{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T01:24:13Z","timestamp":1752283453473,"version":"3.37.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000080"},{"type":"electronic","value":"9783030000097"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00009-7_59","type":"book-chapter","created":{"date-parts":[[2018,9,20]],"date-time":"2018-09-20T21:20:42Z","timestamp":1537478442000},"page":"654-669","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["DDoS Attack Security Situation Assessment Model Using Fusion Feature Based on Fuzzy C-Means Clustering Algorithm"],"prefix":"10.1007","author":[{"given":"Ruizhi","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jieren","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Xiangyan","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xiangfeng","family":"He","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,21]]},"reference":[{"key":"59_CR1","unstructured":"Endsley, M. R.: Situation awareness global assessment technique (SAGAT). In: National Aerospace and Electronics Conference, vol. 3, pp. 789\u2013795 (1988)"},{"key":"59_CR2","unstructured":"Bass, T.: Multisensor data fusion for next generation distributed intrusion detection systems. In: 1999 IRIS National Symposium on Sensor & Data Fusion, Proceedings of the Iris National Symposium on Sensor and Data Fusion, Baltimore, pp. 24\u201327 (1999)"},{"key":"59_CR3","doi-asserted-by":"crossref","unstructured":"Li, C., Cao, M., Tian, L.: Situation assessment approach based on a hierarchic multi-timescale Bayesian network. In: 2nd International Conference on Information Science and Control Engineering, pp. 911\u2013915. IEEE, Shanghai (2015)","DOI":"10.1109\/ICISCE.2015.207"},{"issue":"16","key":"59_CR4","first-page":"5999","volume":"11","author":"W Chundong","year":"2015","unstructured":"Chundong, W., Li, Y., Chenyang, D.: Situation assessment of network security based on T-S fuzzy neural network. J. Comput. Inf. Syst. 11(16), 5999\u20136006 (2015)","journal-title":"J. Comput. Inf. Syst."},{"key":"59_CR5","doi-asserted-by":"crossref","unstructured":"Guang, K., Guangming, T., Ding, X., Wang, S., Wang, K.: A network security situation assessment method based on attack intention perception. In: 2nd IEEE International Conference on Computer and Communications, pp. 1138\u20131142. IEEE, Chengdu (2016)","DOI":"10.1109\/CompComm.2016.7924882"},{"key":"59_CR6","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1007\/978-981-10-0356-1_65","volume-title":"Computational Intelligence and Intelligent Systems","author":"S Xiang","year":"2016","unstructured":"Xiang, S., Lv, Y., Xia, C., Li, Y., Wang, Z.: A method of network security situation assessment based on hidden Markov model. In: Li, K., Li, J., Liu, Y., Castiglione, A. (eds.) ISICA 2015. CCIS, vol. 575, pp. 631\u2013639. Springer, Singapore (2016). https:\/\/doi.org\/10.1007\/978-981-10-0356-1_65"},{"issue":"4","key":"59_CR7","first-page":"1","volume":"2016","author":"ZN Zhao","year":"2016","unstructured":"Zhao, Z.N., Qiao, P.L., Wang, J., Hu, G.Y.: Security situation assessment of all-optical network based on evidential reasoning rule. Math. Probl. Eng. 2016(4), 1\u20137 (2016)","journal-title":"Math. Probl. Eng."},{"issue":"4","key":"59_CR8","first-page":"821","volume":"16","author":"Z Wen","year":"2016","unstructured":"Wen, Z., Tang, J.: Quantitative assessment for network security situation based on weighted factors. J. Comput. Methods Sci. Eng. 16(4), 821\u2013833 (2016)","journal-title":"J. Comput. Methods Sci. Eng."},{"key":"59_CR9","unstructured":"Li, X., Zhao, H.: Network security situation assessment based on HMM-MPGA. In: 2nd International Conference on Information Management, pp. 57\u201363. IEEE, London (2016)"},{"key":"59_CR10","unstructured":"Jin, Y., Shen, Y., Zhang, G., Zhi, H.: The model of network security situation assessment based on random forest. In: 8th IEEE International Conference on Software Engineering and Service Sciences, pp. 977\u2013980. IEEE, Beijing (2017)"},{"issue":"5","key":"59_CR11","first-page":"129","volume":"10","author":"X Wang","year":"2016","unstructured":"Wang, X.: Network information security situation assessment based on Bayesian network. Int. J. Secur. Appl. 10(5), 129\u2013138 (2016)","journal-title":"Int. J. Secur. Appl."},{"issue":"11","key":"59_CR12","first-page":"153","volume":"10","author":"L Zhu","year":"2016","unstructured":"Zhu, L., Xia, G., Zhang, Z., Li, J.: Multi-dimensional network security situation assessment. Int. J. Secur. Appl. 10(11), 153\u2013164 (2016)","journal-title":"Int. J. Secur. Appl."},{"key":"59_CR13","doi-asserted-by":"crossref","unstructured":"Zihao, L., Bin, Z., Ning, Z., Lixun, L.: Hierarchical network threat situation assessment method for DDoS based on D-S evidence theory. In: 2017 IEEE International Conference on Intelligence and Security Informatics, pp. 49\u201353. IEEE, Beijing (2017)","DOI":"10.1109\/ISI.2017.8004873"},{"issue":"4","key":"59_CR14","first-page":"731","volume":"54","author":"T Jianwei","year":"2017","unstructured":"Jianwei, T., et al.: Threat propagation based security situation quantitative assessment in multi-node network. Comput. Res. Dev. 54(4), 731\u2013741 (2017)","journal-title":"Comput. Res. Dev."},{"issue":"1","key":"59_CR15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11277-018-5419-9","volume":"2018","author":"H Wang","year":"2018","unstructured":"Wang, H., et al.: Research on network security situation assessment and quantification method based on analytic hierarchy process. Wirel. Pers. Commun. 2018(1), 1\u201320 (2018)","journal-title":"Wirel. Pers. Commun."},{"issue":"2","key":"59_CR16","doi-asserted-by":"crossref","first-page":"861","DOI":"10.3233\/JIFS-169379","volume":"34","author":"J Yu","year":"2018","unstructured":"Yu, J., Hu, M., Wang, P.: Evaluation and reliability analysis of network security risk factors based on D-S evidence theory. J. Intell. Fuzzy Syst. 34(2), 861\u2013869 (2018)","journal-title":"J. Intell. Fuzzy Syst."},{"issue":"3","key":"59_CR17","doi-asserted-by":"crossref","first-page":"642","DOI":"10.3390\/s17030642","volume":"17","author":"J Xu","year":"2017","unstructured":"Xu, J., et al.: A quantitative risk assessment model involving frequency and threat degree under line-of-business services for infrastructure of emerging sensor networks. Sensors 17(3), 642 (2017)","journal-title":"Sensors"},{"issue":"13","key":"59_CR18","doi-asserted-by":"crossref","first-page":"2135","DOI":"10.1002\/sec.1473","volume":"9","author":"R Xi","year":"2016","unstructured":"Xi, R., Yun, X., Hao, Z., Zhang, Y.: Quantitative threat situation assessment based on alert verification. Secur. Commun. Netw. 9(13), 2135\u20132142 (2016)","journal-title":"Secur. Commun. Netw."},{"issue":"6","key":"59_CR19","first-page":"67","volume":"13","author":"D Dobrilovic","year":"2016","unstructured":"Dobrilovic, D., Stojanov, Z., Jager, S., Rajnai, Z.: A method for comparing and analyzing wireless security situations in two capital cities. Acta Polytech. Hung. 13(6), 67\u201386 (2016)","journal-title":"Acta Polytech. Hung."