{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T02:18:33Z","timestamp":1768270713611,"version":"3.49.0"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030697167","type":"print"},{"value":"9783030697174","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-69717-4_81","type":"book-chapter","created":{"date-parts":[[2021,3,4]],"date-time":"2021-03-04T18:03:07Z","timestamp":1614880987000},"page":"875-883","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Overview of Network Security Situation Awareness Based on Big Data"],"prefix":"10.1007","author":[{"given":"Weimin","family":"Qian","sequence":"first","affiliation":[]},{"given":"Hongtu","family":"Lai","sequence":"additional","affiliation":[]},{"given":"Quan","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Kuo-Chi","family":"Chang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,5]]},"reference":[{"key":"81_CR1","doi-asserted-by":"crossref","unstructured":"Tianfield, H.: Cyber security situational awareness. IEEE (2017)","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2016.165"},{"issue":"06","key":"81_CR2","first-page":"1","volume":"46","author":"F Guilan","year":"2019","unstructured":"Guilan, F., Zhengnan, L., Wengang, Z.: Research review of big data analysis technology in network field. Comput. Sci. 46(06), 1\u201320 (2019)","journal-title":"Comput. Sci."},{"issue":"01","key":"81_CR3","first-page":"57","volume":"39","author":"G Fangfang","year":"2019","unstructured":"Fangfang, G., Luomeng, C., Jianwen, Z.: Parallel preprocessing method of multi-source data based on similar connection. Comput. Appl. 39(01), 57\u201360 (2019)","journal-title":"Comput. Appl."},{"issue":"03","key":"81_CR4","first-page":"620","volume":"37","author":"C Fumei","year":"2017","unstructured":"Fumei, C., Dezhi, H., Kun, B., et al.: Analysis of key technologies for distributed data stream processing in big data environment. Comput. Appl. 37(03), 620\u2013627 (2017)","journal-title":"Comput. Appl."},{"key":"81_CR5","doi-asserted-by":"crossref","unstructured":"Gupta, D., Singhal, S., Malik, S., et al.: Network intrusion detection system using various data mining techniques. IEEE (2016)","DOI":"10.1109\/RAINS.2016.7764418"},{"key":"81_CR6","doi-asserted-by":"publisher","first-page":"21954","DOI":"10.1109\/ACCESS.2017.2762418","volume":"5","author":"C Yin","year":"2017","unstructured":"Yin, C., Zhu, Y., Fei, J., et al.: A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5, 21954\u201321961 (2017)","journal-title":"IEEE Access"},{"key":"81_CR7","first-page":"48231","volume":"6","author":"D Hongwei","year":"2019","unstructured":"Hongwei, D., Liang, W., Kang, Z., et al.: Intrusion detection based on deep convolution neural network. Comput. Sci. 6, 48231\u201348246 (2019)","journal-title":"Comput. Sci."},{"key":"81_CR8","doi-asserted-by":"crossref","unstructured":"Hai-He, T.: Intrusion detection method based on improved neural network. In: 2018 International Conference on Smart Grid and Electrical Automation (ICSGEA), pp. 151\u2013154. IEEE (2018)","DOI":"10.1109\/ICSGEA.2018.00045"},{"issue":"2","key":"81_CR9","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"AL Buczak","year":"2016","unstructured":"Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 18(2), 1153\u20131176 (2016)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"81_CR10","doi-asserted-by":"crossref","unstructured":"Xiaofeng, Z., Xiaohong, H.: Research on intrusion detection based on improved combination of K-means and multi-level SVM. In: 2017 IEEE 17th International Conference on Communication Technology (ICCT), pp. 2042\u20132045. IEEE (2017)","DOI":"10.1109\/ICCT.2017.8359987"},{"key":"81_CR11","unstructured":"Zixuan, F., Yang, X., Zhaodi, W., et al.: SVM based on incremental learning_KNN network intrusion detection method_ Fu Zixuan. Computer Engineering (2019)"},{"key":"81_CR12","doi-asserted-by":"crossref","unstructured":"Yang, T., Jia, S.: Research on network security visualization under big data environment. In: IEEE Computer Society. International Computer Symposium (2016)","DOI":"10.1109\/ICS.2016.0135"},{"key":"81_CR13","doi-asserted-by":"crossref","unstructured":"Wu, C., Sheng, S., Dong, X.: Research on visualization systems for DDoS attack detection. In: 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC) (2018)","DOI":"10.1109\/SMC.2018.00507"},{"key":"81_CR14","doi-asserted-by":"crossref","unstructured":"Romero-Gomez, R., Nadji, Y., Antonakakis, M.: Towards designing effective visualizations for DNS-based network threat analysis. IEEE (2017)","DOI":"10.1109\/VIZSEC.2017.8062201"},{"issue":"05","key":"81_CR15","first-page":"1091","volume":"27","author":"C Yi","year":"2016","unstructured":"Yi, C., Yuangang, Z., Haiyun, H., et al.: A visualization method for multi-dimensional attributes in hierarchical structure. Acta software Sinica. 27(05), 1091\u20131102 (2016)","journal-title":"Acta software Sinica."},{"issue":"04","key":"81_CR16","first-page":"1","volume":"28","author":"W Quanmin","year":"2019","unstructured":"Quanmin, W., Xiaofang, H.: Visualization analysis of network security big data based on NetFlow. Comput. Syst. Appl. 28(04), 1\u20138 (2019)","journal-title":"Comput. Syst. Appl."},{"key":"81_CR17","doi-asserted-by":"crossref","unstructured":"Jia, Z., Wang, N., Wang, Y., et al.: The traceability analysis and research of Botnet control center based on ant colony group-dividing algorithm. IEEE (2018)","DOI":"10.1109\/ICIEA.2018.8397841"},{"key":"81_CR18","doi-asserted-by":"crossref","unstructured":"Frigault, M., Wang, L.: Measuring network security using bayesian network-based attack graphs. In: 2008 32nd Annual IEEE International Computer Software and Applications Conference, pp. 698\u2013703. IEEE (2008)","DOI":"10.1109\/COMPSAC.2008.88"},{"key":"81_CR19","first-page":"89","volume":"12","author":"Z Gang","year":"2018","unstructured":"Gang, Z., Jinjing, W., Yingbin, H.: Research and design of the method for dealing with university network security incidents based on firewall strategy. Netw. Secur. Technol. Appl. 12, 89\u201390 (2018)","journal-title":"Netw. Secur. Technol. Appl."}],"container-title":["Advances in Intelligent Systems and Computing","Advanced Machine Learning Technologies and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-69717-4_81","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,4]],"date-time":"2021-03-04T18:42:31Z","timestamp":1614883351000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-69717-4_81"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030697167","9783030697174"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-69717-4_81","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"5 March 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AMLTA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Machine Learning Technologies and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cairo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Egypt","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 March 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 March 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"amlta2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/egyptscience.net\/AMLTA2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}