{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T19:31:43Z","timestamp":1743103903829,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242701"},{"type":"electronic","value":"9783030242718"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24271-8_47","type":"book-chapter","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T23:19:24Z","timestamp":1563405564000},"page":"530-540","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Calculation of Network Security Index Based on Convolution Neural Networks"],"prefix":"10.1007","author":[{"given":"Hang","family":"Yang","sequence":"first","affiliation":[]},{"given":"Yan","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Wei-Hong","family":"Han","sequence":"additional","affiliation":[]},{"given":"Yuan-Ping","family":"Nie","sequence":"additional","affiliation":[]},{"given":"Shu-Dong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiao-Juan","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"issue":"3","key":"47_CR1","first-page":"277","volume":"3","author":"W Bin","year":"2017","unstructured":"Bin, W.: Progress and challenges of intelligent surveillance industry security. J. Inf. Secur. Res. 3(3), 277\u2013280 (2017). (in Chinese)","journal-title":"J. Inf. Secur. Res."},{"key":"47_CR2","doi-asserted-by":"crossref","unstructured":"Scaife, N., Carter, H., Traynor, P., et al.: CryptoLock (and drop it): stopping ransomware attacks on user data. In: IEEE International Conference on Distributed Computing Systems. IEEE Computer Society, pp. 303\u2013312 (2016)","DOI":"10.1109\/ICDCS.2016.46"},{"key":"47_CR3","unstructured":"Li, L.: The design of network security situation awareness system and the implementation of key module. Beijing University of Posts and Telecommunications (2015)"},{"key":"47_CR4","doi-asserted-by":"crossref","unstructured":"Tianfield, H.: Cyber security situational awareness. In: IEEE International Conference on Internet of Things, pp. 782\u2013787. IEEE (2017)","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2016.165"},{"issue":"1","key":"47_CR5","first-page":"1","volume":"32","author":"R Xi","year":"2012","unstructured":"Xi, R., Yun, X., Jin, S., Zhang, Y.: A survey of network security situational awareness. J. Comput. Appl. 32(1), 1\u20134 (2012). (in Chinese)","journal-title":"J. Comput. Appl."},{"issue":"5","key":"47_CR6","first-page":"1379","volume":"35","author":"Z Shen","year":"2015","unstructured":"Shen, Z., Ronghual, S., Yin, Z.: Visual fusion and analysis for multivariate heterogeneous network security data. J. Comput. Appl. 35(5), 1379\u20131384 (2015). (in Chinese)","journal-title":"J. Comput. Appl."},{"issue":"5","key":"47_CR7","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MSECP.2003.1236235","volume":"99","author":"S Hariri","year":"2003","unstructured":"Hariri, S., Qu, G., Dharmagadda, T., et al.: Impact analysis of faults and attacks in large-scale networks. IEEE Secur. Priv. 99(5), 49\u201354 (2003)","journal-title":"IEEE Secur. Priv."},{"key":"47_CR8","unstructured":"Wang, S.: Research on effect evaluation technology of network attack oriented web service. Shenyang Ligong University (2016). (in Chinese)"},{"issue":"1","key":"47_CR9","first-page":"68","volume":"38","author":"C Zhou","year":"2017","unstructured":"Zhou, C., Li, W., Mo, X., Li, Q.: An assessment method of network security vulnerability. J. Jiangsu Univ. (Nat. Sci. Ed.) 38(1), 68\u201377 (2017)","journal-title":"J. Jiangsu Univ. (Nat. Sci. Ed.)"},{"issue":"4","key":"47_CR10","first-page":"885","volume":"17","author":"X-Z Chen","year":"2006","unstructured":"Chen, X.-Z., Zheng, Q.-H., Guan, X.-H., Lin, C.G.: Quantitative hierarchical threat evaluation model for network security. J. Jiangsu Univ. (Nat. Sci. Ed.) 17(4), 885\u2013897 (2006). (in Chinese)","journal-title":"J. Jiangsu Univ. (Nat. Sci. Ed.)"},{"issue":"11","key":"47_CR11","first-page":"1643","volume":"33","author":"Z-Q Shou","year":"2010","unstructured":"Shou, Z.-Q., Tao, J.-P., Zhou, J., Deng, L.: Study of campus network security evaluation index system based on extension analytic hierarchy process. J. Comput. 33(11), 1643\u20131647 (2010). (in Chinese)","journal-title":"J. Comput."},{"key":"47_CR12","unstructured":"Jia, W.: Research and implementation of WLAN attack effect evaluation. Beijing University of Posts and Telecommunications (2015). (in Chinese)"},{"issue":"24","key":"47_CR13","first-page":"107","volume":"52","author":"Y Zhang","year":"2016","unstructured":"Zhang, Y., Yang, Q.: Research on mobile internet security situation assessment based on fuzzy analytic hierarchy process. Comput. Eng. Appl. 52(24), 107\u2013111 (2016). (In Chinese)","journal-title":"Comput. Eng. Appl."},{"issue":"2","key":"47_CR14","first-page":"4","volume":"38","author":"Y Jia","year":"2011","unstructured":"Jia, Y., Wang, X., Han, W., et al.: YHSSAS: large-scale network oriented security situational awareness system. Comput. Sci. 38(2), 4\u20138 (2011). (in Chinese)","journal-title":"Comput. Sci."},{"key":"47_CR15","unstructured":"O\u2019Shea, K., Nash, R.: An introduction to convolutional neural networks. arXiv preprint arXiv:1511.08458 (2015)"},{"key":"47_CR16","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.neunet.2014.08.005","volume":"64","author":"TN Sainath","year":"2015","unstructured":"Sainath, T.N., Kingsbury, B., Saon, G., et al.: Deep convolutional neural networks for large-scale speech tasks. Neural Netw. Off. J. Int. Neural Netw. Soc. 64, 39\u201348 (2015)","journal-title":"Neural Netw. Off. J. Int. Neural Netw. Soc."