An Improved Information Security Risk Assessments Method for Cyber-Physical-Social Computing and Networking
In virtue of the rapid development of the Internet of Things (IoT), Organizations have grown to rely on their cyber systems and networks. However, this phenomenon also creates many new information security issues. In this paper, we propose an evolutionary algorithm improved cuckoo search (ICS) to pr...
Saved in:
| Published in | IEEE access Vol. 6; pp. 10311 - 10319 |
|---|---|
| Main Authors | , , , , , |
| Format | Journal Article |
| Language | English |
| Published |
Piscataway
IEEE
01.01.2018
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Subjects | |
| Online Access | Get full text |
| ISSN | 2169-3536 2169-3536 |
| DOI | 10.1109/ACCESS.2018.2800664 |
Cover
| Abstract | In virtue of the rapid development of the Internet of Things (IoT), Organizations have grown to rely on their cyber systems and networks. However, this phenomenon also creates many new information security issues. In this paper, we propose an evolutionary algorithm improved cuckoo search (ICS) to pretrain a backpropagation neural network (BPNN) for the sake of improving the accuracy and stability. Using this pre-training process, the BPNN can surmount the defect of falling into the local minima and greatly improve its efficiency. Then, this neural network is used as a part of information security risk assessment (ISRA) processes for a miniature IoT system. An illustration example is introduced to demonstrate that the ICS-BPNN outperforms other neural networks in this ISRA process. |
|---|---|
| AbstractList | In virtue of the rapid development of the Internet of Things (IoT), Organizations have grown to rely on their cyber systems and networks. However, this phenomenon also creates many new information security issues. In this paper, we propose an evolutionary algorithm improved cuckoo search (ICS) to pretrain a backpropagation neural network (BPNN) for the sake of improving the accuracy and stability. Using this pre-training process, the BPNN can surmount the defect of falling into the local minima and greatly improve its efficiency. Then, this neural network is used as a part of information security risk assessment (ISRA) processes for a miniature IoT system. An illustration example is introduced to demonstrate that the ICS-BPNN outperforms other neural networks in this ISRA process. |
| Author | Chen, Wei Liu, Jin Tang, Chaogang Li, Senyu Bi, Fangming Miao, Xuzhi |
| Author_xml | – sequence: 1 givenname: Senyu surname: Li fullname: Li, Senyu organization: Department of Computer Science and Technology, China University of Mining and Technology, Xuzhou, China – sequence: 2 givenname: Fangming surname: Bi fullname: Bi, Fangming email: bfm@cumt.edu.cn organization: Department of Computer Science and Technology, China University of Mining and Technology, Xuzhou, China – sequence: 3 givenname: Wei orcidid: 