids.openalex | https://openalex.org/W2994616295 |
| fwci | 0.97726343 |
| type | article |
| title | Optimizing physical protection system using domain experienced exploration method |
| biblio.issue | 2 |
| biblio.volume | 61 |
| biblio.last_page | 218 |
| biblio.first_page | 207 |
| topics[0].id | https://openalex.org/T11807 |
| topics[0].field.id | https://openalex.org/fields/22 |
| topics[0].field.display_name | Engineering |
| topics[0].score | 0.996999979019165 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/2205 |
| topics[0].subfield.display_name | Civil and Structural Engineering |
| topics[0].display_name | Infrastructure Resilience and Vulnerability Analysis |
| topics[1].id | https://openalex.org/T10928 |
| topics[1].field.id | https://openalex.org/fields/18 |
| topics[1].field.display_name | Decision Sciences |
| topics[1].score | 0.9897000193595886 |
| topics[1].domain.id | https://openalex.org/domains/2 |
| topics[1].domain.display_name | Social Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1804 |
| topics[1].subfield.display_name | Statistics, Probability and Uncertainty |
| topics[1].display_name | Probabilistic and Robust Engineering Design |
| topics[2].id | https://openalex.org/T11500 |
| topics[2].field.id | https://openalex.org/fields/22 |
| topics[2].field.display_name | Engineering |
| topics[2].score | 0.986299991607666 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/2212 |
| topics[2].subfield.display_name | Ocean Engineering |
| topics[2].display_name | Evacuation and Crowd Dynamics |
| is_xpac | False |
| apc_list.value | 850 |
| apc_list.currency | USD |
| apc_list.value_usd | 850 |
| apc_paid.value | 850 |
| apc_paid.currency | USD |
| apc_paid.value_usd | 850 |
| concepts[0].id | https://openalex.org/C41065033 |
| concepts[0].level | 2 |
| concepts[0].score | 0.8136343955993652 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q2825412 |
| concepts[0].display_name | Adversary |
| concepts[1].id | https://openalex.org/C98045186 |
| concepts[1].level | 2 |
| concepts[1].score | 0.6648786664009094 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q205663 |
| concepts[1].display_name | Process (computing) |
| concepts[2].id | https://openalex.org/C95713431 |
| concepts[2].level | 2 |
| concepts[2].score | 0.6609934568405151 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q631425 |
| concepts[2].display_name | Vulnerability (computing) |
| concepts[3].id | https://openalex.org/C41008148 |
| concepts[3].level | 0 |
| concepts[3].score | 0.6448689699172974 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[3].display_name | Computer science |
| concepts[4].id | https://openalex.org/C36503486 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5858653783798218 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q11235244 |
| concepts[4].display_name | Domain (mathematical analysis) |
| concepts[5].id | https://openalex.org/C111335779 |
| concepts[5].level | 2 |
| concepts[5].score | 0.4915388524532318 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q3454686 |
| concepts[5].display_name | Reduction (mathematics) |
| concepts[6].id | https://openalex.org/C136197465 |
| concepts[6].level | 2 |
| concepts[6].score | 0.47558557987213135 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q1729295 |
| concepts[6].display_name | Variety (cybernetics) |
| concepts[7].id | https://openalex.org/C200601418 |
| concepts[7].level | 1 |
| concepts[7].score | 0.47398367524147034 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q2193887 |
| concepts[7].display_name | Reliability engineering |
| concepts[8].id | https://openalex.org/C2776157020 |
| concepts[8].level | 2 |
| concepts[8].score | 0.46514973044395447 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q851598 |
| concepts[8].display_name | Physical security |
| concepts[9].id | https://openalex.org/C28719098 |
| concepts[9].level | 2 |
| concepts[9].score | 0.45951545238494873 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q44946 |
| concepts[9].display_name | Point (geometry) |
| concepts[10].id | https://openalex.org/C120314980 |
| concepts[10].level | 1 |
| concepts[10].score | 0.35170304775238037 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q180634 |
| concepts[10].display_name | Distributed computing |
| concepts[11].id | https://openalex.org/C38652104 |
| concepts[11].level | 1 |
| concepts[11].score | 0.2753007411956787 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[11].display_name | Computer security |
| concepts[12].id | https://openalex.org/C127413603 |
| concepts[12].level | 0 |
