An Improved Information Security Risk Assessments Method for Cyber-Physical-Social Computing and Networking

In virtue of the rapid development of the Internet of Things (IoT), Organizations have grown to rely on their cyber systems and networks. However, this phenomenon also creates many new information security issues. In this paper, we propose an evolutionary algorithm improved cuckoo search (ICS) to pr...

Full description

Saved in:
Bibliographic Details
Published inIEEE access Vol. 6; pp. 10311 - 10319
Main Authors Li, Senyu, Bi, Fangming, Chen, Wei, Miao, Xuzhi, Liu, Jin, Tang, Chaogang
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 01.01.2018
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN2169-3536
2169-3536
DOI10.1109/ACCESS.2018.2800664

Cover

Abstract In virtue of the rapid development of the Internet of Things (IoT), Organizations have grown to rely on their cyber systems and networks. However, this phenomenon also creates many new information security issues. In this paper, we propose an evolutionary algorithm improved cuckoo search (ICS) to pretrain a backpropagation neural network (BPNN) for the sake of improving the accuracy and stability. Using this pre-training process, the BPNN can surmount the defect of falling into the local minima and greatly improve its efficiency. Then, this neural network is used as a part of information security risk assessment (ISRA) processes for a miniature IoT system. An illustration example is introduced to demonstrate that the ICS-BPNN outperforms other neural networks in this ISRA process.
AbstractList In virtue of the rapid development of the Internet of Things (IoT), Organizations have grown to rely on their cyber systems and networks. However, this phenomenon also creates many new information security issues. In this paper, we propose an evolutionary algorithm improved cuckoo search (ICS) to pretrain a backpropagation neural network (BPNN) for the sake of improving the accuracy and stability. Using this pre-training process, the BPNN can surmount the defect of falling into the local minima and greatly improve its efficiency. Then, this neural network is used as a part of information security risk assessment (ISRA) processes for a miniature IoT system. An illustration example is introduced to demonstrate that the ICS-BPNN outperforms other neural networks in this ISRA process.
Author Chen, Wei
Liu, Jin
Tang, Chaogang
Li, Senyu
Bi, Fangming
Miao, Xuzhi
Author_xml – sequence: 1
  givenname: Senyu
  surname: Li
  fullname: Li, Senyu
  organization: Department of Computer Science and Technology, China University of Mining and Technology, Xuzhou, China
– sequence: 2
  givenname: Fangming
  surname: Bi
  fullname: Bi, Fangming
  email: bfm@cumt.edu.cn
  organization: Department of Computer Science and Technology, China University of Mining and Technology, Xuzhou, China
– sequence: 3
  givenname: Wei
  orcidid: 0000-0002-7663-278X
