{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T01:16:41Z","timestamp":1648862201930},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"S3","license":[{"start":{"date-parts":[[2017,11,26]],"date-time":"2017-11-26T00:00:00Z","timestamp":1511654400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Key Science and Technology Project of Jilin Province","award":["20160204019GX"],"award-info":[{"award-number":["20160204019GX"]}]},{"name":"National High-tech R&D (863) Program of China","award":["2015AA015701"],"award-info":[{"award-number":["2015AA015701"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1007\/s10586-017-1371-9","type":"journal-article","created":{"date-parts":[[2017,11,26]],"date-time":"2017-11-26T00:38:17Z","timestamp":1511656697000},"page":"5573-5585","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Research on classification and recognition of attacking factors based on radial basis function neural network"],"prefix":"10.1007","volume":"22","author":[{"given":"Huan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Jian","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Xiaoqiang","family":"Di","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jianping","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Sui","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,26]]},"reference":[{"key":"1371_CR1","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1016\/j.neunet.2007.09.017","volume":"20","author":"SA Billings","year":"2007","unstructured":"Billings, S.A., Wei, H.L., Balikhin, M.A.: Generalized multi scale radial basis function networks. Neural Netw. 20, 1081\u20131094 (2007)","journal-title":"Neural Netw."},{"issue":"1","key":"1371_CR2","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1023\/A:1008324625522","volume":"16","author":"PS Bradley","year":"2000","unstructured":"Bradley, P.S.: Mangasarian, L.K-plane clustering. J. Glob. Optim. 16(1), 23\u201337 (2000)","journal-title":"J. Glob. Optim."},{"issue":"3","key":"1371_CR3","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1109\/TSMCB.2008.2004818","volume":"39","author":"L Zhu","year":"2009","unstructured":"Zhu, L., Chung, F.L., Wang, S.: Generalized fuzzy c-means clustering algorithm with improved fuzzy partitions[J]. IEEE Trans. Syst. Man Cybernet.-Part B 39(3), 578\u2013591 (2009)","journal-title":"IEEE Trans. Syst. Man Cybernet.-Part B"},{"issue":"8","key":"1371_CR4","doi-asserted-by":"publisher","first-page":"1425","DOI":"10.1360\/crad20060817","volume":"43","author":"Y Xiu","year":"2006","unstructured":"Xiu, Y., Wang, S., Wu, X., et al.: The directional similarity-based clustering method DSCM[J]. J. Comput. Res. Dev. 43(8), 1425\u20131431 (2006)","journal-title":"J. Comput. Res. Dev."},{"key":"1371_CR5","first-page":"1431","volume":"303","author":"L Jinna","year":"2013","unstructured":"Jinna, L., Bai, Y.P.: Research and simulation on RBFNN optimized by particle swarm algorithm. Appl. Mech. Mater. 303, 1431\u20131434 (2013)","journal-title":"Appl. Mech. Mater."},{"key":"1371_CR6","doi-asserted-by":"publisher","first-page":"4078","DOI":"10.1016\/j.jcp.2012.01.028","volume":"231","author":"N Flyer","year":"2012","unstructured":"Flyer, N., Lehto, E., Blaise, S., Wright, G.B., St-Cyr, A.: A guide to RBF-generated finite differences for nonlinear transport: shallow water simulations on a sphere. Lam. J. Comput. Phys. 231, 4078\u20134095 (2012)","journal-title":"Lam. J. Comput. Phys."},{"issue":"5","key":"1371_CR7","first-page":"817-","volume":"48","author":"D Sun","year":"2010","unstructured":"Sun, D., Wan, L.M., Sun, Y.F., Liang, Y.C.: An improved hybrid learning algorithm for RBF neural network. J. Jilin Univ. (Sci. Ed.) 48(5), 817-\u2013822 (2010)","journal-title":"J. Jilin Univ. (Sci. Ed.)"},{"key":"1371_CR8","doi-asserted-by":"publisher","first-page":"18711","DOI":"10.3390\/s141018711","volume":"14","author":"JC Ding","year":"2014","unstructured":"Ding, J.C., Zhang, J., Huang, W.Q., Chen, S.: Laser gyro temperature compensation using modified RBFNN. Sensors 14, 18711\u201318727 (2014)","journal-title":"Sensors"},{"key":"1371_CR9","doi-asserted-by":"crossref","unstructured":"Yan, G.H., Lee, R., Kent A., et al.: Towards a Bayesian network game framework for evaluating DDoS attacks and defense. In: CCS\u201912 Proceedings of the 2012 ACM Conference on Computer and Communications Security. USA:ACM, pp. 553\u2013566 (2012)","DOI":"10.1145\/2382196.2382255"},{"issue":"1","key":"1371_CR10","doi-asserted-by":"publisher","first-page":"1499","DOI":"10.2174\/1874444301507011499","volume":"7","author":"GY Hu","year":"2015","unstructured":"Hu, G.Y., Qiao, P.L.: An efficient improvement of CMA-ES algorithm for the network security situation prediction. Open Autom. Control Syst. J. 7(1), 1499\u20131517 (2015)","journal-title":"Open Autom. Control Syst. J."},{"issue":"1","key":"1371_CR11","first-page":"63","volume":"6","author":"A Aleroud","year":"2014","unstructured":"Aleroud, A., Karabatis, G., Sharma, P., He, P.: Context and semantics for detection of cyber attacks. J. Inf. Comput. Sec. 6(1), 63\u201392 (2014)","journal-title":"J. Inf. Comput. Sec."},{"issue":"5","key":"1371_CR12","doi-asserted-by":"publisher","first-page":"1289","DOI":"10.1016\/j.comnet.2012.10.022","volume":"57","author":"S Salah","year":"2013","unstructured":"Salah, S., Maci\u00e1-Fern\u00e1ndez, G., D\u00edaz-Verdejo, J.E.A.: A model-based survey of alert correlation techniques. Comput. Netw. 57(5), 1289\u20131317 (2013)","journal-title":"Comput. Netw."},{"key":"1371_CR13","first-page":"160","volume":"15","author":"M Bateni","year":"2013","unstructured":"Bateni, M., Baraani, A., Ghorbani, A.A.: Using artificial immune system and fuzzy logic for alert correlation. J. Netw. Sec. 15, 160\u2013174 (2013)","journal-title":"J. Netw. Sec."},{"issue":"1","key":"1371_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.17706\/IJCCE.2016.5.1.1-10","volume":"5","author":"CH Wang","year":"2016","unstructured":"Wang, C.H., Chiou, Y.C.: Alert correlation system with automatic extraction of attack strategies by using dynamic feature weights. J. Comput. Commun. Eng. 5(1), 1\u201310 (2016)","journal-title":"J. Comput. Commun. Eng."},{"key":"1371_CR15","first-page":"81","volume":"4","author":"LY Han","year":"2013","unstructured":"Han, L.Y., Gao, B., Yang, L.: Study of temperature compensation for laser gyro SINS of land-based missile. Tactical Missile Technol. 4, 81\u201385 (2013)","journal-title":"Tactical Missile Technol."},{"key":"1371_CR16","first-page":"119","volume":"42","author":"J Shen","year":"2013","unstructured":"Shen, J., Miao, L.J., Wu, J.W.: Application and compensation for startup phase of FOG based on RBF neural network. Infrared Laser Eng. 42, 119\u2013124 (2013)","journal-title":"Infrared Laser Eng."},{"issue":"1","key":"1371_CR17","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1177\/1555343415573911","volume":"9","author":"MR Endsley","year":"2015","unstructured":"Endsley, M.R.: Final reflections: Situation awareness models and measure. J. Cognit. Eng. Decis. Mak. 9(1), 101\u2013111 (2015)","journal-title":"J. Cognit. Eng. Decis. Mak."},{"issue":"2","key":"1371_CR18","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/MSP.2015.30","volume":"13","author":"V Lenders","year":"2015","unstructured":"Lenders, V., Tanner, A., Blarer, A.: Gaining an edge in cyberspace with advanced situational awareness. Sec. Privacy IEEE 13(2), 65\u201374 (2015)","journal-title":"Sec. Privacy IEEE"},{"key":"1371_CR19","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1016\/j.patrec.2007.10.019","volume":"4","author":"MQ Li","year":"2008","unstructured":"Li, M.Q., Tian, J., Chen, F.Z.: Improving multiclass pattern recognition with a co-evolutionary RBFNN. Pattern Recognit. Lett. 4, 392\u2013406 (2008)","journal-title":"Pattern Recognit. Lett."},{"issue":"1","key":"1371_CR20","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1177\/1555343415572631","volume":"9","author":"M Endsley","year":"2015","unstructured":"Endsley, M.: Situation awareness misconceptions and misunderstandings. J. Cognit. Eng. Decis. Mak. 9(1), 4\u201332 (2015)","journal-title":"J. Cognit. Eng. Decis. Mak."},{"issue":"4","key":"1371_CR21","first-page":"715","volume":"7","author":"A Sedaghatbaf","year":"2014","unstructured":"Sedaghatbaf, A., Azgomi, M.A.: Attack modeling and security evaluation based on stochastic activity networks. Sec. Commun. Netw. 7(4), 715\u2013737 (2014)","journal-title":"Sec. Commun. Netw."},{"key":"1371_CR22","first-page":"301","volume":"9","author":"Y Wang","year":"2016","unstructured":"Wang, Y.: Research on network security situation prediction based on Markov game theory. Int. J. Sec. Its Appl. 9, 301\u2013308 (2016)","journal-title":"Int. J. Sec. Its Appl."},{"key":"1371_CR23","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1109\/59.962441","volume":"4","author":"AS Chuang","year":"2001","unstructured":"Chuang, A.S., Wu, F., Varaiya, P.: A game-theoretic model for generation expansion planning: problem formulation and numerical comparisons. IEEE Trans. Power Syst. 4, 885\u2013891 (2001)","journal-title":"IEEE Trans. Power Syst."},{"issue":"1","key":"1371_CR24","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/s10207-011-0148-z","volume":"11","author":"YZ Wang","year":"2012","unstructured":"Wang, Y.Z., Yu, M., Li, J.Y., et al.: Stochastic game net and applications in security analysis for enterprise network. Int. J. Inf. Sec. 11(1), 41\u201352 (2012)","journal-title":"Int. J. Inf. Sec."},{"issue":"5","key":"1371_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/LCOMM.2016.2524404","volume":"20","author":"GY Hu","year":"2016","unstructured":"Hu, G.Y., Qiao, P.L.: Cloud belief rule base model for network security situation prediction. IEEE Commun. Lett. 20(5), 1\u20131 (2016)","journal-title":"IEEE Commun. Lett."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-1371-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-017-1371-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-1371-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,4]],"date-time":"2019-11-04T12:26:03Z","timestamp":1572870363000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-017-1371-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,26]]},"references-count":25,"journal-issue":{"issue":"S3","published-print":{"date-parts":[[2019,5]]}},"alternative-id":["1371"],"URL":"https:\/\/doi.org\/10.1007\/s10586-017-1371-9","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,11,26]]},"assertion":[{"value":"29 September 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 November 2017","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 November 2017","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 November 2017","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}