{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:33:34Z","timestamp":1742927614966,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":24,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819932993"},{"type":"electronic","value":"9789819933006"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-3300-6_31","type":"book-chapter","created":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T15:04:01Z","timestamp":1685459041000},"page":"433-450","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on BIM Modeling Technology from the Perspective of Power Big Data Security"],"prefix":"10.1007","author":[{"given":"Yan","family":"Li","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,31]]},"reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"Mahamadu, A., Mahdjoubi, L., Booth, C.: Challenges to BIM-cloud integration: implication of security issues on secure collaboration. In: 2013 IEEE 5th International Conference on Cloud Computing Technology and Science, pp. 209\u2013214 (2013)","DOI":"10.1109\/CloudCom.2013.127"},{"key":"31_CR2","doi-asserted-by":"crossref","unstructured":"Smirnova, O.V., Smirnov, K.V.: Creating automation tools with BIM-programs for designing elements of metal bridges. In: 2017 International Conference \u201cQuality Management, Transport and Information Security, Information Technologies\u201d (IT&QM&IS), pp. 773\u2013775 (2017)","DOI":"10.1109\/ITMQIS.2017.8085940"},{"key":"31_CR3","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/MITP.2015.49","volume":"17","author":"H Boyes","year":"2015","unstructured":"Boyes, H.: Security, privacy, and the built environment. IT Prof. 17, 25\u201331 (2015)","journal-title":"IT Prof."},{"key":"31_CR4","doi-asserted-by":"crossref","unstructured":"Wenpeng, D., Maoxuan, Q., Xiaofeng, F., Yixuan, W.: Safety monitoring platform for deep excavation based on BIM and big data technology. In: 2020 International Conference on Robots & Intelligent System (ICRIS), pp. 537\u2013540 (2020)","DOI":"10.1109\/ICRIS52159.2020.00138"},{"key":"31_CR5","doi-asserted-by":"crossref","unstructured":"Luo, J., Liu, P., Liu, L., Liu, Z.: Research on intelligent management and control technology of power grid engineering based on BIM. In: 2021 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS), pp. 141\u2013144 (2021)","DOI":"10.1109\/ICITBS53129.2021.00044"},{"key":"31_CR6","doi-asserted-by":"crossref","unstructured":"Ge, S.: Exploring the application of BIM engineering in multi-project main body collaborative management platform. In: 2019 4th International Conference on Mechanical, Control and Computer Engineering (ICMCCE), pp. 730\u20137303 (2019)","DOI":"10.1109\/ICMCCE48743.2019.00169"},{"key":"31_CR7","doi-asserted-by":"crossref","unstructured":"Kokorus, M., Eyrich, W., Zacharias, R.: Innovative approach to the substation design using Building Information Modeling (BIM) technology. In: 2016 IEEE\/PES Transmission and Distribution Conference and Exposition (T&D), pp. 1\u20135 (2016)","DOI":"10.1109\/TDC.2016.7519983"},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"Nguyen, T., Hoang, V., Tran, T.: A wireless physical layer security method based on binary Exclusive-Or jamming message and CSI alignment. In: 2019 International Conference on System Science and Engineering (ICSSE), pp. 291\u2013296 (2019)","DOI":"10.1109\/ICSSE.2019.8823344"},{"key":"31_CR9","doi-asserted-by":"crossref","unstructured":"Jacomini, R.V., Fran\u00e7a, A.P., Bim, E.: Simulation and experimental studies on double-fed induction generator power control at subsynchronous operating speed. In: 2009 International Conference on Power Electronics and Drive Systems (PEDS), pp. 1421\u20131424 (2009)","DOI":"10.1109\/PEDS.2009.5385924"},{"key":"31_CR10","doi-asserted-by":"crossref","unstructured":"Peijun, Q., Tao, Y., Xiaofei, Z., Shaoen, J., Yanbo, C.: Emergency evacuation simulation based on BIM technology for scientific facility. In: 2020 International Signal Processing, Communications and Engineering Management Conference (ISPCEM), pp. 210\u2013213 (2020)","DOI":"10.1109\/ISPCEM52197.2020.00049"},{"key":"31_CR11","doi-asserted-by":"crossref","unstructured":"Kanak, A., Arif, \u0130., Kuma\u015f, O., Erg\u00fcn, S.: Extending BIM to urban semantic context for data-driven crisis preparedness. In: 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 3813\u20133818 (2020)","DOI":"10.1109\/SMC42975.2020.9283158"},{"key":"31_CR12","unstructured":"Boyes, H.A., Isbell, R., Norris, P., Watson, T.: Enabling intelligent cities through cyber security of building information and building systems. In: IET Conference on Future Intelligent Cities, pp. 1\u20136"},{"key":"31_CR13","doi-asserted-by":"crossref","unstructured":"Wall, A., Butzin, B., Golatowski, F., Rethfeldt, M., Timmermann, D.: Software-defined security architecture for smart buildings using the building information model. In: 2019 IEEE Global Conference on Internet of Things (GCIoT), pp. 1\u20135 (2019)","DOI":"10.1109\/GCIoT47977.2019.9058404"},{"key":"31_CR14","doi-asserted-by":"crossref","unstructured":"Wang, L., He, Y., Han, Y.: Research on power engineering construction management based on BIM technology. In: 2018 International Conference on Robots & Intelligent System (ICRIS), pp. 107\u2013109 (2018)","DOI":"10.1109\/ICRIS.2018.00035"},{"key":"31_CR15","doi-asserted-by":"crossref","unstructured":"Marchi, R., Dainez, P., Zuben, F.V., Bim, E.: A multilayer perceptron controller applied to the direct power control of a doubly fed induction generator. In: 2015 IEEE Power & Energy Society General Meeting, p. 1 (2015)","DOI":"10.1109\/PESGM.2015.7285786"},{"key":"31_CR16","doi-asserted-by":"crossref","unstructured":"Zhao, Q.: BIM design for reconstruction of old factory building based on sustainable perspective. In: 2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C), pp. 522\u2013526 (2020)","DOI":"10.1109\/QRS-C51114.2020.00092"},{"key":"31_CR17","doi-asserted-by":"crossref","unstructured":"Tan, T., Porter, S., Tan, T., West, G.: Computational Red Teaming for physical security assessment. In: The 4th Annual IEEE International Conference on Cyber Technology in Automation, Control and Intelligent, pp. 258\u2013263","DOI":"10.1109\/CYBER.2014.6917471"},{"key":"31_CR18","doi-asserted-by":"crossref","unstructured":"Wang, J.: Public building BIM safety early warning algorithm based on improved cyclic wavelet neural network. In: 2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), pp. 857\u2013860 (2021)","DOI":"10.1109\/I-SMAC52330.2021.9640986"},{"key":"31_CR19","doi-asserted-by":"crossref","unstructured":"Zaimen, K., Brahmia, M.E.-A., Dollinger, J.F., Moalic, L., Abouaissa, A., Idoumghar, L.: A overview on WSN deployment and a novel conceptual BIM-based approach in smart buildings. In: 2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), pp. 1\u20136 (2020)","DOI":"10.1109\/IOTSMS52051.2020.9340226"},{"key":"31_CR20","doi-asserted-by":"crossref","unstructured":"Kirstein, P.T., Ruiz-Zafra, A.: Use of templates and the handle for large-scale provision of security and IoT in the built environment. In: Living in the Internet of Things: Cybersecurity of the IoT - 2018, pp. 1\u201310 (2018)","DOI":"10.1049\/cp.2018.0029"},{"key":"31_CR21","doi-asserted-by":"crossref","unstructured":"Musgrove, J., Cukic, B., Cortellessa, V.: Proactive model-based performance analysis and security tradeoffs in a complex system. In: 2014 IEEE 15th International Symposium on High-Assurance Systems Engineering, pp. 211\u2013215 (2014)","DOI":"10.1109\/HASE.2014.37"},{"key":"31_CR22","doi-asserted-by":"crossref","unstructured":"Zhao, Q., Li, Y., Hei, X., Wang, X.: Toward automatic calculation of construction quantity based on building information modeling. In: 2015 11th International Conference on Computational Intelligence and Security (CIS), pp. 482\u2013485 (2015)","DOI":"10.1109\/CIS.2015.122"},{"key":"31_CR23","doi-asserted-by":"crossref","unstructured":"Zhao, Q., Tian, Q., Hei, X., Li, Y., Ma, Z.: Toward automatic review of bridge template turnover based on building information modeling. In: 2017 13th International Conference on Computational Intelligence and Security (CIS), pp. 376\u2013380 (2017)","DOI":"10.1109\/CIS.2017.00088"},{"key":"31_CR24","doi-asserted-by":"crossref","unstructured":"Lingling, Y., Haiyan, S., Yalong, X., Yulong, L., Zhihua, W., Qingbo, C.: Research and application of key technologies of BIM+GIS virtual-reality interaction for high-speed railway integration test. In: 2021 IEEE 5th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), pp. 204\u2013209 (2021)","DOI":"10.1109\/ITNEC52019.2021.9587182"}],"container-title":["Communications in Computer and Information Science","Big Data and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-3300-6_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T13:48:00Z","timestamp":1729518480000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-3300-6_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819932993","9789819933006"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-3300-6_31","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"31 May 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICBDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Big Data and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xiamen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icbds2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icbds.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}