{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T03:39:55Z","timestamp":1743046795389,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":10,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811003554"},{"type":"electronic","value":"9789811003561"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-981-10-0356-1_76","type":"book-chapter","created":{"date-parts":[[2016,1,18]],"date-time":"2016-01-18T09:24:58Z","timestamp":1453109098000},"page":"724-733","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Prediction on Internet Safety Situation of Relevance Vector Machine about GP-RVM Kernel Function"],"prefix":"10.1007","author":[{"given":"Xiaolan","family":"Xie","sequence":"first","affiliation":[]},{"given":"Zhen","family":"Long","sequence":"additional","affiliation":[]},{"given":"Fahui","family":"Gu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,19]]},"reference":[{"issue":"3","key":"76_CR1","first-page":"821","volume":"34","author":"B Shi","year":"2013","unstructured":"Shi, B., Xie, X.Q.: Research on network security situation forecast method based on D-S evidence theory. Comput. Eng. Design. 34(3), 821\u2013825 (2013). (In Chinese)","journal-title":"Comput. Eng. Design."},{"key":"76_CR2","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1016\/j.procs.2013.05.068","volume":"17","author":"H Zhang","year":"2013","unstructured":"Zhang, H., Shi, J., Chen, X.: A multi-level analysis framework in network security situation awareness. J. Procedia Comput. Sci. 17, 530\u2013536 (2013)","journal-title":"J. Procedia Comput. Sci."},{"key":"76_CR3","volume-title":"The Grid: Blueprint for a New Computing Infrastructure","author":"I Foster","year":"1999","unstructured":"Foster, I., Kesselman, C.: The Grid: Blueprint for a New Computing Infrastructure. Morgan Kaufmann, San Francisco (1999)"},{"issue":"8","key":"76_CR4","first-page":"3042","volume":"29","author":"K Li","year":"2012","unstructured":"Li, K., Cao, Y.: Forecasting network security threat situation based on ARIMA model. J. Appl. Res. Comput. 29(8), 3042\u20133043 (2012)","journal-title":"J. Appl. Res. Comput."},{"key":"76_CR5","unstructured":"Huang, X.: The Study on Kernels in Support Vector Machine. D. Soochow University, Su Zhou (2008) (in Chinese)"},{"key":"76_CR6","doi-asserted-by":"crossref","unstructured":"Foster, I., Kesselman, C., Nick, J., Tuecke, S.: The Physiology of the Grid: an Open Grid Services Architecture for Distributed Systems Integration. Technical report, Global Grid Forum (2002)","DOI":"10.1109\/MC.2002.1009167"},{"issue":"6","key":"76_CR7","first-page":"1179","volume":"9","author":"FR Bach","year":"2008","unstructured":"Bach, F.R.: Consistency of the group lasso and multiple kernel learning. J. Mach. Learn. Res. 9(6), 1179\u20131222 (2008)","journal-title":"J. Mach. Learn. Res."},{"key":"76_CR8","unstructured":"National Center for Biotechnology, Rakotomamonjy, A., Bach, F.R., Canu, S., et al.: Simple MKL. J. Mach. Learn. Res. 9(11), 2491\u20132521 (2008)"},{"issue":"1\u20133","key":"76_CR9","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1016\/j.neucom.2005.12.128","volume":"70","author":"DN Zheng","year":"2006","unstructured":"Zheng, D.N., Wang, J.X., Zhao, Y.N.: Non-flat function estimation with a multi-scale support vector regression. J. Neurocomputing 70(1\u20133), 420\u2013429 (2006)","journal-title":"J. Neurocomputing"},{"issue":"8","key":"76_CR10","first-page":"1681","volume":"51","author":"Y-L Liu","year":"2014","unstructured":"Liu, Y.-L., Feng, G.-D., Lian, Y.-F., et al.: Network situation prediction method based on spatial-time dimension analysis. J. Comput. Res. 51(8), 1681\u20131694 (2014). (in Chinese)","journal-title":"J. Comput. Res."}],"container-title":["Communications in Computer and Information Science","Computational Intelligence and Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-0356-1_76","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T06:28:03Z","timestamp":1559370483000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-0356-1_76"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9789811003554","9789811003561"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-0356-1_76","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"19 January 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}