{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T16:17:27Z","timestamp":1761409047543,"version":"build-2065373602"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"16","license":[{"start":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T00:00:00Z","timestamp":1761350400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T00:00:00Z","timestamp":1761350400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"The Sichuan Science and Technology Program","award":["2024NSFSC0515 and 2024ZHCG0182"],"award-info":[{"award-number":["2024NSFSC0515 and 2024ZHCG0182"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"DOI":"10.1007\/s11227-025-07960-x","type":"journal-article","created":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T16:13:53Z","timestamp":1761408833000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cybersecurity situation assessment based on fuzzy cluster analysis and fuzzy comprehensive judgment decision-making"],"prefix":"10.1007","volume":"81","author":[{"given":"Kesheng","family":"Liu","sequence":"first","affiliation":[]},{"given":"Binyong","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,25]]},"reference":[{"key":"7960_CR1","unstructured":"HP Inc (2021) HP Wolf Security Threat Insights Report \u2013 Q2 2021, HP Wolf Security, [Online]. https:\/\/www.hp.com\/us-en\/tw\/wolf-security\/threat-insights\/2021-Q2-report.pdf"},{"key":"7960_CR2","doi-asserted-by":"publisher","unstructured":"K. Toyoshima et al (2020) A DQN based mobile actor node control in WSAN: Simulation results of different distributions of events considering three-dimensional environment. In International Conference on Emerging Internetworking, Data and Web Technologies, Bari, Italy, pp. 197-209. https:\/\/doi.org\/10.1007\/978-3-030-39746-3_21","DOI":"10.1007\/978-3-030-39746-3_21"},{"key":"7960_CR3","doi-asserted-by":"publisher","unstructured":"N. Saito et al (2020) Design and implementation of a DQN based AAV. In International Conference on Broadband and Wireless Computing, Communication and Applications, Fukuoka, Japan, pp. 321\u2013329. https:\/\/doi.org\/10.1007\/978-3-030-61108-8_32","DOI":"10.1007\/978-3-030-61108-8_32"},{"key":"7960_CR4","doi-asserted-by":"publisher","unstructured":"K. Sethi et al (2020) Robust adaptive cloud intrusion detection system using advanced deep reinforcement learning. In International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE), Lucknow, India, pp. 66\u201385. https:\/\/doi.org\/10.1007\/978-3-030-66626-2_4","DOI":"10.1007\/978-3-030-66626-2_4"},{"key":"7960_CR5","doi-asserted-by":"publisher","unstructured":"R. Kumar et al (2020) Deep reinforcement learning based intrusion detection system for cloud infrastructure. In 2020 International Conference on COMmunication Systems and NETworkS (COMSNETS), Bengaluru, India, pp. 1\u20136. https:\/\/doi.org\/10.1109\/COMSNETS48256.2020.9027452","DOI":"10.1109\/COMSNETS48256.2020.9027452"},{"key":"7960_CR6","doi-asserted-by":"publisher","first-page":"102614","DOI":"10.1016\/j.simpat.2021.102614","volume":"120","author":"Z Zhang","year":"2022","unstructured":"Zhang Z et al (2022) STG2P: A two-stage pipeline model for intrusion detection based on improved LightGBM and K-means. Simul Model Pract Theory 120:102614. https:\/\/doi.org\/10.1016\/j.simpat.2021.102614","journal-title":"Simul Model Pract Theory"},{"issue":"9","key":"7960_CR7","doi-asserted-by":"publisher","first-page":"9723","DOI":"10.1016\/j.jksuci.2021.12.008","volume":"34","author":"M Asif","year":"2021","unstructured":"Asif M et al (2021) MapReduce based intelligent model for intrusion detection using machine learning technique. J King Saud Univ - Comput Inf Sci 34(9):9723\u20139731. https:\/\/doi.org\/10.1016\/j.jksuci.2021.12.008","journal-title":"J King Saud Univ - Comput Inf Sci"},{"key":"7960_CR8","doi-asserted-by":"publisher","first-page":"121000","DOI":"10.1016\/j.eswa.2023.121000","volume":"234","author":"MJ Idrissi","year":"2023","unstructured":"Idrissi MJ et al (2023) Fed-ANIDS: Federated learning for anomaly-based network intrusion detection systems. Expert Syst Appl 234:121000. https:\/\/doi.org\/10.1016\/j.eswa.2023.121000","journal-title":"Expert Syst Appl"},{"key":"7960_CR9","unstructured":"Bodeau D, Graubart R (2017) Cyber resiliency design principles: selective use throughout the lifecycle and in conjunction with related disciplines. MITRE Corp., McLean, VA, USA, Rep. 