{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,12]],"date-time":"2025-04-12T23:49:18Z","timestamp":1744501758631,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":8,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789400772618"},{"type":"electronic","value":"9789400772625"}],"license":[{"start":{"date-parts":[[2013,11,13]],"date-time":"2013-11-13T00:00:00Z","timestamp":1384300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,11,13]],"date-time":"2013-11-13T00:00:00Z","timestamp":1384300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-94-007-7262-5_108","type":"book-chapter","created":{"date-parts":[[2013,11,12]],"date-time":"2013-11-12T17:02:50Z","timestamp":1384275770000},"page":"953-962","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A Forecast Method for Network Security Situation Based on Fuzzy Markov Chain"],"prefix":"10.1007","author":[{"given":"Yicun","family":"Wang","sequence":"first","affiliation":[]},{"given":"Weijie","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yun","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,11,13]]},"reference":[{"key":"108_CR1","doi-asserted-by":"crossref","unstructured":"Onwubiko C (2009) Functional requirements of situational awareness in computer network security. In: IEEE international conference on on intelligence and security informatics ISI\u201909, pp 209\u2013213","DOI":"10.1109\/ISI.2009.5137305"},{"key":"108_CR2","unstructured":"Wei-wei X, Hai-feng W (2010) Prediction model of network security situation based on regression analysis. In: IEEE international conference on wireless communications, networking and information security (WCNIS 2010), pp 616\u2013619"},{"key":"108_CR3","doi-asserted-by":"crossref","unstructured":"Jibao L, Huiqiang W, Liang Z (2006) Study of network security situation awareness model based on simple additive weight and grey theory. in: International conference on computational intelligence and security, pp 1545\u20131548","DOI":"10.1109\/ICCIAS.2006.295320"},{"issue":"3","key":"108_CR4","doi-asserted-by":"publisher","first-page":"495","DOI":"10.3724\/SP.J.1001.2011.03751","volume":"22","author":"Y Zhang","year":"2011","unstructured":"Zhang Y, Tan XB, Cui XL et al (2011) Network security situation awareness approach based on Markov game model. J Software 22(3):495\u2013508","journal-title":"J Software"},{"key":"108_CR5","unstructured":"Kuang GC, Wang XF, Yin LR (2012) A fuzzy forecast method for network security situation based on Markov. In: International conference on computer science and information processing (CSIP 2012), pp 785\u2013789"},{"key":"108_CR6","doi-asserted-by":"crossref","unstructured":"Garc\u00eda Adeva JJ, Pikatza Atxa JM (2007) Intrusion detection in web applications using text mining. Eng Appl Art Intell 20(4):555\u2013566","DOI":"10.1016\/j.engappai.2006.09.001"},{"key":"108_CR7","unstructured":"http:\/\/www.ibm.com\/developerworks\/cn\/security\/se-parseatt\/"},{"key":"108_CR8","unstructured":"http:\/\/www.sigkdd.org\/kdd-cup-1999-computer-network-intrusion-detection"}],"container-title":["Lecture Notes in Electrical Engineering","Advanced Technologies, Embedded and Multimedia for Human-centric Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-94-007-7262-5_108","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,7]],"date-time":"2023-02-07T19:37:24Z","timestamp":1675798644000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-94-007-7262-5_108"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,13]]},"ISBN":["9789400772618","9789400772625"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-94-007-7262-5_108","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2013,11,13]]},"assertion":[{"value":"13 November 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}