| concepts[12].score | 0.2214292585849762 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q11023 |
| concepts[12].display_name | Engineering |
| concepts[13].id | https://openalex.org/C154945302 |
| concepts[13].level | 1 |
| concepts[13].score | 0.17001637816429138 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[13].display_name | Artificial intelligence |
| concepts[14].id | https://openalex.org/C33923547 |
| concepts[14].level | 0 |
| concepts[14].score | 0.10344579815864563 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[14].display_name | Mathematics |
| concepts[15].id | https://openalex.org/C2524010 |
| concepts[15].level | 1 |
| concepts[15].score | 0.0 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q8087 |
| concepts[15].display_name | Geometry |
| concepts[16].id | https://openalex.org/C134306372 |
| concepts[16].level | 1 |
| concepts[16].score | 0.0 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q7754 |
| concepts[16].display_name | Mathematical analysis |
| concepts[17].id | https://openalex.org/C111919701 |
| concepts[17].level | 1 |
| concepts[17].score | 0.0 |
| concepts[17].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[17].display_name | Operating system |
| keywords[0].id | https://openalex.org/keywords/adversary |
| keywords[0].score | 0.8136343955993652 |
| keywords[0].display_name | Adversary |
| keywords[1].id | https://openalex.org/keywords/process |
| keywords[1].score | 0.6648786664009094 |
| keywords[1].display_name | Process (computing) |
| keywords[2].id | https://openalex.org/keywords/vulnerability |
| keywords[2].score | 0.6609934568405151 |
| keywords[2].display_name | Vulnerability (computing) |
| keywords[3].id | https://openalex.org/keywords/computer-science |
| keywords[3].score | 0.6448689699172974 |
| keywords[3].display_name | Computer science |
| keywords[4].id | https://openalex.org/keywords/domain |
| keywords[4].score | 0.5858653783798218 |
| keywords[4].display_name | Domain (mathematical analysis) |
| keywords[5].id | https://openalex.org/keywords/reduction |
| keywords[5].score | 0.4915388524532318 |
| keywords[5].display_name | Reduction (mathematics) |
| keywords[6].id | https://openalex.org/keywords/variety |
| keywords[6].score | 0.47558557987213135 |
| keywords[6].display_name | Variety (cybernetics) |
| keywords[7].id | https://openalex.org/keywords/reliability-engineering |
| keywords[7].score | 0.47398367524147034 |
| keywords[7].display_name | Reliability engineering |
| keywords[8].id | https://openalex.org/keywords/physical-security |
| keywords[8].score | 0.46514973044395447 |
| keywords[8].display_name | Physical security |
| keywords[9].id | https://openalex.org/keywords/point |
| keywords[9].score | 0.45951545238494873 |
| keywords[9].display_name | Point (geometry) |
| keywords[10].id | https://openalex.org/keywords/distributed-computing |
| keywords[10].score | 0.35170304775238037 |
| keywords[10].display_name | Distributed computing |
| keywords[11].id | https://openalex.org/keywords/computer-security |
| keywords[11].score | 0.2753007411956787 |
| keywords[11].display_name | Computer security |
| keywords[12].id | https://openalex.org/keywords/engineering |
| keywords[12].score | 0.2214292585849762 |
| keywords[12].display_name | Engineering |
| keywords[13].id | https://openalex.org/keywords/artificial-intelligence |
| keywords[13].score | 0.17001637816429138 |
| keywords[13].display_name | Artificial intelligence |
| keywords[14].id | https://openalex.org/keywords/mathematics |
| keywords[14].score | 0.10344579815864563 |
| keywords[14].display_name | Mathematics |
| language | en |
| locations[0].id | doi:10.1080/00051144.2019.1698192 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S62387513 |
| locations[0].source.issn | 0005-1144, 1848-3380 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 0005-1144 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | True |
| locations[0].source.display_name | Automatika |
| locations[0].source.host_organization | https://openalex.org/P4310320547 |
| locations[0].source.host_organization_name | Taylor & Francis |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310320547 |
| locations[0].source.host_organization_lineage_names | Taylor & Francis |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://www.tandfonline.com/doi/pdf/10.1080/00051144.2019.1698192?needAccess=true |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Automatika |
| locations[0].landing_page_url | https://doi.org/10.1080/00051144.2019.1698192 |
| locations[1].id | pmh:oai:doaj.org/article:364d26b7247b40bea145dd4adc802241 |
| locations[1].is_oa | False |
| locations[1].source.id | https://openalex.org/S4306401280 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | DOAJ (DOAJ: Directory of Open Access Journals) |
| locations[1].source.host_organization | |
| locations[1].source.host_organization_name | |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | article |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | Automatika, Vol 61, Iss 2, Pp 207-218 (2020) |
| locations[1].landing_page_url | https://doaj.org/article/364d26b7247b40bea145dd4adc802241 |
| indexed_in | crossref, doaj |
| authorships[0].author.id | https://openalex.org/A5013181639 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | Dejan Čakija |
| authorships[0].countries | HR |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I181343428 |
| authorships[0].affiliations[0].raw_affiliation_string | Faculty of Electrical Engineering and Computing, University of Zagreb, Zagreb, Croatia |
| authorships[0].institutions[0].id | https://openalex.org/I181343428 |
| authorships[0].institutions[0].ror | https://ror.org/00mv6sv71 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I181343428 |
| authorships[0].institutions[0].country_code | HR |
| authorships[0].institutions[0].display_name | University of Zagreb |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Dejan Čakija |
| authorships[0].is_corresponding | True |
| authorships[0].raw_affiliation_strings | Faculty of Electrical Engineering and Computing, University of Zagreb, Zagreb, Croatia |
| authorships[1].author.id | https://openalex.org/A5101796455 |
| authorships[1].author.orcid | https://orcid.org/0000-0003-1712-0597 |
| authorships[1].author.display_name | Željko Ban |
| authorships[1].countries | HR |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I181343428 |
| authorships[1].affiliations[0].raw_affiliation_string | Faculty of Electrical Engineering and Computing, University of Zagreb, Zagreb, Croatia |
| authorships[1].institutions[0].id | https://openalex.org/I181343428 |
| authorships[1].institutions[0].ror | https://ror.org/00mv6sv71 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I181343428 |
| authorships[1].institutions[0].country_code | HR |
| authorships[1].institutions[0].display_name | University of Zagreb |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Željko Ban |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Faculty of Electrical Engineering and Computing, University of Zagreb, Zagreb, Croatia |
| authorships[2].author.id | https://openalex.org/A5089655833 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-8042-7076 |
| authorships[2].author.display_name | Marin Golub |
| authorships[2].countries | HR |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I181343428 |
| authorships[2].affiliations[0].raw_affiliation_string | Faculty of Electrical Engineering and Computing, University of Zagreb, Zagreb, Croatia |
| authorships[2].institutions[0].id | https://openalex.org/I181343428 |
| authorships[2].institutions[0].ror | https://ror.org/00mv6sv71 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I181343428 |
| authorships[2].institutions[0].country_code | HR |
| authorships[2].institutions[0].display_name | University of Zagreb |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Marin Golub |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Faculty of Electrical Engineering and Computing, University of Zagreb, Zagreb, Croatia |
| authorships[3].author.id | https://openalex.org/A5026216621 |
| authorships[3].author.orcid | https://orcid.org/0000-0003-0362-0275 |
| authorships[3].author.display_name | Dino Čakija |
| authorships[3].countries | HR |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I181343428 |
| authorships[3].affiliations[0].raw_affiliation_string | Faculty of Transport and Traffic Sciences, University of Zagreb, Zagreb, Croatia |
| authorships[3].institutions[0].id | https://openalex.org/I181343428 |
| authorships[3].institutions[0].ror | https://ror.org/00mv6sv71 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I181343428 |
| authorships[3].institutions[0].country_code | HR |
| authorships[3].institutions[0].display_name | University of Zagreb |
| authorships[3].author_position | last |
| authorships[3].raw_author_name | Dino Čakija |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | Faculty of Transport and Traffic Sciences, University of Zagreb, Zagreb, Croatia |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://www.tandfonline.com/doi/pdf/10.1080/00051144.2019.1698192?needAccess=true |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Optimizing physical protection system using domain experienced exploration method |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11807 |
