{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T19:30:13Z","timestamp":1772134213251,"version":"3.50.1"},"reference-count":12,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Commun. Inf. Netw."],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1007\/bf03391573","type":"journal-article","created":{"date-parts":[[2017,4,28]],"date-time":"2017-04-28T08:21:48Z","timestamp":1493367708000},"page":"90-96","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Intrusion-detection model integrating anomaly with misuse for space information network"],"prefix":"10.23919","volume":"1","author":[{"given":"Chundong","family":"She","sequence":"first","affiliation":[]},{"given":"Yaqi","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Luting","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Ligang","family":"Fei","sequence":"additional","affiliation":[]},{"given":"Baohua","family":"Kou","sequence":"additional","affiliation":[]}],"member":"263","published-online":{"date-parts":[[2017,4,27]]},"reference":[{"key":"BF03391573_CR1","first-page":"315","volume-title":"Satellite over satellite (SOS) network: a novel architecture for satellite network[C]","author":"J Lee","year":"2000","unstructured":"LEE J, SUN K. Satellite over satellite (SOS) network: a novel architecture for satellite network[C]\/\/The 19th Annual Joint Conference of the IEEE Computer & Communications Societies IEEE, Tel Aviv, Israel, 2000: 315\u2013321."},{"key":"BF03391573_CR2","doi-asserted-by":"publisher","first-page":"6657","DOI":"10.1016\/S1876-6102(14)00454-8","volume":"13","author":"H Li","year":"2011","unstructured":"LI H, LI X, WANG K, et al. Research on modeling methods of security protocol for space information network[J]. Energy procedia, 2011, 13: 6657\u20136661.","journal-title":"Energy procedia"},{"key":"BF03391573_CR3","volume-title":"Research on a new program of satellite network security certification[J]","author":"J Gao","year":"2011","unstructured":"GAO J, ZHU C G. Research on a new program of satellite network security certification[J]. Modem electronics technique, 2011."},{"key":"BF03391573_CR4","volume-title":"Method and apparatus for predictive and actual intrusion detection on a network: US, US 8640234 B2[P]","author":"D Gassen","year":"2014","unstructured":"GASSEN D, DONAHUE T P. Method and apparatus for predictive and actual intrusion detection on a network: US, US 8640234 B2[P]. 2014."},{"issue":"4","key":"BF03391573_CR5","volume":"46","year":"2014","unstructured":"MITCHELL R, CHEN I R. A survey of intrusion detection techniques for cyber-physical systems[J]. ACM computing surveys, 2014, 46(4): Article 55.","journal-title":"ACM computing surveys"},{"issue":"7","key":"BF03391573_CR6","first-page":"185","volume":"3858","author":"J T Giffin","year":"2005","unstructured":"GIFFIN J T, DAGON D, JHA S, et al. Environment-sensitive intrusion detection[C]\/\/International Conference on Recent Advances in Intrusion Detection. Springer-Verlag, 2005, 3858(7): 185\u2013206.","journal-title":"International Conference on Recent Advances in Intrusion Detection"},{"issue":"3","key":"BF03391573_CR7","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"CHANDOLA V, BANERJEE A, KUMAR V. Anomaly detection: a survey[J]. Acm computing surveys, 2009, 41(3): 75\u201379.","journal-title":"Acm computing surveys"},{"key":"BF03391573_CR8","volume-title":"Anomaly detection:, US20160103838[P]","author":"M Sainani","year":"2016","unstructured":"SAINANI M, OLINER A J, LEVERICH J B, et al. Anomaly detection:, US20160103838[P]. 2016."},{"key":"BF03391573_CR9","volume-title":"Method and system for misuse detection: US, US20090282479[P]","author":"S Smith","year":"2009","unstructured":"SMITH S, SERBAN V, WALKER A, et al. Method and system for misuse detection: US, US20090282479[P]. 2009."},{"issue":"1","key":"BF03391573_CR10","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/38.974517","volume":"22","author":"R F Erbacher","year":"2002","unstructured":"ERBACHER R F, WALKER K L, FRINCKE D A. Intrusion and misuse detection in large-scale systems[J]. IEEE computer graphics & applications, 2002, 22(1): 38\u201347.","journal-title":"IEEE computer graphics & applications"},{"key":"BF03391573_CR11","first-page":"3","volume-title":"Statistical process control for computer intrusion detection[C]","author":"N Ye","year":"2001","unstructured":"YE N, EMRAN S M, LI X Y, et al. Statistical process control for computer intrusion detection[C]\/\/DARPA Information Survivability Conference & Exposition II, Anaheim, USA, 2001, 1(1): 3\u201314."},{"issue":"11","key":"BF03391573_CR12","first-page":"2162","volume":"28","author":"J F Tian","year":"2006","unstructured":"TIAN J F, ZHANG Z, ZHAO W D. The design and research of intrusion detection system based on misuse and anomaly[J]. Journal of electronics & information technology, 2006, 28(11): 2162\u20132166.","journal-title":"Journal of electronics & information technology"}],"container-title":["Journal of Communications and Information Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03391573.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,24]],"date-time":"2022-06-24T12:12:23Z","timestamp":1656072743000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF03391573"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":12,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,10]]}},"alternative-id":["BF03391573"],"URL":"https:\/\/doi.org\/10.1007\/bf03391573","relation":{},"ISSN":["2096-1081","2509-3312"],"issn-type":[{"value":"2096-1081","type":"print"},{"value":"2509-3312","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,10]]}}}