{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T16:40:09Z","timestamp":1745944809006,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642357947"},{"type":"electronic","value":"9783642357954"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-35795-4_73","type":"book-chapter","created":{"date-parts":[[2013,1,4]],"date-time":"2013-01-04T09:49:42Z","timestamp":1357292982000},"page":"580-590","source":"Crossref","is-referenced-by-count":0,"title":["Modeling of Hierarchical Index System for Network Operation Security"],"prefix":"10.1007","author":[{"given":"Yongzheng","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xiaochun","family":"Yun","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"73_CR1","unstructured":"Fang, B.X., Yin, L.H.: Research on Information Security Definition. Information and Network Security\u00a0(1) 8\u201310 (2008)"},{"issue":"12","key":"73_CR2","first-page":"1943","volume":"28","author":"C. Lin","year":"2005","unstructured":"Lin, C., Wang, Y., Li, Q.L.: Stochastic Modeling and Evaluation for Network Security. Chinese Journal of Computers\u00a028(12), 1943\u20131956 (2005)","journal-title":"Chinese Journal of Computers"},{"key":"73_CR3","first-page":"10","volume":"8","author":"X.D. Cheng","year":"2005","unstructured":"Cheng, X.D.: Research on evaluation index system of telecommunication security. Modern Science and Technology of Telecommunications\u00a0(8), 10\u201313 (2005)","journal-title":"Modern Science and Technology of Telecommunications"},{"key":"73_CR4","doi-asserted-by":"crossref","unstructured":"Gao, H.S., Zhu, J., Li, C.C.: The analysis of uncertainty of network security risk assessment using Dempster-Shafer theory. In: Proceedings of 12th International Conference on Computer Supported Cooperative Work in Design (CSCWD 2008), Xi\u2019an, China, pp. 754\u2013759 (April 2008)","DOI":"10.1109\/CSCWD.2008.4537073"},{"key":"73_CR5","first-page":"50","volume":"5","author":"Y. Hu","year":"2008","unstructured":"Hu, Y., Ren, D.B., Wu, S.H., et al.: Study and Application of Evaluation Index System for Telecommunication Network Risk. Telecommunications Science\u00a0(5), 50\u201354 (2008)","journal-title":"Telecommunications Science"},{"issue":"5","key":"73_CR6","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MSECP.2003.1236235","volume":"1","author":"S. Hariri","year":"2003","unstructured":"Hariri, S., Qu, G., Dharmagadda, T., et al.: Impact analysis of faults and attacks in large-scale networks. IEEE Security & Privacy\u00a01(5), 49\u201354 (2003)","journal-title":"IEEE Security & Privacy"},{"key":"73_CR7","unstructured":"Qu, G., Hariri, S., Zhu, X., et al.: Multivariate Statistical Online Analysis for Self Protection against Network Attacks. In: Proceedings of the IEEE International Conference on Information and Computer Science (ICICS 2004), Dhahran, Saudi Arabia (November 2004)"},{"key":"73_CR8","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1016\/j.cose.2004.08.009","volume":"24","author":"X.Z. Chen","year":"2005","unstructured":"Chen, X.Z., Zheng, Q.H., Guan, X.H., et al.: Multiple behavior information fusion based quantitative threat evaluation. Computers & Security\u00a0(24), 218\u2013231 (2005)","journal-title":"Computers & Security"},{"issue":"34","key":"73_CR9","first-page":"149","volume":"41","author":"S. Wang","year":"2005","unstructured":"Wang, S., Sun, L.C.: Research and Implementation of Evaluation System for Network Attack Effect Based on Indicator System. Computer Engineering and Applications\u00a041(34), 149\u2013153 (2005)","journal-title":"Computer Engineering and Applications"},{"key":"73_CR10","unstructured":"Su, J.H.: Social Economy Statistics Theory, 2nd edn. Lixin Accounting Publishing House (2006)"}],"container-title":["Communications in Computer and Information Science","Trustworthy Computing and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35795-4_73.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T15:59:56Z","timestamp":1745942396000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35795-4_73"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642357947","9783642357954"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35795-4_73","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2013]]}}}