| primary_topic.field.id | https://openalex.org/fields/22 |
| primary_topic.field.display_name | Engineering |
| primary_topic.score | 0.996999979019165 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/2205 |
| primary_topic.subfield.display_name | Civil and Structural Engineering |
| primary_topic.display_name | Infrastructure Resilience and Vulnerability Analysis |
| related_works | https://openalex.org/W4388150944, https://openalex.org/W4242235492, https://openalex.org/W2367268135, https://openalex.org/W4237162029, https://openalex.org/W1480190076, https://openalex.org/W2385701518, https://openalex.org/W4237464767, https://openalex.org/W1658340114, https://openalex.org/W3122105331, https://openalex.org/W1481299995 |
| cited_by_count | 6 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 1 |
| counts_by_year[1].year | 2022 |
| counts_by_year[1].cited_by_count | 4 |
| counts_by_year[2].year | 2021 |
| counts_by_year[2].cited_by_count | 1 |
| locations_count | 2 |
| best_oa_location.id | doi:10.1080/00051144.2019.1698192 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S62387513 |
| best_oa_location.source.issn | 0005-1144, 1848-3380 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 0005-1144 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | True |
| best_oa_location.source.display_name | Automatika |
| best_oa_location.source.host_organization | https://openalex.org/P4310320547 |
| best_oa_location.source.host_organization_name | Taylor & Francis |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310320547 |
| best_oa_location.source.host_organization_lineage_names | Taylor & Francis |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://www.tandfonline.com/doi/pdf/10.1080/00051144.2019.1698192?needAccess=true |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Automatika |
| best_oa_location.landing_page_url | https://doi.org/10.1080/00051144.2019.1698192 |
| primary_location.id | doi:10.1080/00051144.2019.1698192 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S62387513 |
| primary_location.source.issn | 0005-1144, 1848-3380 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 0005-1144 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | True |
| primary_location.source.display_name | Automatika |
| primary_location.source.host_organization | https://openalex.org/P4310320547 |
| primary_location.source.host_organization_name | Taylor & Francis |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310320547 |
| primary_location.source.host_organization_lineage_names | Taylor & Francis |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://www.tandfonline.com/doi/pdf/10.1080/00051144.2019.1698192?needAccess=true |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Automatika |
| primary_location.landing_page_url | https://doi.org/10.1080/00051144.2019.1698192 |
| publication_date | 2019-12-09 |
| publication_year | 2019 |
| referenced_works | https://openalex.org/W4293262705, https://openalex.org/W2890042510, https://openalex.org/W2543981688, https://openalex.org/W2012521921, https://openalex.org/W2073323528, https://openalex.org/W2243460646, https://openalex.org/W1984579363, https://openalex.org/W2281061266, https://openalex.org/W1969483458, https://openalex.org/W2888670275, https://openalex.org/W2603665581, https://openalex.org/W2027154034, https://openalex.org/W2098303423, https://openalex.org/W3510764, https://openalex.org/W297841065, https://openalex.org/W2126105956, https://openalex.org/W1898289477, https://openalex.org/W2593792819, https://openalex.org/W1775783412, https://openalex.org/W1605128581, https://openalex.org/W2288352986, https://openalex.org/W17244859, https://openalex.org/W2261054240, https://openalex.org/W2566652907 |
| referenced_works_count | 24 |
| abstract_inverted_index.A | 38 |
| abstract_inverted_index.a | 157 |
| abstract_inverted_index.We | 122 |
| abstract_inverted_index.an | 85 |
| abstract_inverted_index.at | 72, 90 |
| abstract_inverted_index.be | 64, 70, 88 |
| abstract_inverted_index.by | 9 |
| abstract_inverted_index.in | 152, 156 |
| abstract_inverted_index.is | 5, 103 |
| abstract_inverted_index.of | 16, 22, 40, 52, 99, 159 |
| abstract_inverted_index.to | 13, 32, 45, 80 |
| abstract_inverted_index.The | 94, 106 |
| abstract_inverted_index.and | 20, 66, 112 |
| abstract_inverted_index.due | 12 |
| abstract_inverted_index.for | 136 |
| abstract_inverted_index.has | 29 |
| abstract_inverted_index.one | 51 |
| abstract_inverted_index.the | 14, 17, 53, 82, 100, 104, 124, 134, 149 |