0000-0002-7663-278X surname: Chen fullname: Chen, Wei email: chenw@cumt.edu.cn organization: Department of Computer Science and Technology, China University of Mining and Technology, Xuzhou, China – sequence: 4 givenname: Xuzhi surname: Miao fullname: Miao, Xuzhi organization: Department of Computer Science and Technology, China University of Mining and Technology, Xuzhou, China – sequence: 5 givenname: Jin surname: Liu fullname: Liu, Jin email: jinliu@cumt.edu.cn organization: Department of Computer Science and Technology, China University of Mining and Technology, Xuzhou, China – sequence: 6 givenname: Chaogang orcidid: 0000-0002-4471-9856 surname: Tang fullname: Tang, Chaogang organization: Department of Computer Science and Technology, China University of Mining and Technology, Xuzhou, China |
| BookMark | eNqFkU1v1DAQhiNUJErpL-jFEucs_srXcRUVWKkUxMLZmtizrXcTe7GdVvn3pE1VVeWAL2OP3vex5p332YnzDrPsgtEVY7T5tG7by-12xSmrV7ymtCzlm-yUs7LJRSHKkxf3d9l5jHs6n3puFdVpdlg7shmOwd-hIRu382GAZL0jW9RjsGkiP208kHWMGOOALkXyDdOtN2SWknbqMOQ_bqdoNfT51msLPWn9cByTdTcEnCHXmO59OMzPD9nbHfQRz5_qWfb78-Wv9mt-9f3Lpl1f5VrSOuWGCgOCGgaA2jANnKHBTte8QallVzBOBas6obmhRlZQYS2xY7yrTcXLUpxlm4VrPOzVMdgBwqQ8WPXY8OFGQUhW96g6pFjqojGmYBIMNIIyKSvcYUcbA3RmyYU1uiNM99D3z0BG1UP-CrSes1EP-aun_Gfbx8U2J_tnxJjU3o_BzVMrLouiYVzWfFaJRaWDjzHg7h_2stvX7OaVS9v0uLQUwPb_8V4sXouIz7_VvCp5U4i_zNC0WQ |
| CODEN | IAECCG |
| CitedBy_id | crossref_primary_10_1007_s00354_022_00188_w crossref_primary_10_3390_ijgi12100404 crossref_primary_10_4018_IJSI_315662 crossref_primary_10_1109_ACCESS_2021_3112397 crossref_primary_10_7717_peerj_cs_1729 crossref_primary_10_1145_3331174 crossref_primary_10_3233_JIFS_231880 crossref_primary_10_3390_info13110533 crossref_primary_10_1109_ACCESS_2018_2861319 crossref_primary_10_1177_1550147720971517 crossref_primary_10_1016_j_jnca_2020_102761 crossref_primary_10_1007_s11042_022_13836_6 crossref_primary_10_1109_TETCI_2019_2941757 crossref_primary_10_3390_systems11050218 crossref_primary_10_1109_ACCESS_2018_2888510 crossref_primary_10_1007_s13369_020_04476_9 crossref_primary_10_1007_s11227_025_06932_5 crossref_primary_10_12720_jait_15_9_1070_1078 crossref_primary_10_1016_j_techfore_2021_120642 crossref_primary_10_3390_s22072593 crossref_primary_10_3390_electronics12183958 crossref_primary_10_1109_ACCESS_2019_2961997 crossref_primary_10_1016_j_measen_2023_100700 crossref_primary_10_1080_0952813X_2021_1970824 crossref_primary_10_1155_2021_2398460 |
| Cites_doi | 10.1016/j.ijinfomgt.2015.09.003 10.1007/s00366-011-0241-y 10.1016/j.ress.2011.09.006 10.1155/2014/878262 10.1109/MCOM.2017.1700142 10.1109/TIFS.2015.2455414 10.1111/risa.12891 10.1016/j.ces.2017.09.002 10.1109/ACCESS.2017.2757605 10.1016/j.swevo.2015.05.003 10.1109/ACCESS.2015.2506185 10.1007/s11277-011-0288-5 10.1016/j.neucom.2017.06.083 10.1109/MCOM.2017.1700212 10.1109/TCYB.2016.2537649 10.1109/TSG.2016.2519239 10.1016/j.cose.2015.11.001 10.1109/ACCESS.2016.2614541 10.1109/MCOM.2017.1600822 10.1016/j.comnet.2010.05.010 10.1002/ett.2704 10.1109/TPWRS.2017.2687983 10.1108/JSIT-02-2015-0013 10.1109/TCC.2017.2649525 10.1021/ie5016574 10.1109/JSYST.2017.2765178 10.1109/NABIC.2009.5393690 10.1109/TPWRD.2008.2008470 10.1109/ACCESS.2017.2685592 10.1109/MCOM.2018.1700592 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018 |
| DBID | 97E ESBDL RIA RIE AAYXX CITATION 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D ADTOC UNPAY DOA |
| DOI | 10.1109/ACCESS.2018.2800664 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE Xplore Open Access Journals IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Engineered Materials Abstracts METADEX Technology Research Database Materials Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Unpaywall for CDI: Periodical Content Unpaywall DOAJ Open Access Full Text |
| DatabaseTitle | CrossRef Materials Research Database Engineered Materials Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace METADEX Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Materials Research Database |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: RIE name: IEEE Xplore url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher – sequence: 3 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 2169-3536 |
| EndPage | 10319 |
| ExternalDocumentID | oai_doaj_org_article_be0e6c59dd514ada9301447efeb09da0 10.1109/access.2018.2800664 10_1109_ACCESS_2018_2800664 8276295 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: China Post-Doctoral Science Foundation grantid: 2013T60574 funderid: 10.13039/501100002858 – fundername: Natural Science Foundation of Jiangsu Province grantid: BK20130210 funderid: 10.13039/501100004608 – fundername: QingLan Project – fundername: National Natural Science Foundation and Shanxi Provincial People’s Government Jointly Funded Project of China for Coal Base and Low Carbon grantid: U1510115 – fundername: National Natural Science Foundation of China grantid: 61303182 funderid: 10.13039/501100001809 |
| GroupedDBID | 0R~ 4.4 5VS 6IK 97E AAJGR ABAZT ABVLG ACGFS ADBBV AGSQL ALMA_UNASSIGNED_HOLDINGS BCNDV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD ESBDL GROUPED_DOAJ IPLJI JAVBF KQ8 M43 M~E O9- OCL OK1 RIA RIE RNS AAYXX CITATION 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D RIG ADTOC UNPAY |
| ID | FETCH-LOGICAL-c408t-d03da30d1aaecd1ca21edebc829e4c4b5120317b3c2d0d47a7e84eb12b8d72663 |
| IEDL.DBID | RIE |
| ISSN | 2169-3536 |
| IngestDate | Fri Oct 03 12:38:50 EDT 2025 Sun Sep 07 11:11:56 EDT 2025 Sun Jun 29 15:56:36 EDT 2025 Wed Oct 01 02:57:40 EDT 2025 Thu Apr 24 22:52:37 EDT 2025 Wed Aug 27 02:44:46 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/OAPA.html |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c408t-d03da30d1aaecd1ca21edebc829e4c4b5120317b3c2d0d47a7e84eb12b8d72663 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-4471-9856 0000-0002-7663-278X |
