{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T05:17:17Z","timestamp":1742966237045,"version":"3.40.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030622220"},{"type":"electronic","value":"9783030622237"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-62223-7_54","type":"book-chapter","created":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T10:03:00Z","timestamp":1605002580000},"page":"623-633","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Secure and Moderate Data Synchronization Method Based on Network Isolation"],"prefix":"10.1007","author":[{"given":"Bing","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Zhiyong","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Yangdan","family":"Ni","sequence":"additional","affiliation":[]},{"given":"Meng","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Ruiying","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Xiao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,11]]},"reference":[{"key":"54_CR1","unstructured":"Elmasri, R., Navathe, S.B.: Database System Foundation. Shao P., Zhang K., translated, 3rd edn. People\u2019s Posts and Telecommunications Press, Beijing (2002)"},{"key":"54_CR2","first-page":"31","volume":"07","author":"Q Fan","year":"2008","unstructured":"Fan, Q., Tan, M., Luo, Y.: Security setting and security hardening of computer equipment in LAN. Inf. Secur. Commun. Confident. 07, 31\u201339 (2008)","journal-title":"Inf. Secur. Commun. Confident."},{"key":"54_CR3","first-page":"108","volume":"02","author":"B Dong","year":"2004","unstructured":"Dong, B.: Physical isolation technology for network security. Comput. Autom. 02, 108\u2013110 (2004)","journal-title":"Comput. Autom."},{"key":"54_CR4","unstructured":"Liu, W., Tong, L.: Design of Change Capture Scheme in Integration of Heterogeneous Databases. Figure\u00a04 Workflow of database synchronization sending end Computer Application Research (07), pp. 213\u2013215 (2005)"},{"issue":"04","key":"54_CR5","first-page":"67","volume":"37","author":"J Wu","year":"2016","unstructured":"Wu, J., Li, N.: Design and application of safety isolation software for intelligent hydropower plant. Hydropower Plant Autom. 37(04), 67\u201369 (2016)","journal-title":"Hydropower Plant Autom."},{"issue":"05","key":"54_CR6","first-page":"48","volume":"44","author":"H Yu","year":"2016","unstructured":"Yu, H., Ding, Y., Gao, X., Geng, N., Huang, X., Lu, Y.: Data security transmission technology of water conservancy project standardization management based on one-way isolation gate. Zhejiang Water Sci. Technol. 44(05), 48\u201350 (2016)","journal-title":"Zhejiang Water Sci. Technol."},{"issue":"02","key":"54_CR7","first-page":"10","volume":"19","author":"H Cui","year":"2016","unstructured":"Cui, H., Feng, J., Ma, W., Zhang, Q., Pang, K., Yu, K.: Research and implementation of heterogeneous database synchronization technology based on isolation gateway. Softw. Eng. 19(02), 10\u201313 (2016)","journal-title":"Softw. Eng."},{"issue":"04","key":"54_CR8","first-page":"454","volume":"27","author":"L Dai","year":"2013","unstructured":"Dai, L., Zeng, F., Huang, H., Ji, X., Yang, T.: Establishment of hospital appointment diagnosis and treatment platform based on safety isolation network gate technology. China Med. Educ. Technol. 27(04), 454\u2013457 (2013)","journal-title":"China Med. Educ. Technol."},{"key":"54_CR9","unstructured":"Thomson Licensing; Patent Application Titled \u201cDatabase Synchronization\u201d Published Online (USPTO 20200142908). Politics & Government Week (2020)"},{"key":"54_CR10","unstructured":"Danijel, F., Danijel, S., Picek, R.: Bidirectional database synchronization to the cloud computing platform. In: ICISS 2020: 2020 The 3rd International Conference on Information Science and System (2020)"},{"key":"54_CR11","doi-asserted-by":"crossref","unstructured":"Marotta, A., Cassioli, D., Tornatore, M.: Reliable slicing with isolation in optical metro-aggregation networks. In: Optical Fiber Communication Conference (2020)","DOI":"10.1364\/OFC.2020.M4D.3"}],"container-title":["Lecture Notes in Computer Science","Machine Learning for Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-62223-7_54","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T10:22:12Z","timestamp":1605003732000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-62223-7_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030622220","9783030622237"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-62223-7_54","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"11 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ML4CS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning for Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ml4cs2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ml4cs2020\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"360","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"118","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}