  surname: Chen
  fullname: Chen, Wei
  email: chenw@cumt.edu.cn
  organization: Department of Computer Science and Technology, China University of Mining and Technology, Xuzhou, China
– sequence: 4
  givenname: Xuzhi
  surname: Miao
  fullname: Miao, Xuzhi
  organization: Department of Computer Science and Technology, China University of Mining and Technology, Xuzhou, China
– sequence: 5
  givenname: Jin
  surname: Liu
  fullname: Liu, Jin
  email: jinliu@cumt.edu.cn
  organization: Department of Computer Science and Technology, China University of Mining and Technology, Xuzhou, China
– sequence: 6
  givenname: Chaogang
  orcidid: 0000-0002-4471-9856
  surname: Tang
  fullname: Tang, Chaogang
  organization: Department of Computer Science and Technology, China University of Mining and Technology, Xuzhou, China
BookMark eNqFkU1v1DAQhiNUJErpL-jFEucs_srXcRUVWKkUxMLZmtizrXcTe7GdVvn3pE1VVeWAL2OP3vex5p332YnzDrPsgtEVY7T5tG7by-12xSmrV7ymtCzlm-yUs7LJRSHKkxf3d9l5jHs6n3puFdVpdlg7shmOwd-hIRu382GAZL0jW9RjsGkiP208kHWMGOOALkXyDdOtN2SWknbqMOQ_bqdoNfT51msLPWn9cByTdTcEnCHXmO59OMzPD9nbHfQRz5_qWfb78-Wv9mt-9f3Lpl1f5VrSOuWGCgOCGgaA2jANnKHBTte8QallVzBOBas6obmhRlZQYS2xY7yrTcXLUpxlm4VrPOzVMdgBwqQ8WPXY8OFGQUhW96g6pFjqojGmYBIMNIIyKSvcYUcbA3RmyYU1uiNM99D3z0BG1UP-CrSes1EP-aun_Gfbx8U2J_tnxJjU3o_BzVMrLouiYVzWfFaJRaWDjzHg7h_2stvX7OaVS9v0uLQUwPb_8V4sXouIz7_VvCp5U4i_zNC0WQ
CODEN IAECCG
CitedBy_id crossref_primary_10_1007_s00354_022_00188_w
crossref_primary_10_3390_ijgi12100404
crossref_primary_10_4018_IJSI_315662
crossref_primary_10_1109_ACCESS_2021_3112397
crossref_primary_10_7717_peerj_cs_1729
crossref_primary_10_1145_3331174
crossref_primary_10_3233_JIFS_231880
crossref_primary_10_3390_info13110533
crossref_primary_10_1109_ACCESS_2018_2861319
crossref_primary_10_1177_1550147720971517
crossref_primary_10_1016_j_jnca_2020_102761
crossref_primary_10_1007_s11042_022_13836_6
crossref_primary_10_1109_TETCI_2019_2941757
crossref_primary_10_3390_systems11050218
crossref_primary_10_1109_ACCESS_2018_2888510
crossref_primary_10_1007_s13369_020_04476_9
crossref_primary_10_1007_s11227_025_06932_5
crossref_primary_10_12720_jait_15_9_1070_1078
crossref_primary_10_1016_j_techfore_2021_120642
crossref_primary_10_3390_s22072593
crossref_primary_10_3390_electronics12183958
crossref_primary_10_1109_ACCESS_2019_2961997
crossref_primary_10_1016_j_measen_2023_100700
crossref_primary_10_1080_0952813X_2021_1970824
crossref_primary_10_1155_2021_2398460
Cites_doi 10.1016/j.ijinfomgt.2015.09.003
10.1007/s00366-011-0241-y
10.1016/j.ress.2011.09.006
10.1155/2014/878262
10.1109/MCOM.2017.1700142
10.1109/TIFS.2015.2455414
10.1111/risa.12891
10.1016/j.ces.2017.09.002
10.1109/ACCESS.2017.2757605
10.1016/j.swevo.2015.05.003
10.1109/ACCESS.2015.2506185
10.1007/s11277-011-0288-5
10.1016/j.neucom.2017.06.083
10.1109/MCOM.2017.1700212
10.1109/TCYB.2016.2537649
10.1109/TSG.2016.2519239
10.1016/j.cose.2015.11.001
10.1109/ACCESS.2016.2614541
10.1109/MCOM.2017.1600822
10.1016/j.comnet.2010.05.010
10.1002/ett.2704
10.1109/TPWRS.2017.2687983
10.1108/JSIT-02-2015-0013
10.1109/TCC.2017.2649525
10.1021/ie5016574
10.1109/JSYST.2017.2765178
10.1109/NABIC.2009.5393690
10.1109/TPWRD.2008.2008470
10.1109/ACCESS.2017.2685592
10.1109/MCOM.2018.1700592
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018
DBID 97E
ESBDL
RIA
RIE
AAYXX
CITATION
7SC
7SP
7SR
8BQ
8FD
JG9
JQ2
L7M
L~C
L~D
ADTOC
UNPAY
DOA
DOI 10.1109/ACCESS.2018.2800664
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE Xplore Open Access Journals
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Engineered Materials Abstracts
METADEX
Technology Research Database
Materials Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Unpaywall for CDI: Periodical Content
Unpaywall
DOAJ Open Access Full Text
DatabaseTitle CrossRef
Materials Research Database
Engineered Materials Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
METADEX
Computer and Information Systems Abstracts Professional
DatabaseTitleList Materials Research Database


Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: RIE
  name: IEEE Xplore
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
– sequence: 3
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2169-3536
EndPage 10319
ExternalDocumentID oai_doaj_org_article_be0e6c59dd514ada9301447efeb09da0
10.1109/access.2018.2800664
10_1109_ACCESS_2018_2800664
8276295
Genre orig-research
GrantInformation_xml – fundername: China Post-Doctoral Science Foundation
  grantid: 2013T60574
  funderid: 10.13039/501100002858
– fundername: Natural Science Foundation of Jiangsu Province
  grantid: BK20130210
  funderid: 10.13039/501100004608
– fundername: QingLan Project
– fundername: National Natural Science Foundation and Shanxi Provincial People’s Government Jointly Funded Project of China for Coal Base and Low Carbon
  grantid: U1510115
– fundername: National Natural Science Foundation of China
  grantid: 61303182
  funderid: 10.13039/501100001809
GroupedDBID 0R~
4.4
5VS
6IK
97E
AAJGR
ABAZT
ABVLG
ACGFS
ADBBV
AGSQL
ALMA_UNASSIGNED_HOLDINGS
BCNDV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
EJD
ESBDL
GROUPED_DOAJ
IPLJI
JAVBF
KQ8
M43
M~E
O9-
OCL
OK1
RIA
RIE
RNS
AAYXX
CITATION
7SC
7SP
7SR
8BQ
8FD
JG9
JQ2
L7M
L~C
L~D
RIG
ADTOC
UNPAY
ID FETCH-LOGICAL-c408t-d03da30d1aaecd1ca21edebc829e4c4b5120317b3c2d0d47a7e84eb12b8d72663
IEDL.DBID RIE
ISSN 2169-3536
IngestDate Fri Oct 03 12:38:50 EDT 2025
Sun Sep 07 11:11:56 EDT 2025
Sun Jun 29 15:56:36 EDT 2025
Wed Oct 01 02:57:40 EDT 2025
Thu Apr 24 22:52:37 EDT 2025
Wed Aug 27 02:44:46 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/OAPA.html
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c408t-d03da30d1aaecd1ca21edebc829e4c4b5120317b3c2d0d47a7e84eb12b8d72663
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-4471-9856
0000-0002-7663-278X
OpenAccessLink https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/document/8276295
PQID 2455912482
PQPubID 4845423
PageCount 9
ParticipantIDs proquest_journals_2455912482
ieee_primary_8276295
unpaywall_primary_10_1109_access_2018_2800664
crossref_primary_10_1109_ACCESS_2018_2800664
crossref_citationtrail_10_1109_ACCESS_2018_2800664
doaj_primary_oai_doaj_org_article_be0e6c59dd514ada9301447efeb09da0
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2018-01-01
PublicationDateYYYYMMDD 2018-01-01
PublicationDate_xml – month: 01
  year: 2018
  text: 2018-01-01
  day: 01
PublicationDecade 2010
PublicationPlace Piscataway
PublicationPlace_xml – name: Piscataway
PublicationTitle IEEE access
PublicationTitleAbbrev Access
PublicationYear 2018
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref12
ref14
ref31
ref30
ref11
ref32
ref10
ref2
ref1
ref17
ref16
ref19
ref24
ref23
ref26
ref25
ref20
ref22
ref21
ref28
ref27
ref29
ref8
ref7
nandy (ref15) 2012; 4
zhao (ref18) 2010; 37
ref9
ref4
ref3
ref6
ref5
References_xml – ident: ref23
  doi: 10.1016/j.ijinfomgt.2015.09.003
– ident: ref29
  doi: 10.1007/s00366-011-0241-y
– volume: 4
  start-page: 33
  year: 2012
  ident: ref15
  article-title: Training a feed-forward neural network with artificial bee colony based backpropagation method
  publication-title: Int J Comput Sci Inf Technol
– ident: ref12
  doi: 10.1016/j.ress.2011.09.006
– ident: ref30
  doi: 10.1155/2014/878262
– ident: ref6
  doi: 10.1109/MCOM.2017.1700142
– ident: ref11
  doi: 10.1109/TIFS.2015.2455414
– ident: ref21
  doi: 10.1111/risa.12891
– ident: ref17
  doi: 10.1016/j.ces.2017.09.002
– ident: ref22
  doi: 10.1109/ACCESS.2017.2757605
– ident: ref31
  doi: 10.1016/j.swevo.2015.05.003
– ident: ref26
  doi: 10.1109/ACCESS.2015.2506185
– ident: ref4
  doi: 10.1007/s11277-011-0288-5
– ident: ref13
  doi: 10.1016/j.neucom.2017.06.083
– volume: 37
  start-page: 90
  year: 2010
  ident: ref18
  article-title: Risk assessment of information security based on improved wavelet neural network
  publication-title: Comput Sci
– ident: ref3
  doi: 10.1109/MCOM.2017.1700212
– ident: ref16
  doi: 10.1109/TCYB.2016.2537649
– ident: ref9
  doi: 10.1109/TSG.2016.2519239
– ident: ref10
  doi: 10.1016/j.cose.2015.11.001
– ident: ref25
  doi: 10.1109/ACCESS.2016.2614541
– ident: ref7
  doi: 10.1109/MCOM.2017.1600822
– ident: ref2
  doi: 10.1016/j.comnet.2010.05.010
– ident: ref5
  doi: 10.1002/ett.2704
– ident: ref19
  doi: 10.1109/TPWRS.2017.2687983
– ident: ref27
  doi: 10.1108/JSIT-02-2015-0013
– ident: ref8
  doi: 10.1109/TCC.2017.2649525
– ident: ref32
  doi: 10.1021/ie5016574
– ident: ref14
  doi: 10.1109/JSYST.2017.2765178
– ident: ref28
  doi: 10.1109/NABIC.2009.5393690
– ident: ref20
  doi: 10.1109/TPWRD.2008.2008470
– ident: ref24
  doi: 10.1109/ACCESS.2017.2685592
– ident: ref1
  doi: 10.1109/MCOM.2018.1700592
SSID ssj0000816957
Score 2.3065403
Snippet In virtue of the rapid development of the Internet of Things (IoT), Organizations have grown to rely on their cyber systems and networks. However, this...
SourceID doaj
unpaywall
proquest
crossref
ieee
SourceType Open Website
Open Access Repository
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 10311
SubjectTerms Artificial neural networks
Back propagation
Back propagation networks
BP neural network
cuckoo search algorithm
Evolutionary algorithms
Information security
Information security risk assessment
Integrated circuits
Internet of Things
Neural networks
Organizations
Risk assessment
Risk management
Search algorithms
Security
Security management
Sociology
Standards organizations
SummonAdditionalLinks – databaseName: DOAJ Open Access Full Text
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3NSx0xEA_ipXootla6aksOPTY1m83uTo6vj4oUlFIVvIV8zELxsRXfk-J_33y5vIdgLz3ukg2zM5PMTJj8foR8agY5gJE8XvtwTDouGXQ1Mt453g0ShEmIN-cX3dm1_H7T3qxRfcWesAwPnBV3YpFj51rlfQjtxhuVaoAeB7RceZOqdQ5qrZhKezDUnWr7AjNUc3Uym8_DH8VeLvgiIEZauRGKEmJ_oVjZyDZfPYx35vGPWSzWAs_pHnldMkY6y5K-IVs4viW7aziC--R2NtJ8OoCelgtGUeH0srDT0Z-_lrd0NqFwLul5Yo6mYSidP1q8Zz-KwVi-sEsz3UOYnprR04vcLR4e35Hr029X8zNWWBSYkxxWzPPGm4b72hh0vnZG1OjROhAKpZM2RPywsHvbOOG5l73pEWTYwYUF34fw3RyQ7fH3iO8JrTFUm92AMYuTLTijBgBb9zAEbTqPFRFPCtWuQIxHpouFTqUGVzpbQUcr6GKFinyePrrLCBsvD_8aLTUNjfDY6UVwGl2cRv_LaSqyH-08TQIixATVVuT4ye66LOWlFjIUXSELAlERNvnCM1FN4rfcEPXwf4h6RHbinPnU55hsr-4f8EPIg1b2Y3L5vznoA2M
  priority: 102
  providerName: Directory of Open Access Journals
– databaseName: Unpaywall
  dbid: UNPAY
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NaxQxFH_o9qAe_Kri2Co5eDRrJpOZSY7jYilCl6Iu1FPI14DsMi3dXaT-9earw65C0WOGJGTyXvLeS_J-P4B3Vc96rhgJaR8GM0MY5k3pMGkMaXrGqYqIN2fz5nTBPl_UFxlnO-TC7N7fl0R8UJE2MDzB4lPKg4Fk9-Ggqb3jPYGDxfy8-x7o48pG4CpeRB7d0XLP9kSI_sypsudePtgOV-rmp1qtdizNyZOUwr2OAIXhgclyut3oqfn1B3zjP_7EU3icPU7UJRV5Bvfc8Bwe7eAQHsKyG1A6XXAW5QSlIDD0NbPboS8_1kvUjSiea3QWmaeRr4pmN9pd4_MscJwSflGii_DdIzVYNE-vzX3xBSxOPn2bneLMwoANI3yDLamsqogtlXLGlkbR0lmnDafCMcO09xj8xtDqylBLLGtV6zjzFoBqbltv_quXMBkuB_cKUOl8tNr0LniBrOZGiZ5zXba89zNirCuA3spHmgxRHpgyVjKGKkTIbjbzeinDTMo8kwW8HxtdJYSOu6t_DIIfqwZ47fjBC0zm1Sq1I64xtbDW-5PKKhEDz9b1ThNhFSngMKjN2Amn3qaIuoDjWzWSeStYS8p80Oa9KE4LwKNq_TXUpCN7Q339n_WP4GEopgOiY5hsrrfujXeZNvptXiq_AbmADpQ
  priority: 102
  providerName: Unpaywall
Title An Improved Information Security Risk Assessments Method for Cyber-Physical-Social Computing and Networking
URI https://ieeexplore.ieee.org/document/8276295
https://www.proquest.com/docview/2455912482
https://doi.org/10.1109/access.2018.2800664
https://doaj.org/article/be0e6c59dd514ada9301447efeb09da0
UnpaywallVersion publishedVersion
Volume 6
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAFT
  databaseName: Open Access Digital Library
  customDbUrl:
  eissn: 2169-3536
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000816957
  issn: 2169-3536
  databaseCode: KQ8
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html
  providerName: Colorado Alliance of Research Libraries
– providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 2169-3536
