{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,2]],"date-time":"2025-09-02T10:56:33Z","timestamp":1756810593609,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030688509"},{"type":"electronic","value":"9783030688516"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-68851-6_25","type":"book-chapter","created":{"date-parts":[[2021,2,4]],"date-time":"2021-02-04T07:04:02Z","timestamp":1612422242000},"page":"345-355","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A Network Security Situational Awareness Framework Based on Situation Fusion"],"prefix":"10.1007","author":[{"given":"Sai","family":"Lu","sequence":"first","affiliation":[]},{"given":"Yi","family":"Zhuang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,5]]},"reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"Kom\u00e1rkov\u00e1, J., et al.: CRUSOE: data model for cyber situational awareness. In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES. ACM (2018)","DOI":"10.1145\/3230833.3232798"},{"issue":"2","key":"25_CR2","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1177\/154193128803200221","volume":"32","author":"M Endsley","year":"1988","unstructured":"Endsley, M.: Design and evaluation for situation awareness enhancement. Proc. Hum. Factors Ergon. Soc. Ann. Meet. 32(2), 97\u2013101 (1988)","journal-title":"Proc. Hum. Factors Ergon. Soc. Ann. Meet."},{"issue":"3","key":"25_CR3","first-page":"40","volume":"24","author":"B Tim","year":"1999","unstructured":"Tim, B., Gruber, D.: A glimpse into the future of id. Mag. USENIX SAGE 24(3), 40\u201349 (1999)","journal-title":"Mag. USENIX SAGE"},{"issue":"4","key":"25_CR4","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1145\/332051.332079","volume":"43","author":"B Tim","year":"2000","unstructured":"Tim, B.: Intrusion detection systems and multisensor data fusion. Commun. ACM 43(4), 99\u2013105 (2000)","journal-title":"Commun. ACM"},{"issue":"1","key":"25_CR5","first-page":"1","volume":"32","author":"R Xi","year":"2012","unstructured":"Xi, R., et al.: Research survey of network security situation awareness. J. Comput. Appl. 32(1), 1\u20134 (2012)","journal-title":"J. Comput. Appl."},{"key":"25_CR6","doi-asserted-by":"publisher","unstructured":"Wang, H., et al.: Research on network security situation assessment and quantification method based on analytic hierarchy process. Wirel. Pers. Commun. 102(2), 1401\u20131420 (2018). https:\/\/doi.org\/10.1007\/s11277-017-5202-3","DOI":"10.1007\/s11277-017-5202-3"},{"key":"25_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/978-3-319-64701-2_25","volume-title":"Network and System Security","author":"Y Zheng","year":"2017","unstructured":"Zheng, Y., Lv, K., Hu, C.: A quantitative method for evaluating network security based on attack graph. In: Yan, Z., Molva, R., Mazurczyk, W., Kantola, R. (eds.) NSS 2017. LNCS, vol. 10394, pp. 349\u2013358. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-64701-2_25"},{"issue":"10","key":"25_CR8","first-page":"1","volume":"38","author":"H Hao","year":"2017","unstructured":"Hao, H., et al.: Quantitative method for network security situation based on attack prediction. Secur. Commun. Netw. 38(10), 1\u20139 (2017)","journal-title":"Secur. Commun. Netw."},{"issue":"2","key":"25_CR9","doi-asserted-by":"publisher","first-page":"1342","DOI":"10.1007\/s11227-018-2575-3","volume":"76","author":"P Zaiyi","year":"2018","unstructured":"Zaiyi, P.: Network security situation analysis based on a dynamic Bayesian network and phase space reconstruction. J. Supercomput. 76(2), 1342\u20131357 (2018). https:\/\/doi.org\/10.1007\/s11227-018-2575-3","journal-title":"J. Supercomput."},{"key":"25_CR10","unstructured":"Guang, K., et al.: A network security situation assessment method based on attack intention perception. In: 2016 2nd IEEE International Conference on Computer and Communications, ICCC, pp. 1138\u20131142. IEEE (2016)"},{"key":"25_CR11","doi-asserted-by":"publisher","unstructured":"Liu, Y., Mu, D.: A network security situation awareness model based on risk assessment. In: Kr\u00f6mer, P., Zhang, H., Liang, Y., Pan, J.S. (eds.) ECC 2018. AISC, vol. 891, pp. 17\u201324. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03766-6_3","DOI":"10.1007\/978-3-030-03766-6_3"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Li, S., Zhao, D.: A LSTM-based method for comprehension and evaluation of network security situation. In: 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/13th IEEE International Conference on Big Data Science and Engineering, TrustCom\/BigDataSE, pp. 723\u2013728. IEEE (2019)","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00103"},{"key":"25_CR13","first-page":"1926","volume":"7","author":"L Xie","year":"2017","unstructured":"Xie, L., Wang, Z.: Network security situation assessment method based on cuckoo search optimized back propagation neural network. J. Comput. Appl. 7, 1926\u20131930 (2017)","journal-title":"J. Comput. Appl."},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Wang, D., et al.: Research on computer network security evaluation method based on Levenberg-Marquardt algorithms. In: 2019 International Conference on Communications, Information System and Computer Engineering, CISCE, pp. 399\u2013402. IEEE (2019)","DOI":"10.1109\/CISCE.2019.00094"},{"issue":"2","key":"25_CR15","first-page":"80","volume":"14","author":"J Zhang","year":"2000","unstructured":"Zhang, J.: Fuzzy analytic hierarchy process (FAHP). Fuzzy Syst. Math. 14(2), 80\u201388 (2000)","journal-title":"Fuzzy Syst. Math."},{"key":"25_CR16","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/S0169-7552(98)00110-X","volume":"30","author":"B Sergey","year":"1998","unstructured":"Sergey, B., Page, L.: The anatomy of a large-scale hypertextual web search engine. Comput. Netw. ISDN Syst. 30, 107\u2013117 (1998)","journal-title":"Comput. Netw. ISDN Syst."},{"issue":"6","key":"25_CR17","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1109\/MSP.2006.145","volume":"4","author":"M Peter","year":"2006","unstructured":"Peter, M., Scarfone, K., Romanosky, S.: Common vulnerability scoring system. IEEE Secur. Priv. 4(6), 85\u201389 (2006)","journal-title":"IEEE Secur. Priv."},{"issue":"4","key":"25_CR18","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1360\/jos170885","volume":"17","author":"X Chen","year":"2006","unstructured":"Chen, X., et al.: Hierarchical quantitative assessment method of cyber security threat situation. J. Softw. 17(4), 885\u2013897 (2006)","journal-title":"J. Softw."},{"issue":"7","key":"25_CR19","first-page":"1638","volume":"26","author":"R Xi","year":"2015","unstructured":"Xi, R., Yun, X., Zhang, Y.: Quantitative assessment method of cyber threat situation based on environmental attributes. J. Softw. 26(7), 1638\u20131649 (2015)","journal-title":"J. Softw."}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-68851-6_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,4]],"date-time":"2021-02-04T07:26:09Z","timestamp":1612423569000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-68851-6_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030688509","9783030688516"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-68851-6_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"5 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.spaccs2020.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"131","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}