},{"issue":"6","key":"59_CR20","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1049\/iet-ifs.2014.0272","volume":"9","author":"F Dai","year":"2015","unstructured":"Dai, F., Hu, Y., Zheng, K., Wu, B.: Exploring risk flow attack graph for security risk assessment. IET Inf. Secur. 9(6), 344\u2013353 (2015)","journal-title":"IET Inf. Secur."},{"issue":"10","key":"59_CR21","doi-asserted-by":"crossref","first-page":"2313","DOI":"10.1093\/comjnl\/bxu096","volume":"58","author":"RJ Rodriguez","year":"2015","unstructured":"Rodriguez, R.J., Merseguer, J., Bernardi, S.: Modelling security of critical infrastructures: a survivability assessment. Comput. J. 58(10), 2313\u20132327 (2015)","journal-title":"Comput. J."},{"key":"59_CR22","first-page":"1","volume":"2015","author":"F Li","year":"2015","unstructured":"Li, F., Nie, Y., Zhu, J., Zhang, H.: A decision-aided situation awareness mechanism based on multiscale dynamic trust. Int. J. Distrib. Sensor Netw. 2015, 1\u201314 (2015)","journal-title":"Int. J. Distrib. Sensor Netw."},{"issue":"3","key":"59_CR23","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1080\/01969727308546046","volume":"3","author":"JC Dunn","year":"1974","unstructured":"Dunn, J.C.: A fuzzy relative of the ISODATA process and its use in detecting compact well-separated clusters. J. Cybern. 3(3), 32\u201357 (1974)","journal-title":"J. Cybern."},{"key":"59_CR24","doi-asserted-by":"crossref","unstructured":"Bezdek, J.C.: Pattern Recognition with Fuzzy Objective Function Algorithms, vol. 22, no. 1171, pp. 203\u2013239. Plenum Press, New York (1981)","DOI":"10.1007\/978-1-4757-0450-1_6"},{"issue":"5","key":"59_CR25","doi-asserted-by":"crossref","first-page":"1585","DOI":"10.1007\/s40815-016-0260-3","volume":"19","author":"LH Son","year":"2017","unstructured":"Son, L.H., Tien, N.D.: Tune up fuzzy C-means for big data: some novel hybrid clustering algorithms based on initial selection and incremental clustering. Int. J. Fuzzy Syst. 19(5), 1585\u20131602 (2017)","journal-title":"Int. J. Fuzzy Syst."},{"issue":"3","key":"59_CR26","doi-asserted-by":"crossref","first-page":"717","DOI":"10.1007\/s10489-016-0858-z","volume":"46","author":"NP Vo","year":"2017","unstructured":"Vo, N.P., Dat, N.D., Tran, V.T.N., Chau, V.T.N., Nguyen, T.A.: Fuzzy C-means for english sentiment classification in a distributed system. Appl. Intell. 46(3), 717\u2013738 (2017)","journal-title":"Appl. Intell."},{"issue":"6","key":"59_CR27","doi-asserted-by":"crossref","first-page":"1430","DOI":"10.1109\/TFUZZ.2017.2742463","volume":"25","author":"J Wu","year":"2017","unstructured":"Wu, J., Wu, Z., Cao, J., Liu, H., Chen, G.: Fuzzy consensus clustering with applications on big data. IEEE Trans. Fuzzy Syst. 25(6), 1430\u20131445 (2017)","journal-title":"IEEE Trans. Fuzzy Syst."},{"issue":"8","key":"59_CR28","doi-asserted-by":"crossref","first-page":"3231","DOI":"10.1007\/s00500-015-1698-1","volume":"20","author":"Y Li","year":"2016","unstructured":"Li, Y., Yang, G., He, H., Jiao, L., Shang, R.: A study of large-scale data clustering based on fuzzy clustering. Soft. Comput. 20(8), 3231\u20133242 (2016)","journal-title":"Soft. Comput."}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00009-7_59","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T11:36:23Z","timestamp":1605008183000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00009-7_59"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000080","9783030000097"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00009-7_59","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}