{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T12:09:28Z","timestamp":1756382968678,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030539795"},{"type":"electronic","value":"9783030539801"}],"license":[{"start":{"date-parts":[[2020,8,13]],"date-time":"2020-08-13T00:00:00Z","timestamp":1597276800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,13]],"date-time":"2020-08-13T00:00:00Z","timestamp":1597276800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-53980-1_68","type":"book-chapter","created":{"date-parts":[[2020,8,12]],"date-time":"2020-08-12T17:09:22Z","timestamp":1597252162000},"page":"461-466","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Dynamic Network Optimization Analysis Based on Multi-network Measurement Big Data"],"prefix":"10.1007","author":[{"given":"Zhiguo","family":"Meng","sequence":"first","affiliation":[]},{"given":"Haiyan","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,13]]},"reference":[{"key":"68_CR1","first-page":"45","volume":"10","author":"Y Liao","year":"2009","unstructured":"Liao, Y.: Security architecture design of dual-network multimedia videophone system. Commun. Technol. 10, 45\u201348 (2009). (in Chinese)","journal-title":"Commun. Technol."},{"key":"68_CR2","doi-asserted-by":"crossref","unstructured":"Sun, M.: Fuzzy comprehensive evaluation of business intelligence system based on AHP. Master\u2019s thesis of Heilongjiang University (2011). (in Chinese)","DOI":"10.4028\/www.scientific.net\/AMR.281.169"},{"issue":"1","key":"68_CR3","doi-asserted-by":"publisher","first-page":"50588","DOI":"10.1109\/ACCESS.2019.2909286","volume":"7","author":"X Song","year":"2019","unstructured":"Song, X., Chen, Z., Chen, L.: A multi-bit fully homomorphic encryption with shorter public key from LWE. IEEE Access 7(1), 50588\u201350594 (2019). (in Chinese)","journal-title":"IEEE Access"},{"issue":"1","key":"68_CR4","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1038\/s41598-018-37482-x","volume":"9","author":"RR Rani","year":"2019","unstructured":"Rani, R.R., Ramyachitra, D., Brindhadevi, A.: Detection of dynamic protein complexes through Markov clustering based on elephant herd optimization approach. Sci. Rep. 9(1), 106\u2013110 (2019)","journal-title":"Sci. Rep."},{"key":"68_CR5","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/j.jtbi.2014.10.035","volume":"365","author":"S Waldherr","year":"2015","unstructured":"Waldherr, S., Oyarz\u00fan, D.A., Bockmayr, A.: Dynamic optimization of metabolic networks coupled with gene expression. J. Theor. Biol. 365, 469\u2013485 (2015)","journal-title":"J. Theor. Biol."},{"issue":"3","key":"68_CR6","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1049\/ip-cta:20050025","volume":"153","author":"C Chen","year":"2006","unstructured":"Chen, C., Lin, Y.F.: Application of feedback linearization to the tracking and almost disturbance decoupling control of multi input multi output nonlinear systems. IEEE Process. Control Theory Appl. 153(3), 331\u2013341 (2006). (in Chinese)","journal-title":"IEEE Process. Control Theory Appl."},{"key":"68_CR7","unstructured":"Ling, S., Chen, G.: GSM network optimization. Graduation Project Set (2008). (in Chinese)"},{"issue":"14","key":"68_CR8","doi-asserted-by":"publisher","first-page":"5683","DOI":"10.1007\/s00500-018-3226-6","volume":"23","author":"X Zhang","year":"2019","unstructured":"Zhang, X., Wen, F.: An novel anonymous user WSN authentication for Internet of Things. Soft Comput. 23(14), 5683\u20135691 (2019). (in Chinese)","journal-title":"Soft Comput."},{"key":"68_CR9","doi-asserted-by":"crossref","unstructured":"Chen, Z., Wan, J., Chen, L., Song, X.: A regev-type fully homomorphic encryption scheme using odulus switching. Sci. World J. 1\u201312(2014)","DOI":"10.1155\/2014\/983862"},{"issue":"5","key":"68_CR10","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/s10661-019-7467-3","volume":"191","author":"K Kumari","year":"2019","unstructured":"Kumari, K., Jain, S., Dhar, A.: Computationally efficient approach for identification of fuzzy dynamic groundwater sampling network. Environ. Monit. Assess. 191(5), 310\u2013316 (2019)","journal-title":"Environ. Monit. Assess."}],"container-title":["Advances in Intelligent Systems and Computing","2020 International Conference on Applications and Techniques in Cyber Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-53980-1_68","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,13]],"date-time":"2020-08-13T02:09:13Z","timestamp":1597284553000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-53980-1_68"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,13]]},"ISBN":["9783030539795","9783030539801"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-53980-1_68","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,13]]},"assertion":[{"value":"13 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ATCI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applications and Techniques in Cyber Security and Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Fuyang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 June 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 June 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"atci2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}