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000816957
  issn: 2169-3536
  databaseCode: DOA
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2169-3536
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000816957
  issn: 2169-3536
  databaseCode: M~E
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9NAEB615QA9lEdBuJRoDxzrdL1e2-ujiagqpEQVEKmcrH2MJZTIrZpEVfn17CtWAwhxs63xelffPmbGM98AfMg73gnJqUv70CnXlKeizDClpaZlxwWTnvFmOisv5_zzdXG9B2dDLgwi-uAzHLtL_y_f3OiNc5WdC2aXbl3sw34lypCrNfhTXAGJuqgisVBG6_NmMrFjcNFbYsyEO1v5zuHjOfpjUZUd_fLppr-VD_dyuXx01Fw8h-m2kyHCZDHerNVY__yNv_F_R_ECjqLOSZowSV7CHvav4PARE-ExLJqeBP8CGhJTlBxk5Gusb0e-_FgtSDPweK7I1NeeJlaUTB4U3qVXEfI0pPySUDDCNk9kb8gsxJvb29cwv_j0bXKZxjoMqeZUrFNDcyNzajIpUZtMS5ahQaUFq5FrrqzOYLeGSuWaGWp4JSsU3J4BTAlTWQUgfwMH_U2Pb4FkaO3VskOnB_JCaFl3QqisEp1FRxtMgG0BanUkKXe1MpatN1Zo3QZUW4dqG1FN4Gx46TZwdPxb_KNDfhB1BNv-gUWpjeu1VUix1EVtjNUopZG1Nz0r7FDR2kiawLFDdmgkgprA6XYetXEzWLWMW7PN6lGCJZAOc-uPrkpfIXOnqyd__8o7eOakgifoFA7Wdxt8b3WjtRp5n8LIL40RPJnPrprvvwBnCg5x
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1bb9MwFD4a42HwwG0gCgP8wOPSOY6TOI-lYiqwVgg2aW-WLyfS1Cqb1lZo-_XzrdEKCPGWRHZi67N9LjnnOwAfi5a3QnHq0z5Mxg3lmahyzGhlaNVywVRgvJnOqskZ_3penu_AYZ8Lg4gh-AyH_jL8y7eXZu1dZUeCua3blA_gYck5L2O2Vu9R8SUkmrJO1EI5bY5G47GbhY_fEkMmvHTlW-InsPSnsipbGubeurtSN7_UYnFP2Bw_helmmDHGZD5cr_TQ3P7G4Pi_83gGT5LWSUZxmTyHHexewON7XIT7MB91JHoY0JKUpORBIz9ThTvy42I5J6OeyXNJpqH6NHFNyfhG43X2PYGexaRfEktGuNcT1VkyixHn7vYlnB1_Ph1PslSJITOcilVmaWFVQW2uFBqbG8VytKiNYA1yw7XTGtzhUOvCMEstr1WNgjspwLSwtVMBilew2112-BpIjs5irVr0miAvhVFNK4TOa9E6dIzFAbANQNIkmnJfLWMhg7lCGxlRlR5VmVAdwGHf6SqydPy7-SePfN_UU2yHBw4lmXas1EixMmVjrdMplVVNMD5rbFHTxio6gH2PbP-SBOoADjbrSKbjYCkZd4ab06QEG0DWr60_hqpCjcytob75-1c-wN7kdHoiT77Mvr2FR75H9AsdwO7qeo3vnKa00u_DBrkD0aYPGQ
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NaxQxFH_o9qAe_Kri2Co5eDRrJpOZSY7jYilCl6Iu1FPI14DsMi3dXaT-9earw65C0WOGJGTyXvLeS_J-P4B3Vc96rhgJaR8GM0MY5k3pMGkMaXrGqYqIN2fz5nTBPl_UFxlnO-TC7N7fl0R8UJE2MDzB4lPKg4Fk9-Ggqb3jPYGDxfy8-x7o48pG4CpeRB7d0XLP9kSI_sypsudePtgOV-rmp1qtdizNyZOUwr2OAIXhgclyut3oqfn1B3zjP_7EU3icPU7UJRV5Bvfc8Bwe7eAQHsKyG1A6XXAW5QSlIDD0NbPboS8_1kvUjSiea3QWmaeRr4pmN9pd4_MscJwSflGii_DdIzVYNE-vzX3xBSxOPn2bneLMwoANI3yDLamsqogtlXLGlkbR0lmnDafCMcO09xj8xtDqylBLLGtV6zjzFoBqbltv_quXMBkuB_cKUOl8tNr0LniBrOZGiZ5zXba89zNirCuA3spHmgxRHpgyVjKGKkTIbjbzeinDTMo8kwW8HxtdJYSOu6t_DIIfqwZ47fjBC0zm1Sq1I64xtbDW-5PKKhEDz9b1ThNhFSngMKjN2Amn3qaIuoDjWzWSeStYS8p80Oa9KE4LwKNq_TXUpCN7Q339n_WP4GEopgOiY5hsrrfujXeZNvptXiq_AbmADpQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+Improved+Information+Security+Risk+Assessments+Method+for+Cyber-Physical-Social+Computing+and+Networking&rft.jtitle=IEEE+access&rft.au=Li%2C+Senyu&rft.au=Bi%2C+Fangming&rft.au=Chen%2C+Wei&rft.au=Miao%2C+Xuzhi&rft.date=2018-01-01&rft.pub=IEEE&rft.eissn=2169-3536&rft.volume=6&rft.spage=10311&rft.epage=10319&rft_id=info:doi/10.1109%2FACCESS.2018.2800664&rft.externalDocID=8276295
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon