{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T15:01:32Z","timestamp":1768402892755,"version":"3.49.0"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,1,5]],"date-time":"2021-01-05T00:00:00Z","timestamp":1609804800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,5]],"date-time":"2021-01-05T00:00:00Z","timestamp":1609804800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s11036-020-01666-5","type":"journal-article","created":{"date-parts":[[2021,1,5]],"date-time":"2021-01-05T20:13:22Z","timestamp":1609877602000},"page":"1008-1023","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Network Security Situation Prediction of Improved Lanchester Equation Based on Time Action Factor"],"prefix":"10.1007","volume":"26","author":[{"given":"Huiqian","family":"Song","sequence":"first","affiliation":[]},{"given":"Dongmei","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Chunyang","family":"Yuan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,5]]},"reference":[{"key":"1666_CR1","first-page":"789","volume":"3","author":"MR Endsley","year":"1988","unstructured":"Endsley MR (1988) Situation awareness global assessment technique[C]. Aerospace Electron Conf 3:789\u2013795","journal-title":"Aerospace Electron Conf"},{"issue":"1","key":"1666_CR2","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1518\/001872095779049543","volume":"37","author":"MR Endsley","year":"1995","unstructured":"Endsley MR (1995) Toward a theory of situation awareness in dynamic systems[J]. Human actors: J Human Factors Ergonomics Soc 37(1):32\u201364","journal-title":"Human actors: J Human Factors Ergonomics Soc"},{"key":"1666_CR3","unstructured":"Bass T (1999) Multisensor data fusion for next generation distributed intrusion detection systems [J]. Proc Iris Natl Sympos Sens Data Fusion: 24\u201327"},{"key":"1666_CR4","unstructured":"Salerno J, Hinman M, Boulware D (2004) Building a framework for situation awareness. http:\/\/www.fusion 2004.foi.se\/papers\/if04\u20130219.pdf"},{"issue":"6","key":"1666_CR5","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1145\/990680.990699","volume":"47","author":"S Lau","year":"2004","unstructured":"Lau S (2004) The spinning cube of potential doom.[J]. Commun ACM 47(6):25\u201326","journal-title":"Commun ACM"},{"key":"1666_CR6","doi-asserted-by":"crossref","unstructured":"Yegneswaran V, Barford P, Paxson V (2008) Using Honeynets for Internet Situational Awareness. http:\/\/www.icir.org\/vern\/papers\/sit-aware-hotnet05.pdf","DOI":"10.1007\/978-1-4419-0140-8_5"},{"key":"1666_CR7","first-page":"145","volume":"2006","author":"A \u00c5rnes","year":"2006","unstructured":"\u00c5rnes A, Valeur F, Vigna G et al (2006) Using hidden Markov models to evaluate the risks of intrusions[C]. Hamburg, Germany :Recent Advances in Intrusion Detection, International Symposium. RAID 2006:145\u2013164","journal-title":"RAID"},{"key":"1666_CR8","doi-asserted-by":"crossref","unstructured":"Xie B, Zhao G, Chao M, Wang J (2020) A prediction model of cloud security situation based on evolutionary functional network[J]. Peer-to-Peer Networking and Applications, (prepublish)","DOI":"10.1007\/s12083-020-00875-9"},{"key":"1666_CR9","doi-asserted-by":"crossref","unstructured":"Yang W, Zhang J, Wang C, Mo X (2019) Situation prediction of large-scale Internet of Things network security[J]. EURASIP J Inf Secur, 2019(1)","DOI":"10.1186\/s13635-019-0097-z"},{"issue":"1","key":"1666_CR10","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.ejor.2017.07.026","volume":"264","author":"J Caulkins","year":"2018","unstructured":"Caulkins J, Feichtinger G et al (2018) Lanchester model for three-way combat[J]. Eur J Operation Res 264(1):46\u201354","journal-title":"Eur J Operation Res"},{"key":"1666_CR11","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/s00521-018-3729-1","volume":"31","author":"CT Kalaivani","year":"2019","unstructured":"Kalaivani CT, Kalaiarasi N (2019) Earliest deadline first scheduling technique for different networks in network control system[J]. Neural Comput & Applic 31:223\u2013232","journal-title":"Neural Comput & Applic"},{"issue":"6\u20137","key":"1666_CR12","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1016\/j.orl.2014.08.008","volume":"42","author":"KY Lin","year":"2014","unstructured":"Lin KY, NJ MK (2014) The optimal policy for the one-against-many heterogeneous Lanchester model[J]. Operations Res Lett 42(6\u20137):473\u2013477","journal-title":"Operations Res Lett"},{"key":"1666_CR13","doi-asserted-by":"publisher","first-page":"4347","DOI":"10.1007\/s00521-018-3819-0","volume":"32","author":"H Rathore","year":"2020","unstructured":"Rathore H, Fu C, Mohamed A et al (2020) Multi-layer security scheme for implantable medical devices[j]. Neural Comput & Applic 32:4347\u20134360","journal-title":"Neural Comput & Applic"},{"key":"1666_CR14","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.evolhumbehav.2014.11.001","volume":"36","author":"DDP Johnson","year":"2015","unstructured":"Johnson DDP, MacKay NJ (2015) Fight the power: Lanchester's laws of combat in human evolution[J]. Evol Human Behav 36:152\u2013163","journal-title":"Evol Human Behav"},{"key":"1666_CR15","unstructured":"Yuan X, Hu H 2019 The Lanchester Mathematical Model Analysis of the Battle of Sarhu[J]. Acad J Comput Inform Sci 2(2)"},{"key":"1666_CR16","doi-asserted-by":"crossref","unstructured":"Luckring JM (2019) The discovery and prediction of vortex flow aerodynamics[J]. Aeronautical J 123(1264)","DOI":"10.1017\/aer.2019.43"},{"key":"1666_CR17","doi-asserted-by":"crossref","unstructured":"Coulson SG (2019) Lanchester modelling of intelligence in combat[J]. IMA J Manag Math 30(2)","DOI":"10.1093\/imaman\/dpx014"},{"key":"1666_CR18","first-page":"315","volume":"02","author":"W Hu","year":"2017","unstructured":"Hu W, Mei D, Liu Y (2017) Generalized Lanchester warfare model characterized by information asymmetry effect[J]. J Syst Eng Electron 02:315\u2013321","journal-title":"J Syst Eng Electron"},{"issue":"04","key":"1666_CR19","doi-asserted-by":"publisher","first-page":"705","DOI":"10.1016\/S2095-3119(15)61300-4","volume":"15","author":"HE Dun-chun","year":"2016","unstructured":"Dun-chun HE, Jia-sui ZHAN, Lian-hui XIE (2016) Problems challenges and future of plant disease management: from an ecological point of view[J]. J Integrative Agric 15(04):705\u2013715","journal-title":"J Integrative Agric"},{"key":"1666_CR20","unstructured":"Waltz E (2004). Information warfare: Principles and operations[M].Wu H, translator. Beijing: Publishing House of Electronics Industry 13\u201315"},{"key":"1666_CR21","first-page":"32","volume-title":"Lectures on differential geometry[M]","author":"SS Chern","year":"2001","unstructured":"Chern SS, Chen W (2001) Lectures on differential geometry[M]. Peking University Press, Beijing, pp 32\u201336"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-020-01666-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-020-01666-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-020-01666-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,25]],"date-time":"2021-07-25T15:09:10Z","timestamp":1627225750000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-020-01666-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,5]]},"references-count":21,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["1666"],"URL":"https:\/\/doi.org\/10.1007\/s11036-020-01666-5","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,5]]},"assertion":[{"value":"23 September 2020","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 January 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}