{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T22:50:17Z","timestamp":1743029417793,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":16,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811003554"},{"type":"electronic","value":"9789811003561"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-981-10-0356-1_65","type":"book-chapter","created":{"date-parts":[[2016,1,18]],"date-time":"2016-01-18T09:24:58Z","timestamp":1453109098000},"page":"631-639","source":"Crossref","is-referenced-by-count":3,"title":["A Method of Network Security Situation Assessment Based on Hidden Markov Model"],"prefix":"10.1007","author":[{"given":"Shuang","family":"Xiang","sequence":"first","affiliation":[]},{"given":"Yanli","family":"Lv","sequence":"additional","affiliation":[]},{"given":"Chunhe","family":"Xia","sequence":"additional","affiliation":[]},{"given":"Yuanlong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zhihuan","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,19]]},"reference":[{"key":"65_CR1","unstructured":"Bass, T.: Multisensor data fusion for next generation distributed intrusion detection systems (1999)"},{"issue":"4","key":"65_CR2","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1145\/332051.332079","volume":"43","author":"T Bass","year":"2000","unstructured":"Bass, T.: Intrusion detection systems and multisensor data fusion. Commun. ACM 43(4), 99\u2013105 (2000)","journal-title":"Commun. ACM"},{"issue":"4","key":"65_CR3","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1360\/jos170885","volume":"17","author":"C Xz","year":"2006","unstructured":"Xz, C., et al.: Quantitative hierarchical threat evaluation model for network security. J. Softw. 17(4), 885\u2013897 (2006)","journal-title":"J. Softw."},{"issue":"4","key":"65_CR4","first-page":"404","volume":"38","author":"X Xiuzhen","year":"2004","unstructured":"Xiuzhen, X., et al.: Study on evaluation for security situation of networked system. J. Xi\u2019An Jiaotong Univ. 38(4), 404\u2013408 (2004)","journal-title":"J. Xi\u2019An Jiaotong Univ."},{"issue":"2","key":"65_CR5","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1145\/996943.996947","volume":"7","author":"P Ning","year":"2004","unstructured":"Ning, P., et al.: Techniques and tools for analyzing intrusion alerts. ACM Trans. Inf. Syst. Secur. (TISSEC) 7(2), 274\u2013318 (2004)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"65_CR6","unstructured":"Xu, D., Ning, P.: Alert correlation through triggering events and common resources. In: 20th Annual Computer Security Applications Conference. IEEE (2004)"},{"issue":"3","key":"65_CR7","first-page":"009","volume":"22","author":"Z Yong","year":"2011","unstructured":"Yong, Z., et al.: Network security situation awareness approach based on Markov game model. J. Softw. 22(3), 009 (2011)","journal-title":"J. Softw."},{"key":"65_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/11856214_8","volume-title":"Recent Advances in Intrusion Detection","author":"A \u00c5rnes","year":"2006","unstructured":"\u00c5rnes, A., Valeur, F., Vigna, G., Kemmerer, R.A.: Using Hidden Markov Models to evaluate the risks of intrusions. In: Zamboni, D., Kruegel, C. (eds.) RAID 2006. LNCS, vol. 4219, pp. 145\u2013164. Springer, Heidelberg (2006)"},{"key":"65_CR9","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/11596981_57","volume-title":"Computational Intelligence and Security","author":"A \u00c5rnes","year":"2005","unstructured":"\u00c5rnes, A., Sallhammar, K., Haslum, K., Brekne, T., Moe, M.E.G., Knapskog, S.J.: Real-time risk assessment with network sensors and intrusion detection systems. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol. 3802, pp. 388\u2013397. Springer, Heidelberg (2005)"},{"key":"65_CR10","doi-asserted-by":"crossref","unstructured":"Khosravi-Farmad M, Rezaee R, Harati A, et al.: Network security risk mitigation using Bayesian decision networks. In: 2014 4th International eConference on Computer and Knowledge Engineering (ICCKE), pp. 267\u2013272. IEEE (2014)","DOI":"10.1109\/ICCKE.2014.6993444"},{"issue":"4","key":"65_CR11","first-page":"749","volume":"38","author":"X Rongrong","year":"2015","unstructured":"Rongrong, X., et al.: An improved quantitative evaluation method for network security. Chinese J. Comput. 38(4), 749\u2013758 (2015)","journal-title":"Chinese J. Comput."},{"issue":"2","key":"65_CR12","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/5.18626","volume":"77","author":"LR Rabiner","year":"1989","unstructured":"Rabiner, L.R.: A tutorial on hidden Markov models and selected applications in speech recognition. Proc. IEEE 77(2), 257\u2013286 (1989)","journal-title":"Proc. IEEE"},{"key":"65_CR13","first-page":"069","volume":"8","author":"R Han","year":"2009","unstructured":"Han, R., Zhao, B., Xu, K.: Policy-based integrative network security management system. Comput. Eng. 8, 069 (2009)","journal-title":"Comput. Eng."},{"key":"65_CR14","unstructured":"Jianfeng, Z.: Graduate School of National University of Defense Technology (2013)"},{"key":"65_CR15","volume-title":"Pattern Recognition and Machine Learning","author":"CM Bishop","year":"2006","unstructured":"Bishop, C.M.: Pattern Recognition and Machine Learning. Springer, New York (2006)"},{"key":"65_CR16","unstructured":"Lincoln Laboratory (2000). \n                    https:\/\/www.ll.mit.edu\/ideval\/data\/2000data.html"}],"container-title":["Communications in Computer and Information Science","Computational Intelligence and Intelligent Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-0356-1_65","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T06:30:51Z","timestamp":1559370651000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-0356-1_65"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9789811003554","9789811003561"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-0356-1_65","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2016]]}}}