2017\u20130103. https:\/\/apps.dtic.mil\/sti\/pdfs\/AD1107919.pdf"},{"issue":"1","key":"7960_CR10","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1515\/jisys-2022-0037","volume":"37","author":"MR Endsley","year":"1995","unstructured":"Endsley MR (1995) Toward a theory of situation awareness in dynamic systems. Human Factors: J Hum Factors Ergonom Soc 37(1):32\u201364. https:\/\/doi.org\/10.1515\/jisys-2022-0037","journal-title":"Human Factors: J Hum Factors Ergonom Soc"},{"key":"7960_CR11","doi-asserted-by":"publisher","unstructured":"Bass T (1999) Multisensor data fusion for next generation distributed intrusion detection systems. In Irish Natl. Symp., Ireland, pp. 24-27. https:\/\/doi.org\/10.13140\/RG.2.2.20357.96482\/1","DOI":"10.13140\/RG.2.2.20357.96482\/1"},{"issue":"4","key":"7960_CR12","doi-asserted-by":"publisher","first-page":"99","DOI":"10.13140\/RG.2.2.20357.96482\/1","volume":"43","author":"T Bass","year":"2000","unstructured":"Bass T (2000) Intrusion detection systems and multisensor data fusion. Commun ACM 43(4):99\u2013105. https:\/\/doi.org\/10.13140\/RG.2.2.20357.96482\/1","journal-title":"Commun ACM"},{"key":"7960_CR13","doi-asserted-by":"publisher","first-page":"103437","DOI":"10.1016\/j.cose.2023.103437","volume":"134","author":"N Ghoson","year":"2024","unstructured":"Ghoson N et al (2024) A Review on the Static and Dynamic Risk Assessment Methods for OT Cybersecurity in Industry 4.0. Comput & Security 134:103437. https:\/\/doi.org\/10.1016\/j.cose.2023.103437","journal-title":"Comput & Security"},{"key":"7960_CR14","doi-asserted-by":"publisher","first-page":"100535","DOI":"10.1016\/j.cosrev.2023.100535","volume":"48","author":"J Tan","year":"2023","unstructured":"Tan J et al (2023) A Survey: When Moving Target Defense Meets Game Theory. Comput Scie Rev 48:100535. https:\/\/doi.org\/10.1016\/j.cosrev.2023.100535","journal-title":"Comput Scie Rev"},{"issue":"5","key":"7960_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3534678.3539393","volume":"55","author":"H Alavizadeh","year":"2023","unstructured":"Alavizadeh H et al (2023) A Survey on Cyber Situation Awareness Systems: Framework, Techniques, and Insights. ACM Comput Surv 55(5):1\u201338. https:\/\/doi.org\/10.1145\/3534678.3539393","journal-title":"ACM Comput Surv"},{"issue":"1","key":"7960_CR16","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1109\/COMST.2023.3328381","volume":"26","author":"A Alabdan","year":"2024","unstructured":"Alabdan A et al (2024) A Survey on Cyber Situation Awareness: Taxonomy, Models, and Future Directions. IEEE Commun Surv & Tutorials 26(1):612\u2013655. https:\/\/doi.org\/10.1109\/COMST.2023.3328381","journal-title":"IEEE Commun Surv & Tutorials"},{"issue":"4","key":"7960_CR17","doi-asserted-by":"publisher","first-page":"8439","DOI":"10.3233\/jifs-189664","volume":"40","author":"Z Dongmei","year":"2021","unstructured":"Dongmei Z, Huiqian S, Hong L (2021) Fuzzy Integrated Rough Set Theory Situation Feature Extraction Of Network Security. J Intell Fuzzy Syst 40(4):8439\u20138450. https:\/\/doi.org\/10.3233\/jifs-189664","journal-title":"J Intell Fuzzy Syst"},{"issue":"14","key":"7960_CR18","doi-asserted-by":"publisher","first-page":"4788","DOI":"10.3390\/s21144788","volume":"21","author":"Z Haofang","year":"2021","unstructured":"Haofang Z, Chunying K, Yao X (2021) Research On Network Security Situation Awareness Based On The Lstm-Dt Model. Sensors 21(14):4788. https:\/\/doi.org\/10.3390\/s21144788","journal-title":"Sensors"},{"key":"7960_CR19","unstructured":"Wang C, Liu Y, Ye X (2021) Network Security Situation Assessment Based on Intrusion Detection. Acta Scientiarum Naturalium Universitatis Nankaiensis (Natural Science Edition) 54(5): 36-41. https:\/\/xuebao.nankai.edu.cn\/jns\/CN\/Y2021\/V54\/I5\/36"},{"issue":"2","key":"7960_CR20","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1093\/jigpal\/jzac024","volume":"31","author":"S Pavol","year":"2023","unstructured":"Pavol S, Richard S, Andrej G, Patrik P (2023) Network security situation awareness forecasting based on statistical approach and neural networks. Logic J IGPL 31(2):352\u2013374. https:\/\/doi.org\/10.1093\/jigpal\/jzac024","journal-title":"Logic J IGPL"},{"issue":"6","key":"7960_CR21","doi-asserted-by":"publisher","first-page":"130","DOI":"10.19678\/j.issn.1000-3428.0055219","volume":"46","author":"D Huadong","year":"2020","unstructured":"Huadong D, Huahu X, Ran D, Fan C (2020) Network Security Situation Awareness Model Based on Bayesian Method. Comput Eng 46(6):130\u2013135. https:\/\/doi.org\/10.19678\/j.issn.1000-3428.0055219","journal-title":"Comput Eng"},{"key":"7960_CR22","doi-asserted-by":"publisher","unstructured":"Geng F, Wang A (2021) Research on Network Security Situation Awareness Based on Quantum Genetic Algorithm. Computer Simulation 38(08):348-351+491. https:\/\/doi.org\/10.3969\/j.issn.1006-9348.2021.08.068","DOI":"10.3969\/j.issn.1006-9348.2021.08.068"},{"key":"7960_CR23","doi-asserted-by":"publisher","unstructured":"Cui Y (2020) Network security situation awareness technology based on data mining technology. Automation & Instrumentation (12):6-9+13. https:\/\/doi.org\/10.14016\/j.cnki.1001-9227.2020.12.006","DOI":"10.14016\/j.cnki.1001-9227.2020.12.006"},{"issue":"6","key":"7960_CR24","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/978-3-030-89814-4_38","volume":"42","author":"Z Hongbin","year":"2021","unstructured":"Hongbin Z, Yan Y, Dongmei Z, Bin L, Hongbin G (2021) Network Security Situational Awareness Model Based on Threat Intelligence. J Commun 42(6):182\u2013194. https:\/\/doi.org\/10.1007\/978-3-030-89814-4_38","journal-title":"J Commun"},{"key":"7960_CR25","doi-asserted-by":"publisher","unstructured":"Zhiyan Z, Xiaomo J (2020) Research on the Intelligent Fusion Model of Network Security Situation Awareness. Netinfo Security: 87-93. https:\/\/doi.org\/10.3969\/j.issn.1671-1122.2020.04.011","DOI":"10.3969\/j.issn.1671-1122.2020.04.011"},{"key":"7960_CR26","doi-asserted-by":"publisher","unstructured":"Zehua R et al (2022) Network Security Situation Awareness Based on Spatio-temporal Correlation of Alarms. IEEE Conference on Computer Communications: 1-2. https:\/\/doi.org\/10.1109\/infocomwkshps54753.2022.9798168","DOI":"10.1109\/infocomwkshps54753.2022.9798168"},{"issue":"12","key":"7960_CR27","doi-asserted-by":"publisher","first-page":"349","DOI":"10.11896\/jsjkx.210400227","volume":"48","author":"Z Hongbin","year":"2021","unstructured":"Hongbin Z, Dongmei Z, Huiqian S (2021) Network Security Situation Based on Time Factor and Composite CNN Structure. Comput Sci 48(12):349\u2013356. https:\/\/doi.org\/10.11896\/jsjkx.210400227","journal-title":"Comput Sci"},{"issue":"20","key":"7960_CR28","doi-asserted-by":"publisher","first-page":"74","DOI":"10.16652\/j.issn.1004-373x.2020.20.019","volume":"43","author":"C Kai","year":"2020","unstructured":"Kai C (2020) Design of network security situation awareness system based on multi-source heterogeneous sensors. Mod Electron Technique 43(20):74\u201378. https:\/\/doi.org\/10.16652\/j.issn.1004-373x.2020.20.019","journal-title":"Mod Electron Technique"},{"key":"7960_CR29","doi-asserted-by":"publisher","unstructured":"Xu W et al (2022) Research on Network Security Situational Awareness Based on Crawler Algorithm. Security and Communication Networks: 1-9. https:\/\/doi.org\/10.1155\/2022\/3639174","DOI":"10.1155\/2022\/3639174"},{"issue":"1","key":"7960_CR30","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1515\/jisys-2022-0037","volume":"31","author":"Z Ying","year":"2022","unstructured":"Ying Z, Guodong Z, Roobaea A, Abdullah MB, Rajan M (2022) Research on data mining method of network security situation awareness based on cloud computing. Int J Intell Syst 31(1):520\u2013531. https:\/\/doi.org\/10.1515\/jisys-2022-0037","journal-title":"Int J Intell Syst"},{"key":"7960_CR31","doi-asserted-by":"publisher","unstructured":"Kai C et al (2022) A Novel Network Security Situation Awareness Model for Advanced Persistent Threat. 7th IEEE International Conference on Data Science in Cyberspace (DSC): 9-16. https:\/\/doi.org\/10.1109\/dsc55868.2022.00009","DOI":"10.1109\/dsc55868.2022.00009"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-07960-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-025-07960-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-07960-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T16:14:03Z","timestamp":1761408843000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-025-07960-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,25]]},"references-count":31,"journal-issue":{"issue":"16","published-online":{"date-parts":[[2025,11]]}},"alternative-id":["7960"],"URL":"https:\/\/doi.org\/10.1007\/s11227-025-07960-x","relation":{},"ISSN":["1573-0484"],"issn-type":[{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,25]]},"assertion":[{"value":"18 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"1497"}}