},{"key":"47_CR17","doi-asserted-by":"crossref","unstructured":"LeCun, Y., Kavukcuoglu, K., Farabet, C.: Convolutional networks and applications in vision. In: Proceedings of 2010 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 253\u2013256. IEEE (2010)","DOI":"10.1109\/ISCAS.2010.5537907"},{"key":"47_CR18","unstructured":"Zhang, J.: Research on key technologies of network security assessment. National University of Defense Technology (2013). (in Chinese)"},{"key":"47_CR19","doi-asserted-by":"crossref","unstructured":"Tian, Z., Wang, Y., Sun, Y., Qiu, J.: Location privacy challenges in mobile edge computing: classification and exploration. IEEE Network (2019)","DOI":"10.1109\/MNET.001.1900139"},{"key":"47_CR20","doi-asserted-by":"crossref","unstructured":"Tian, Z., et al.: Real time lateral movement detection based on evidence reasoning network for edge computing environment. IEEE Trans. Ind. Inform. (2019)","DOI":"10.1109\/TII.2019.2907754"},{"key":"47_CR21","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.future.2018.12.054","volume":"95","author":"Z Tian","year":"2019","unstructured":"Tian, Z., Shen, S., Shi, W., Du, X., Guizani, M., Xiang, Y.: A data-driven model for future internet route decision modeling. Future Gener. Comput. Syst. 95, 212\u2013220 (2019). https:\/\/doi.org\/10.1016\/j.future.2018.12.054","journal-title":"Future Gener. Comput. Syst."},{"key":"47_CR22","doi-asserted-by":"publisher","first-page":"35355","DOI":"10.1109\/ACCESS.2018.2846590","volume":"6","author":"Z Tian","year":"2018","unstructured":"Tian, Z., Cui, L.A., Su, S., Yin, X., Yin, L., Cui, X.: A real-time correlation of host-level events in cyber range service for smart campus. IEEE Access 6, 35355\u201335364 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2846590","journal-title":"IEEE Access"},{"issue":"2","key":"47_CR23","doi-asserted-by":"publisher","first-page":"1584","DOI":"10.1109\/JIOT.2018.2846624","volume":"6","author":"Qingfeng Tan","year":"2019","unstructured":"Tan, Q., Gao, Y., Shi, J., Wang, X., Fang, B., Tian, Z.H.: Towards a comprehensive insight into the eclipse attacks of tor hidden services. IEEE Internet Things J. (2018). https:\/\/doi.org\/10.1109\/jiot.2018.2846624","journal-title":"IEEE Internet of Things Journal"},{"issue":"11\u201312","key":"47_CR24","doi-asserted-by":"publisher","first-page":"2314","DOI":"10.1016\/j.comcom.2007.04.009","volume":"30","author":"Y Xiao","year":"2007","unstructured":"Xiao, Y., Rayi, V., Sun, B., Du, X., Hu, F., Galloway, M.: A survey of key management schemes in wireless sensor networks. J. Comput. Commun. 30(11\u201312), 2314\u20132341 (2007)","journal-title":"J. Comput. Commun."},{"issue":"1","key":"47_CR25","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.adhoc.2006.05.012","volume":"5","author":"X Du","year":"2007","unstructured":"Du, X., Xiao, Y., Guizani, M., Chen, H.H.: An effective key management scheme for heterogeneous sensor networks. Ad Hoc Netw. 5(1), 24\u201334 (2007)","journal-title":"Ad Hoc Netw."},{"issue":"11","key":"47_CR26","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/MCOM.2007.4378332","volume":"45","author":"Y Xiao","year":"2007","unstructured":"Xiao, Y., Du, X., Zhang, J., Guizani, S.: Internet Protocol Television (IPTV): the Killer application for the next generation Internet. IEEE Commun. Mag. 45(11), 126\u2013134 (2007)","journal-title":"IEEE Commun. Mag."},{"issue":"4","key":"47_CR27","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MWC.2008.4599222","volume":"15","author":"X Du","year":"2008","unstructured":"Du, X., Chen, H.H.: Security in wireless sensor networks. IEEE Wirel. Commun. Mag. 15(4), 60\u201366 (2008)","journal-title":"IEEE Wirel. Commun. Mag."},{"issue":"3","key":"47_CR28","doi-asserted-by":"publisher","first-page":"1223","DOI":"10.1109\/TWC.2009.060598","volume":"8","author":"X Du","year":"2009","unstructured":"Du, X., Guizani, M., Xiao, Y., Chen, H.H.: Transactions papers, a routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks. IEEE Trans. Wirel. Commun. 8(3), 1223\u20131229 (2009)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"1","key":"47_CR29","first-page":"137","volume":"56","author":"M Hou","year":"2018","unstructured":"Hou, M., Wei, R., Wang, T., Cheng, Y., Qian, B.: Reliable medical recommendation based on privacy-preserving collaborative filtering. CMC 56(1), 137\u2013149 (2018)","journal-title":"CMC"},{"issue":"3","key":"47_CR30","first-page":"381","volume":"56","author":"H Zhang","year":"2018","unstructured":"Zhang, H., Yi, Y., Wang, J., Cao, N., Duan, Q.: Network security situation awareness framework based on threat intelligence. CMC-Comput. Mater. Continua 56(3), 381\u2013399 (2018)","journal-title":"CMC-Comput. Mater. Continua"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24271-8_47","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,13]],"date-time":"2021-01-13T04:10:23Z","timestamp":1610511023000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24271-8_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242701","9783030242718"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24271-8_47","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}