{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T15:51:41Z","timestamp":1742399501618},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540286608"},{"type":"electronic","value":"9783540318248"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11548706_57","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T14:13:06Z","timestamp":1127830386000},"page":"539-547","source":"Crossref","is-referenced-by-count":3,"title":["Research on Risk Probability Estimating Using Fuzzy Clustering for Dynamic Security Assessment"],"prefix":"10.1007","author":[{"given":"Fang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Yong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Kui","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Zhiying","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhiping","family":"Cai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"57_CR1","doi-asserted-by":"crossref","unstructured":"Hong, J.I., Ng, J.D., Lederer, S., Landay, J.A.: Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Systems, DIS, August 1, Cambridge, Massachusetts, USA, ACM 1-58113-787-7\/04\/0008 (2004)","DOI":"10.1145\/1013115.1013129"},{"key":"57_CR2","volume-title":"Computer Security","author":"J.M. Carroll","year":"1996","unstructured":"Carroll, J.M.: Computer Security. Butterworth-Heinemann, Newton (1996)"},{"key":"57_CR3","unstructured":"Chen, Y., Jensen, C., et al.: A General Risk Assessment of Security in Pervasive Computing. Technical Report TCD-CS-2003-45, Department of Computer Science, Trinity College Dublin, November 6 (2003)"},{"key":"57_CR4","doi-asserted-by":"crossref","unstructured":"Chen, Y., Jensen, C., et al.: Risk Probability Estimating Based on Clustering. In: Proceedings of the 4th IEEE Annual Information Assurance Workshop, West Point, New York, U.S.A. (June 2003)","DOI":"10.1109\/SMCSIA.2003.1232426"},{"key":"57_CR5","unstructured":"David, A., David, T.: Assessing Risk Probability: Alternative Approaches, 2004 PMI Global Congress Proceedings, Prague, Czech Republic (2004)"},{"key":"57_CR6","unstructured":"The American Heritage\u00ae Dictionary of the English Language, Fourth Edition Copyright\u00a9, by Houghton Mifflin Company (2000)"},{"key":"57_CR7","unstructured":"Multivariate Analysis-Factor Analysis and Principal Component, The Numerical Algo-rithms Group Ltd, Oxford, UK (2000)"},{"key":"57_CR8","doi-asserted-by":"crossref","unstructured":"Gavoyiannis, A.E., Vogiatzis, D.G., et al.: Combined Support Vector Classifiers using Fuzzy Clustering for Dynamic Security Assessment. In: Proc. IEEE Power Engineering Soc. Summer Meeting, vol.\u00a02, pp. 1281\u20131286 (2001)","DOI":"10.1109\/PESS.2001.970257"},{"key":"57_CR9","unstructured":"http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/task.html"},{"key":"57_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-540-30483-8_26","volume-title":"Content Computing","author":"F. Liu","year":"2004","unstructured":"Liu, F., Dai, K., et al.: Improving Security Architecture Development Based on Multiple Criteria Decision Making. In: Chi, C.-H., Lam, K.-Y. (eds.) AWCC 2004. LNCS, vol.\u00a03309, pp. 214\u2013218. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11548706_57.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:41:06Z","timestamp":1605642066000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11548706_57"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540286608","9783540318248"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/11548706_57","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}