| abstract_inverted_index.been | 30, 43 |
| abstract_inverted_index.done | 7 |
| abstract_inverted_index.each | 119 |
| abstract_inverted_index.from | 118, 141 |
| abstract_inverted_index.have | 42 |
| abstract_inverted_index.into | 76 |
| abstract_inverted_index.lack | 21 |
| abstract_inverted_index.most | 54, 95 |
| abstract_inverted_index.part | 98 |
| abstract_inverted_index.show | 146 |
| abstract_inverted_index.that | 84, 129, 147 |
| abstract_inverted_index.they | 68 |
| abstract_inverted_index.will | 87 |
| abstract_inverted_index.aided | 25 |
| abstract_inverted_index.cost. | 93 |
| abstract_inverted_index.entry | 120 |
| abstract_inverted_index.paths | 117 |
| abstract_inverted_index.space | 111 |
| abstract_inverted_index.type, | 79 |
| abstract_inverted_index.using | 148 |
| abstract_inverted_index.where | 50, 67 |
| abstract_inverted_index.which | 60 |
| abstract_inverted_index.assess | 34 |
| abstract_inverted_index.attack | 116 |
| abstract_inverted_index.domain | 125 |
| abstract_inverted_index.during | 133 |
| abstract_inverted_index.method | 128 |
| abstract_inverted_index.mostly | 6 |
| abstract_inverted_index.placed | 71 |
| abstract_inverted_index.point. | 121 |
| abstract_inverted_index.search | 110, 135 |
| abstract_inverted_index.should | 63, 69 |
| abstract_inverted_index.system | 3, 92 |
| abstract_inverted_index.taking | 75 |
| abstract_inverted_index.tools. | 23 |
| abstract_inverted_index.entails | 57 |
| abstract_inverted_index.experts | 11 |
| abstract_inverted_index.finding | 113 |
| abstract_inverted_index.method, | 151 |
| abstract_inverted_index.methods | 41 |
| abstract_inverted_index.minimum | 91 |
| abstract_inverted_index.optimal | 114 |
| abstract_inverted_index.optimum | 137 |
| abstract_inverted_index.present | 123 |
| abstract_inverted_index.process | 19, 102, 132 |
| abstract_inverted_index.results | 140, 155 |
| abstract_inverted_index.stopped | 89 |
| abstract_inverted_index.variety | 39 |
| abstract_inverted_index.Computer | 24 |
| abstract_inverted_index.advanced | 55 |
| abstract_inverted_index.analysis | 28 |
| abstract_inverted_index.defining | 59 |
| abstract_inverted_index.domains, | 154 |
| abstract_inverted_index.involves | 108 |
| abstract_inverted_index.manually | 8 |
| abstract_inverted_index.maximize | 81 |
| abstract_inverted_index.optimize | 46 |
| abstract_inverted_index.physical | 1, 35, 47 |
| abstract_inverted_index.previous | 142 |
| abstract_inverted_index.proposed | 44 |
| abstract_inverted_index.security | 10, 61 |
| abstract_inverted_index.selected | 65 |
| abstract_inverted_index.systems, | 49 |
| abstract_inverted_index.systems. | 37 |
| abstract_inverted_index.Assessing | 0 |
| abstract_inverted_index.Performed | 144 |
| abstract_inverted_index.adversary | 78, 86 |
| abstract_inverted_index.developed | 31 |
| abstract_inverted_index.intensive | 97 |
| abstract_inverted_index.numerical | 26 |
| abstract_inverted_index.optimizes | 130 |
| abstract_inverted_index.precisely | 58 |
| abstract_inverted_index.presented | 150 |
| abstract_inverted_index.protected | 73 |
| abstract_inverted_index.reduction | 158 |
| abstract_inverted_index.approaches | 56 |
| abstract_inverted_index.assessment | 18 |
| abstract_inverted_index.complexity | 15 |
| abstract_inverted_index.components | 62 |
| abstract_inverted_index.efficiency | 4 |
| abstract_inverted_index.evaluation | 107, 131, 160 |
| abstract_inverted_index.protection | 2, 36, 48 |
| abstract_inverted_index.real-world | 153 |
| abstract_inverted_index.recreating | 109 |
| abstract_inverted_index.solutions, | 138 |
| abstract_inverted_index.considering | 139 |
| abstract_inverted_index.evaluation. | 105 |
| abstract_inverted_index.experienced | 126 |
| abstract_inverted_index.experiments | 145 |
| abstract_inverted_index.exploration | 127 |
| abstract_inverted_index.facilities, | 74 |
| abstract_inverted_index.iterations. | 161 |
| abstract_inverted_index.probability | 83 |
| abstract_inverted_index.evaluations. | 143 |
| abstract_inverted_index.optimization | 101 |
| abstract_inverted_index.adversary’s | 115 |
| abstract_inverted_index.consideration | 77 |
| abstract_inverted_index.vulnerability | 27 |
| abstract_inverted_index.quantitatively | 33 |
| abstract_inverted_index.computationally | 96 |
| cited_by_percentile_year.max | 97 |
| cited_by_percentile_year.min | 89 |
| corresponding_author_ids | https://openalex.org/A5013181639 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 4 |
| corresponding_institution_ids | https://openalex.org/I181343428 |
| citation_normalized_percentile.value | 0.77206411 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |