{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:29:33Z","timestamp":1742912973626,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":11,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811597381"},{"type":"electronic","value":"9789811597398"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-9739-8_22","type":"book-chapter","created":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T12:05:09Z","timestamp":1604577909000},"page":"283-293","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Fuzzy Petri Nets Based Information System Security Situation Assessment Model"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6955-2503","authenticated-orcid":false,"given":"Hongyu","family":"Yang","sequence":"first","affiliation":[]},{"given":"Yuhao","family":"Feng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8701-3944","authenticated-orcid":false,"given":"Guangquan","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Jiyong","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,4]]},"reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Yang, H.: Wireless network intrusion detection based on improved convolutional neural network. IEEE Access 7, 64366\u201364374 (2019)","DOI":"10.1109\/ACCESS.2019.2917299"},{"key":"22_CR2","unstructured":"Zhao, G.: Information security risk assessment base on G-ANP. J. Tsinghua Univ. (Sci. Technol.) 53(12), 1761\u20131767 (2013)"},{"key":"22_CR3","unstructured":"Fu, Y.: An approach for information systems security risk assessment on fuzzy set and entropy-weight. Acta Electronica Sinica 38(07), 1489\u20131494 (2010)"},{"key":"22_CR4","unstructured":"Pan, L.: Dynamic information security evaluation model in mobile Ad Hoc network. Comput. Appl. 7(3), 245\u2013256 (2015)"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Li, H.: A new quantitative method for studying the vulnerability of civil aviation network system to spatially localized hazards. Int. J. Disaster Risk Sci. 7(3), 245\u2013256 (2016)","DOI":"10.1007\/s13753-016-0098-1"},{"key":"22_CR6","unstructured":"Wang, D.: Mixed-index information system security evaluation. J. Tsinghua Univ. (Sci. Technol.) 56(05), 517\u2212521+529 (2016)"},{"key":"22_CR7","unstructured":"Liu, F.: Dynamic adaptive fuzzy petri nets for knowledge representation and inference. IEEE Trans. Syst. Man Cybern. Syst. 43(6), 1399\u20131410 (2013)"},{"key":"22_CR8","unstructured":"Li, M.: Study on fuzzy evaluation of the quality of MOOC teaching based on AHP. In: 13th International Conference on Computer Science & Education (ICCSE), Colombo, pp. 1\u20134. IEEE (2018)"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Zakharov, S.: The analysis and monitoring of ecological risks on the basis of fuzzy Petri nets. In: 3rd Russian-Pacific Conference on Computer Technology and Applications (RPC), Vladivostok, pp. 1\u20135. IEEE (2018)","DOI":"10.1109\/RPC.2018.8482155"},{"key":"22_CR10","unstructured":"Liu, H.: Knowledge acquisition and representation using fuzzy evidential inference and dynamic adaptive fuzzy Petri nets. IEEE Trans. Cybern. 43(3), 1059\u20131072 (2013)"},{"key":"22_CR11","unstructured":"Liu, S.: Two stages decision model with grey synthetic measure and a betterment of triangular whitenization weight function. Control Decis. 29(07), 1232\u20131238 (2014)"}],"container-title":["Communications in Computer and Information Science","Frontiers in Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-9739-8_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T12:12:57Z","timestamp":1604578377000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-9739-8_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811597381","9789811597398"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-9739-8_22","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"4 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Frontiers in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tianjin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fcs2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icfcs.com.cn\/fcs2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}