{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T22:47:09Z","timestamp":1772837229575,"version":"3.50.1"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2022,3,8]],"date-time":"2022-03-08T00:00:00Z","timestamp":1646697600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,3,8]],"date-time":"2022-03-08T00:00:00Z","timestamp":1646697600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Sign Process Syst"],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1007\/s11265-022-01741-y","type":"journal-article","created":{"date-parts":[[2022,3,8]],"date-time":"2022-03-08T02:02:42Z","timestamp":1646704962000},"page":"1159-1168","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["A Data-Driven Based Security Situational Awareness Framework for Power Systems"],"prefix":"10.1007","volume":"94","author":[{"given":"Jian","family":"Ding","sequence":"first","affiliation":[]},{"given":"Chunyi","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,8]]},"reference":[{"key":"1741_CR1","doi-asserted-by":"crossref","unstructured":"Nazir, M., Enslin, J.H., & Babakmehr, M. (2020). Power system protection response under geomagnetically induced currents. In: 2020 Clemson University Power Systems Conference (PSC), pp. 1\u20136. IEEE.","DOI":"10.1109\/PSC50246.2020.9131172"},{"key":"1741_CR2","doi-asserted-by":"crossref","unstructured":"Gao, Y., Iqbal, S., Zhang, P., & Qiu, M. (2015). Performance and power analysis of high-density multi-GPGPU architectures: A preliminary case study. In: IEEE 17th HPCC, pp. 29\u201335.","DOI":"10.1109\/HPCC-CSS-ICESS.2015.68"},{"key":"1741_CR3","doi-asserted-by":"crossref","unstructured":"Qiu, M., Ming, Z., Li, J., Liu, S., Wang, B., & Lu, Z. (2012). Three-phase time-aware energy minimization with dvfs and unrolling for chip multiprocessors, 58(10), 439\u2013445.","DOI":"10.1016\/j.sysarc.2012.07.001"},{"key":"1741_CR4","doi-asserted-by":"crossref","unstructured":"Niu, J., Liu, C., & other. (2013). Energy efficient task assignment with guaranteed probability satisfying timing constraints for embedded systems. IEEE Transactions on Parallel and Distributed Systems 25(8), 2043\u20132052.","DOI":"10.1109\/TPDS.2013.251"},{"key":"1741_CR5","doi-asserted-by":"crossref","unstructured":"Qiu, M., Khisamutdinov, E., & other. (2013). Rna nanotechnology for computer design and in vivo computation.","DOI":"10.1098\/rsta.2012.0310"},{"issue":"9","key":"1741_CR6","doi-asserted-by":"publisher","first-page":"1630","DOI":"10.1109\/TKDE.2018.2866863","volume":"31","author":"R Lu","year":"2018","unstructured":"Lu, R., Jin, X., Zhang, S., Qiu, M., & Wu, X. (2018). A study on big knowledge and its engineering issues. IEEE Transactions on Knowledge and Data Engineering, 31(9), 1630\u20131644.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"1741_CR7","doi-asserted-by":"crossref","unstructured":"Tao, L., Golikov, S., & other. (2015). A reusable software component for integrated syntax and semantic validation for services computing. In: IEEE Symposium on Service-Oriented System Engineering (SOSE), pp. 127\u2013132.","DOI":"10.1109\/SOSE.2015.10"},{"issue":"3","key":"1741_CR8","first-page":"245","volume":"10","author":"K Zhang","year":"2005","unstructured":"Zhang, K., Kong, J., Qiu, M., & Song, G. (2005). Multimedia layout adaptation through grammatical specifications, 10(3), 245\u2013260.","journal-title":"Multimedia layout adaptation through grammatical specifications"},{"key":"1741_CR9","doi-asserted-by":"crossref","unstructured":"Gai, K., Qiu, M., Chen, L., & Liu, M. (2015). Electronic health record error prevention approach using ontology in big data. In: IEEE 17th HPCC Conf.","DOI":"10.1109\/HPCC-CSS-ICESS.2015.168"},{"key":"1741_CR10","doi-asserted-by":"publisher","first-page":"766","DOI":"10.1016\/j.future.2015.05.005","volume":"56","author":"H Zhao","year":"2016","unstructured":"Zhao, H., Chen, M., Qiu, M., Gai, K., & Liu, M. (2016). A novel pre-cache schema for high performance android system. Future Generation Computer Systems, 56, 766\u2013772.","journal-title":"Future Generation Computer Systems"},{"key":"1741_CR11","unstructured":"Zhao, J., Yan, Q., Liu, X., Li, B., & Zuo, G. (2020). Cyber threat intelligence modeling based on heterogeneous graph convolutional network. In: 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020), pp. 241\u2013256."},{"key":"1741_CR12","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1016\/j.ins.2020.03.113","volume":"537","author":"J Zhao","year":"2020","unstructured":"Zhao, J., Liu, X., Yan, Q., Li, B., Shao, M., & Peng, H. (2020). Multi-attributed heterogeneous graph convolutional network for bot detection. Information Sciences, 537, 380\u2013393.","journal-title":"Information Sciences"},{"key":"1741_CR13","doi-asserted-by":"publisher","first-page":"100539","DOI":"10.1016\/j.esr.2020.100539","volume":"31","author":"S Impram","year":"2020","unstructured":"Impram, S., Nese, S. V., & Oral, B. (2020). Challenges of renewable energy penetration on power system flexibility: A survey. Energy Strategy Reviews, 31, 100539.","journal-title":"Energy Strategy Reviews"},{"issue":"8","key":"1741_CR14","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MCOM.2012.6257528","volume":"50","author":"H Su","year":"2012","unstructured":"Su, H., Qiu, M., & Wang, H. (2012). Secure wireless communication system for smart grid with rechargeable electric vehicles. IEEE Communications Magazine, 50(8), 62\u201368.","journal-title":"IEEE Communications Magazine"},{"issue":"4","key":"1741_CR15","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1016\/j.jpdc.2011.12.004","volume":"72","author":"X Tang","year":"2012","unstructured":"Tang, X., & Li, K. (2012). other: A hierarchical reliability-driven scheduling algorithm in grid systems. Journal of Parallel and Distributed Computing, 72(4), 525\u2013535.","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"1741_CR16","doi-asserted-by":"crossref","unstructured":"Sun, W., Wang, Q., Li, M., & Ni, M. (2020). Extreme risk assessment in power system considering cyber attacks. In: 2020 IEEE 4th Conference on Energy Internet and Energy System Integration (EI2), pp. 766\u2013770. IEEE.","DOI":"10.1109\/EI250167.2020.9346650"},{"key":"1741_CR17","doi-asserted-by":"publisher","first-page":"102522","DOI":"10.1016\/j.jisa.2020.102522","volume":"54","author":"H Hu","year":"2020","unstructured":"Hu, H., Liu, J., Zhang, Y., Liu, Y., Xu, X., & Huang, J. (2020). Attack scenario reconstruction approach using attack graph and alert data mining. Journal of Information Security and Applications, 54, 102522.","journal-title":"Journal of Information Security and Applications"},{"key":"1741_CR18","doi-asserted-by":"crossref","unstructured":"Qiu, H., Qiu, M., Memmi, G., Ming, Z., & