{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T00:36:28Z","timestamp":1767314188455,"version":"3.48.0"},"publisher-location":"Singapore","reference-count":34,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819535507","type":"print"},{"value":"9789819535514","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3551-4_26","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T00:33:15Z","timestamp":1767313995000},"page":"377-390","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Security Assessment in\u00a0Optical Networks: A Path Graph-Based Framework for\u00a0Attack-Induced Fault Diagnosis"],"prefix":"10.1007","author":[{"given":"Gang","family":"Qu","sequence":"first","affiliation":[]},{"given":"Liang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hongjia","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"26_CR1","unstructured":"Agrawal, G.P.: Fiber-Optic Communication Systems, 4th edn. Wiley (2012)"},{"issue":"4","key":"26_CR2","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/s10664-024-10452-w","volume":"29","author":"MA Batoun","year":"2024","unstructured":"Batoun, M.A., Sayagh, M., Aghili, R., Ouni, A., Li, H.: A literature review and existing challenges on software logging practices: from the creation to the analysis of software logs. Empir. Softw. Eng. 29(4), 103 (2024)","journal-title":"Empir. Softw. Eng."},{"key":"26_CR3","unstructured":"Chung, J., Gulcehre, C., Cho, K., Bengio, Y.: Empirical evaluation of gated recurrent neural networks on sequence modeling. In: NIPS 2014 Workshop on Deep Learning (2014)"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Cruzes, S.: Failure management overview in optical networks. IEEE Access (2024)","DOI":"10.36227\/techrxiv.172254285.54096392\/v1"},{"issue":"5","key":"26_CR5","doi-asserted-by":"publisher","first-page":"1035","DOI":"10.1109\/JPROC.2012.2182970","volume":"100","author":"RJ Essiambre","year":"2012","unstructured":"Essiambre, R.J., Tkach, R.W.: Capacity trends and limits of optical communication networks. Proc. IEEE 100(5), 1035\u20131055 (2012)","journal-title":"Proc. IEEE"},{"issue":"8","key":"26_CR6","first-page":"102","volume":"55","author":"M Furdek","year":"2017","unstructured":"Furdek, M., Zsigmond, S., Wosinska, L., Chen, J.: Physical-layer security in evolving optical networks. IEEE Commun. Mag. 55(8), 102\u2013109 (2017)","journal-title":"IEEE Commun. Mag."},{"key":"26_CR7","doi-asserted-by":"publisher","unstructured":"Ghosh, S., Adhya, A.: Optical network soft failure dataset (2025). https:\/\/doi.org\/10.17632\/y3pspy7j83.1","DOI":"10.17632\/y3pspy7j83.1"},{"key":"26_CR8","unstructured":"Hamilton, W.L., Ying, R., Leskovec, J.: Inductive representation learning on large graphs, pp. 1024\u20131034 (2017)"},{"key":"26_CR9","unstructured":"Hamilton, W.L., Ying, Z., Leskovec, J.: Inductive representation learning on large graphs. In: Guyon, I., et al. (eds.) Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, 4\u20139 December 2017, Long Beach, CA, USA, pp. 1024\u20131034 (2017). https:\/\/proceedings.neurips.cc\/paper\/2017\/hash\/5dd9db5e033da9c6fb5ba83c7a7ebea9-Abstract.html"},{"key":"26_CR10","doi-asserted-by":"publisher","unstructured":"He, S., Zhu, J., He, P.H., Du, M.: Experience report: system log analysis for anomaly detection. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 115\u2013124 (2016). https:\/\/doi.org\/10.1145\/2939672.2939699","DOI":"10.1145\/2939672.2939699"},{"issue":"8","key":"26_CR11","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Kartalopoulos, S.V.: Optical network security: countermeasures in view of attacks, vol. 6402, pp. 49\u201355 (2006)","DOI":"10.1117\/12.689169"},{"issue":"12","key":"26_CR13","doi-asserted-by":"publisher","first-page":"12012","DOI":"10.1109\/TKDE.2021.3118815","volume":"35","author":"X Ma","year":"2021","unstructured":"Ma, X., et al.: A comprehensive survey on graph anomaly detection with deep learning. IEEE Trans. Knowl. Data Eng. 35(12), 12012\u201312038 (2021)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"3","key":"26_CR14","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/65.587049","volume":"11","author":"M Medard","year":"1997","unstructured":"Medard, M., Marquis, D., Barry, R.A., Finn, S.G.: Security issues in all-optical networks. IEEE Network 11(3), 42\u201348 (1997)","journal-title":"IEEE Network"},{"issue":"3","key":"26_CR15","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/s11082-021-03442-5","volume":"54","author":"SAH Mohsan","year":"2022","unstructured":"Mohsan, S.A.H., Mazinani, A., Sadiq, H.B., Amjad, H.: A survey of optical wireless technologies: practical considerations, impairments, security issues and future research directions. Opt. Quant. Electron. 54(3), 187 (2022)","journal-title":"Opt. Quant. Electron."},{"key":"26_CR16","unstructured":"Mukherjee, B.: Optical WDM Networks. Springer (2006)"},{"issue":"12","key":"26_CR17","doi-asserted-by":"publisher","first-page":"4684","DOI":"10.1109\/JLT.2006.885765","volume":"24","author":"MJ O\u2019Mahony","year":"2006","unstructured":"O\u2019Mahony, M.J., Politi, C., Klonidis, D., Nejabati, R., Simeonidou, D.: Future optical networks. J. Lightwave Technol. 