{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T18:31:37Z","timestamp":1775586697543,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":18,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811591280","type":"print"},{"value":"9789811591297","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-9129-7_8","type":"book-chapter","created":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T23:07:29Z","timestamp":1603321649000},"page":"100-113","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["CSKB: A Cyber Security Knowledge Base Based on Knowledge Graph"],"prefix":"10.1007","author":[{"given":"Kun","family":"Li","sequence":"first","affiliation":[]},{"given":"Huachun","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Zhe","family":"Tu","sequence":"additional","affiliation":[]},{"given":"Bohao","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,22]]},"reference":[{"issue":"1","key":"8_CR1","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1109\/COMST.2016.2610963","volume":"19","author":"S Yu","year":"2017","unstructured":"Yu, S., Liu, M., Dou, W., Liu, X., Zhou, S.: Networking for big data: a survey. IEEE Commun. Surv. Tutor. 19(1), 531\u2013549 (2017)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"6","key":"8_CR2","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/MNET.2017.1600330","volume":"31","author":"B Feng","year":"2017","unstructured":"Feng, B., Zhou, H., Zhang, H., et al.: HetNet: a flexible architecture for heterogeneous satellite-terrestrial networks. IEEE Network 31(6), 86\u201392 (2017)","journal-title":"IEEE Network"},{"key":"8_CR3","unstructured":"KDD99 (2007). kdd.ics.uci.edu\/databases\/"},{"key":"8_CR4","unstructured":"NSLKDD (2009). nsl.cs.unb.ca\/NSLKDD\/"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS), Canberra, ACT, pp. 1\u20136 (2015)","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, A.H., Hakak, S., Ghorbani, A.A.: Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy. In: 2019 International Carnahan Conference on Security Technology (ICCST), Chennai, India, pp. 1\u20138 (2019)","DOI":"10.1109\/CCST.2019.8888419"},{"key":"8_CR7","doi-asserted-by":"publisher","first-page":"2751","DOI":"10.1109\/ACCESS.2016.2577036","volume":"4","author":"S Yu","year":"2016","unstructured":"Yu, S.: Big privacy: challenges and opportunities of privacy study in the age of big data. IEEE Access 4, 2751\u20132763 (2016)","journal-title":"IEEE Access"},{"issue":"10","key":"8_CR8","doi-asserted-by":"publisher","first-page":"1887","DOI":"10.1109\/TKDE.2018.2807442","volume":"30","author":"Q Song","year":"2018","unstructured":"Song, Q., Wu, Y., Lin, P., Dong, L.X., Sun, H.: Mining summaries for knowledge graph search. IEEE Trans. Knowl. Data Eng. 30(10), 1887\u20131900 (2018)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"5","key":"8_CR9","doi-asserted-by":"publisher","first-page":"1418","DOI":"10.1109\/TC.2015.2439287","volume":"65","author":"S Yu","year":"2016","unstructured":"Yu, S., Zhou, W., Guo, S., Guo, M.: A feasible IP traceback framework through dynamic deterministic packet marking. IEEE Trans. Comput. 65(5), 1418\u20131427 (2016)","journal-title":"IEEE Trans. Comput."},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Zhu, Z., Jiang, R., Jia, Y., Xu, J., Li, A.: Cyber security knowledge graph based cyber attack attribution framework for space-ground integration information network. In: 2018 IEEE 18th International Conference on Communication Technology (ICCT), Chongqing, pp. 870\u2013874 (2018)","DOI":"10.1109\/ICCT.2018.8600108"},{"issue":"6","key":"8_CR11","doi-asserted-by":"publisher","first-page":"1073","DOI":"10.1109\/TPDS.2011.262","volume":"23","author":"S Yu","year":"2012","unstructured":"Yu, S., Zhou, W., Jia, W., Guo, S., Xiang, Y., Tang, F.: Discriminating DDoS attacks from flash crowds using flow correlation coefficient. IEEE Trans. Parallel Distrib. Syst. 23(6), 1073\u20131080 (2012)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"6","key":"8_CR12","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/MNET.2015.7340429","volume":"29","author":"S Yu","year":"2015","unstructured":"Yu, S., Wang, G., Zhou, W.: Modeling malicious activities in cyber space. IEEE Network 29(6), 83\u201387 (2015)","journal-title":"IEEE Network"},{"key":"8_CR13","unstructured":"Neo4j (2020). neo4j.com\/"},{"issue":"4","key":"8_CR14","doi-asserted-by":"publisher","first-page":"2927","DOI":"10.1109\/COMST.2017.2728478","volume":"19","author":"B Feng","year":"2017","unstructured":"Feng, B., Zhang, H., Zhou, H., Yu, S.: Locator\/identifier split networking: a promising future internet architecture. IEEE Commun. Surv. Tutor. 19(4), 2927\u20132948 (2017)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"8_CR15","doi-asserted-by":"publisher","first-page":"21046","DOI":"10.1109\/ACCESS.2017.2734681","volume":"5","author":"G Xu","year":"2017","unstructured":"Xu, G., Cao, Y., Ren, Y., Li, X., Feng, Z.: Network security situation awareness based on semantic ontology and user-defined rules for internet of things. IEEE Access 5, 21046\u201321056 (2017)","journal-title":"IEEE Access"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Islam, C., Babar, M.A., Nepal, S.: An ontology-driven approach to automating the process of integrating security software systems. In: 2019 IEEE\/ACM International Conference on Software and System Processes (ICSSP), Montreal, QC, Canada, pp. 54\u201363 (2019)","DOI":"10.1109\/ICSSP.2019.00017"},{"key":"8_CR17","unstructured":"CICFlowMeter (2017). www.github.com\/ISCX\/"},{"key":"8_CR18","unstructured":"TensorFlow (2020). https:\/\/tensorflow.google.cn\/"}],"container-title":["Communications in Computer and Information Science","Security and Privacy in Digital Economy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-9129-7_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T02:25:25Z","timestamp":1619317525000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-15-9129-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811591280","9789811591297"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-9129-7_8","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"22 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPDE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Digital Economy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Quzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spde2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/spde2020.csp.escience.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"132","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}