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/document/8276295 |
| PQID | 2455912482 |
| PQPubID | 4845423 |
| PageCount | 9 |
| ParticipantIDs | proquest_journals_2455912482 ieee_primary_8276295 unpaywall_primary_10_1109_access_2018_2800664 crossref_primary_10_1109_ACCESS_2018_2800664 crossref_citationtrail_10_1109_ACCESS_2018_2800664 doaj_primary_oai_doaj_org_article_be0e6c59dd514ada9301447efeb09da0 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2018-01-01 |
| PublicationDateYYYYMMDD | 2018-01-01 |
| PublicationDate_xml | – month: 01 year: 2018 text: 2018-01-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | Piscataway |
| PublicationPlace_xml | – name: Piscataway |
| PublicationTitle | IEEE access |
| PublicationTitleAbbrev | Access |
| PublicationYear | 2018 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref13 ref12 ref14 ref31 ref30 ref11 ref32 ref10 ref2 ref1 ref17 ref16 ref19 ref24 ref23 ref26 ref25 ref20 ref22 ref21 ref28 ref27 ref29 ref8 ref7 nandy (ref15) 2012; 4 zhao (ref18) 2010; 37 ref9 ref4 ref3 ref6 ref5 |
| References_xml | – ident: ref23 doi: 10.1016/j.ijinfomgt.2015.09.003 – ident: ref29 doi: 10.1007/s00366-011-0241-y – volume: 4 start-page: 33 year: 2012 ident: ref15 article-title: Training a feed-forward neural network with artificial bee colony based backpropagation method publication-title: Int J Comput Sci Inf Technol – ident: ref12 doi: 10.1016/j.ress.2011.09.006 – ident: ref30 doi: 10.1155/2014/878262 – ident: ref6 doi: 10.1109/MCOM.2017.1700142 – ident: ref11 doi: 10.1109/TIFS.2015.2455414 – ident: ref21 doi: 10.1111/risa.12891 – ident: ref17 doi: 10.1016/j.ces.2017.09.002 – ident: ref22 doi: 10.1109/ACCESS.2017.2757605 – ident: ref31 doi: 10.1016/j.swevo.2015.05.003 – ident: ref26 doi: 10.1109/ACCESS.2015.2506185 – ident: ref4 doi: 10.1007/s11277-011-0288-5 – ident: ref13 doi: 10.1016/j.neucom.2017.06.083 – volume: 37 start-page: 90 year: 2010 ident: ref18 article-title: Risk assessment of information security based on improved wavelet neural network publication-title: Comput Sci – ident: ref3 doi: 10.1109/MCOM.2017.1700212 – ident: ref16 doi: 10.1109/TCYB.2016.2537649 – ident: ref9 doi: 10.1109/TSG.2016.2519239 – ident: ref10 doi: 10.1016/j.cose.2015.11.001 – ident: ref25 doi: 10.1109/ACCESS.2016.2614541 – ident: ref7 doi: 10.1109/MCOM.2017.1600822 – ident: ref2 doi: 10.1016/j.comnet.2010.05.010 – ident: ref5 doi: 10.1002/ett.2704 – ident: ref19 doi: 10.1109/TPWRS.2017.2687983 – ident: ref27 doi: 10.1108/JSIT-02-2015-0013 – ident: ref8 doi: 10.1109/TCC.2017.2649525 – ident: ref32 doi: 10.1021/ie5016574 – ident: ref14 doi: 10.1109/JSYST.2017.2765178 – ident: ref28 doi: 10.1109/NABIC.2009.5393690 – ident: ref20 doi: 10.1109/TPWRD.2008.2008470 – ident: ref24 doi: 10.1109/ACCESS.2017.2685592 – ident: ref1 doi: 10.1109/MCOM.2018.1700592 |
| SSID | ssj0000816957 |
| Score | 2.3065403 |