24(12), 4684\u20134696 (2006)","journal-title":"J. Lightwave Technol."},{"key":"26_CR18","unstructured":"Saleh, B.E.A., Teich, M.C.: Fundamentals of Photonics, 2nd edn. Wiley (2007)"},{"key":"26_CR19","doi-asserted-by":"publisher","first-page":"222310","DOI":"10.1109\/ACCESS.2020.3041951","volume":"8","author":"K Shaukat","year":"2020","unstructured":"Shaukat, K., Luo, S., Varadharajan, V., Hameed, I.A., Xu, M.: A survey on machine learning techniques for cyber security in the last decade. IEEE Access 8, 222310\u2013222354 (2020)","journal-title":"IEEE Access"},{"issue":"8","key":"26_CR20","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1109\/MCOM.2016.7537185","volume":"54","author":"N Skorin-Kapov","year":"2016","unstructured":"Skorin-Kapov, N., Furdek, M., Zsigmond, S., Wosinska, L.: Physical-layer security in evolving optical networks. IEEE Commun. Mag. 54(8), 110\u2013117 (2016)","journal-title":"IEEE Commun. Mag."},{"key":"26_CR21","doi-asserted-by":"crossref","unstructured":"Talati, N., et al.: A deep dive into understanding the random walk-based temporal graph learning, pp. 87\u2013100 (2021)","DOI":"10.1109\/IISWC53511.2021.00019"},{"key":"26_CR22","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Advances in Neural Information Processing Systems 30 (NIPS 2017), pp. 5998\u20136008 (2017)"},{"key":"26_CR23","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Advances in Neural Information Processing Systems, vol.\u00a030 (2017)"},{"key":"26_CR24","unstructured":"Veli\u010dkovi\u0107, P., Cucurull, G., Casanova, A., Romero, A., Lio, P., Bengio, Y.: Graph attention networks. arXiv preprint arXiv:1710.10903 (2017)"},{"key":"26_CR25","unstructured":"Welling, M., Kipf, T.N.: Semi-supervised classification with graph convolutional networks. In: ICLR (2017)"},{"key":"26_CR26","unstructured":"Wen, Q., et al.: Transformers in time series: a survey. arXiv preprint arXiv:2202.07125 (2022)"},{"issue":"6","key":"26_CR27","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/s10664-023-10364-1","volume":"28","author":"X Wu","year":"2023","unstructured":"Wu, X., Li, H., Khomh, F.: On the effectiveness of log representation for log-based anomaly detection. Empir. Softw. Eng. 28(6), 137 (2023)","journal-title":"Empir. Softw. Eng."},{"issue":"1","key":"26_CR28","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TNNLS.2020.2978386","volume":"32","author":"Z Wu","year":"2021","unstructured":"Wu, Z., Pan, S., Chen, F., Long, G., Zhang, C., Yu, P.S.: A comprehensive survey on graph neural networks. IEEE Trans. Neural Netw. Learn. Syst. 32(1), 4\u201324 (2021). https:\/\/doi.org\/10.1109\/TNNLS.2020.2978386","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"issue":"10","key":"26_CR29","doi-asserted-by":"publisher","first-page":"1838","DOI":"10.1109\/49.887906","volume":"18","author":"Y Xiong","year":"2000","unstructured":"Xiong, Y., Vandenhoute, M., Cankaya, H.C.: Control architecture in optical burst-switched WDM networks. IEEE J. Sel. Areas Commun. 18(10), 1838\u20131851 (2000)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"26_CR30","doi-asserted-by":"crossref","unstructured":"Yadav, R.B., Kumar, P.S., Dhavale, S.V.: A survey on log anomaly detection using deep learning, pp. 1215\u20131220 (2020)","DOI":"10.1109\/ICRITO48877.2020.9197818"},{"issue":"2","key":"26_CR31","first-page":"479","volume":"68","author":"X Zhang","year":"2019","unstructured":"Zhang, X., Zheng, Z., Lyu, M.R.: Challenges in log-based anomaly detection. IEEE Trans. Reliab. 68(2), 479\u2013496 (2019)","journal-title":"IEEE Trans. Reliab."},{"key":"26_CR32","doi-asserted-by":"crossref","unstructured":"Zhong, M., Lin, M., Zhang, C., Xu, Z.: A survey on graph neural networks for intrusion detection systems: methods, trends and challenges. Comput. Secur. 103821 (2024)","DOI":"10.1016\/j.cose.2024.103821"},{"key":"26_CR33","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.aiopen.2021.01.001","volume":"1","author":"J Zhou","year":"2020","unstructured":"Zhou, J., Cui, G., Zhang, Z., Yang, C., Liu, Z., Sun, M.: Graph neural networks: a review of methods and applications. AI Open 1, 57\u201381 (2020)","journal-title":"AI Open"},{"issue":"9","key":"26_CR34","doi-asserted-by":"publisher","first-page":"1727","DOI":"10.1109\/JPROC.2016.2558521","volume":"104","author":"Y Zou","year":"2016","unstructured":"Zou, Y., Zhu, J., Wang, X., Hanzo, L.: A survey on wireless security: technical challenges, recent advances, and future trends. Proc. IEEE 104(9), 1727\u20131765 (2016)","journal-title":"Proc. IEEE"}],"container-title":["Lecture Notes in Computer Science","Cyberspace Safety and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3551-4_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T00:33:18Z","timestamp":1767313998000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3551-4_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819535507","9789819535514"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3551-4_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Cyberspace Safety and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"css2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/nsclab.org\/css2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}