| Snippet | In virtue of the rapid development of the Internet of Things (IoT), Organizations have grown to rely on their cyber systems and networks. However, this... |
| SourceID | doaj unpaywall proquest crossref ieee |
| SourceType | Open Website Open Access Repository Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 10311 |
| SubjectTerms | Artificial neural networks Back propagation Back propagation networks BP neural network cuckoo search algorithm Evolutionary algorithms Information security Information security risk assessment Integrated circuits Internet of Things Neural networks Organizations Risk assessment Risk management Search algorithms Security Security management Sociology Standards organizations |
| SummonAdditionalLinks | – databaseName: DOAJ Open Access Full Text dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3NSx0xEA_ipXootla6aksOPTY1m83uTo6vj4oUlFIVvIV8zELxsRXfk-J_33y5vIdgLz3ukg2zM5PMTJj8foR8agY5gJE8XvtwTDouGXQ1Mt453g0ShEmIN-cX3dm1_H7T3qxRfcWesAwPnBV3YpFj51rlfQjtxhuVaoAeB7RceZOqdQ5qrZhKezDUnWr7AjNUc3Uym8_DH8VeLvgiIEZauRGKEmJ_oVjZyDZfPYx35vGPWSzWAs_pHnldMkY6y5K-IVs4viW7aziC--R2NtJ8OoCelgtGUeH0srDT0Z-_lrd0NqFwLul5Yo6mYSidP1q8Zz-KwVi-sEsz3UOYnprR04vcLR4e35Hr029X8zNWWBSYkxxWzPPGm4b72hh0vnZG1OjROhAKpZM2RPywsHvbOOG5l73pEWTYwYUF34fw3RyQ7fH3iO8JrTFUm92AMYuTLTijBgBb9zAEbTqPFRFPCtWuQIxHpouFTqUGVzpbQUcr6GKFinyePrrLCBsvD_8aLTUNjfDY6UVwGl2cRv_LaSqyH-08TQIixATVVuT4ye66LOWlFjIUXSELAlERNvnCM1FN4rfcEPXwf4h6RHbinPnU55hsr-4f8EPIg1b2Y3L5vznoA2M priority: 102 providerName: Directory of Open Access Journals – databaseName: Unpaywall dbid: UNPAY link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NaxQxFH_o9qAe_Kri2Co5eDRrJpOZSY7jYilCl6Iu1FPI14DsMi3dXaT-9earw65C0WOGJGTyXvLeS_J-P4B3Vc96rhgJaR8GM0MY5k3pMGkMaXrGqYqIN2fz5nTBPl_UFxlnO-TC7N7fl0R8UJE2MDzB4lPKg4Fk9-Ggqb3jPYGDxfy8-x7o48pG4CpeRB7d0XLP9kSI_sypsudePtgOV-rmp1qtdizNyZOUwr2OAIXhgclyut3oqfn1B3zjP_7EU3icPU7UJRV5Bvfc8Bwe7eAQHsKyG1A6XXAW5QSlIDD0NbPboS8_1kvUjSiea3QWmaeRr4pmN9pd4_MscJwSflGii_DdIzVYNE-vzX3xBSxOPn2bneLMwoANI3yDLamsqogtlXLGlkbR0lmnDafCMcO09xj8xtDqylBLLGtV6zjzFoBqbltv_quXMBkuB_cKUOl8tNr0LniBrOZGiZ5zXba89zNirCuA3spHmgxRHpgyVjKGKkTIbjbzeinDTMo8kwW8HxtdJYSOu6t_DIIfqwZ47fjBC0zm1Sq1I64xtbDW-5PKKhEDz9b1ThNhFSngMKjN2Amn3qaIuoDjWzWSeStYS8p80Oa9KE4LwKNq_TXUpCN7Q339n_WP4GEopgOiY5hsrrfujXeZNvptXiq_AbmADpQ priority: 102 providerName: Unpaywall |
| Title | An Improved Information Security Risk Assessments Method for Cyber-Physical-Social Computing and Networking |
| URI | https://ieeexplore.ieee.org/document/8276295 https://www.proquest.com/docview/2455912482 https://doi.org/10.1109/access.2018.2800664 https://doaj.org/article/be0e6c59dd514ada9301447efeb09da0 |
| UnpaywallVersion | publishedVersion |
| Volume | 6 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 2169-3536 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000816957 issn: 2169-3536 databaseCode: KQ8 dateStart: 20130101 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2169-3536 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000816957 issn: 2169-3536 databaseCode: DOA dateStart: 20130101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2169-3536 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000816957 issn: 2169-3536 databaseCode: M~E dateStart: 20130101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9NAEB615QA9lEdBuJRoDxzrdL1e2-ujiagqpEQVEKmcrH2MJZTIrZpEVfn17CtWAwhxs63xelffPmbGM98AfMg73gnJqUv70CnXlKeizDClpaZlxwWTnvFmOisv5_zzdXG9B2dDLgwi-uAzHLtL_y_f3OiNc5WdC2aXbl3sw34lypCrNfhTXAGJuqgisVBG6_NmMrFjcNFbYsyEO1v5zuHjOfpjUZUd_fLppr-VD_dyuXx01Fw8h-m2kyHCZDHerNVY__yNv_F_R_ECjqLOSZowSV7CHvav4PARE-ExLJqeBP8CGhJTlBxk5Gusb0e-_FgtSDPweK7I1NeeJlaUTB4U3qVXEfI0pPySUDDCNk9kb8gsxJvb29cwv_j0bXKZxjoMqeZUrFNDcyNzajIpUZtMS5ahQaUFq5FrrqzOYLeGSuWaGWp4JSsU3J4BTAlTWQUgfwMH_U2Pb4FkaO3VskOnB_JCaFl3QqisEp1FRxtMgG0BanUkKXe1MpatN1Zo3QZUW4dqG1FN4Gx46TZwdPxb_KNDfhB1BNv-gUWpjeu1VUix1EVtjNUopZG1Nz0r7FDR2kiawLFDdmgkgprA6XYetXEzWLWMW7PN6lGCJZAOc-uPrkpfIXOnqyd__8o7eOakgifoFA7Wdxt8b3WjtRp5n8LIL40RPJnPrprvvwBnCg5x |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1bb9MwFD4a42HwwG0gCgP8wOPSOY6TOI-lYiqwVgg2aW-WLyfS1Cqb1lZo-_XzrdEKCPGWRHZi67N9LjnnOwAfi5a3QnHq0z5Mxg3lmahyzGhlaNVywVRgvJnOqskZ_3penu_AYZ8Lg4gh-AyH_jL8y7eXZu1dZUeCua3blA_gYck5L2O2Vu9R8SUkmrJO1EI5bY5G47GbhY_fEkMmvHTlW-InsPSnsipbGubeurtSN7_UYnFP2Bw_helmmDHGZD5cr_TQ3P7G4Pi_83gGT5LWSUZxmTyHHexewON7XIT7MB91JHoY0JKUpORBIz9ThTvy42I5J6OeyXNJpqH6NHFNyfhG43X2PYGexaRfEktGuNcT1VkyixHn7vYlnB1_Ph1PslSJITOcilVmaWFVQW2uFBqbG8VytKiNYA1yw7XTGtzhUOvCMEstr1WNgjspwLSwtVMBilew2112-BpIjs5irVr0miAvhVFNK4TOa9E6dIzFAbANQNIkmnJfLWMhg7lCGxlRlR5VmVAdwGHf6SqydPy7-SePfN_UU2yHBw4lmXas1EixMmVjrdMplVVNMD5rbFHTxio6gH2PbP-SBOoADjbrSKbjYCkZd4ab06QEG0DWr60_hqpCjcytob75-1c-wN7kdHoiT77Mvr2FR75H9AsdwO7qeo3vnKa00u_DBrkD0aYPGQ |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NaxQxFH_o9qAe_Kri2Co5eDRrJpOZSY7jYilCl6Iu1FPI14DsMi3dXaT-9earw65C0WOGJGTyXvLeS_J-P4B3Vc96rhgJaR8GM0MY5k3pMGkMaXrGqYqIN2fz5nTBPl_UFxlnO-TC7N7fl0R8UJE2MDzB4lPKg4Fk9-Ggqb3jPYGDxfy8-x7o48pG4CpeRB7d0XLP9kSI_sypsudePtgOV-rmp1qtdizNyZOUwr2OAIXhgclyut3oqfn1B3zjP_7EU3icPU7UJRV5Bvfc8Bwe7eAQHsKyG1A6XXAW5QSlIDD0NbPboS8_1kvUjSiea3QWmaeRr4pmN9pd4_MscJwSflGii_DdIzVYNE-vzX3xBSxOPn2bneLMwoANI3yDLamsqogtlXLGlkbR0lmnDafCMcO09xj8xtDqylBLLGtV6zjzFoBqbltv_quXMBkuB_cKUOl8tNr0LniBrOZGiZ5zXba89zNirCuA3spHmgxRHpgyVjKGKkTIbjbzeinDTMo8kwW8HxtdJYSOu6t_DIIfqwZ47fjBC0zm1Sq1I64xtbDW-5PKKhEDz9b1ThNhFSngMKjN2Amn3qaIuoDjWzWSeStYS8p80Oa9KE4LwKNq_TXUpCN7Q339n_WP4GEopgOiY5hsrrfujXeZNvptXiq_AbmADpQ |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+Improved+Information+Security+Risk+Assessments+Method+for+Cyber-Physical-Social+Computing+and+Networking&rft.jtitle=IEEE+access&rft.au=Li%2C+Senyu&rft.au=Bi%2C+Fangming&rft.au=Chen%2C+Wei&rft.au=Miao%2C+Xuzhi&rft.date=2018-01-01&rft.pub=IEEE&rft.eissn=2169-3536&rft.volume=6&rft.spage=10311&rft.epage=10319&rft_id=info:doi/10.1109%2FACCESS.2018.2800664&rft.externalDocID=8276295 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon |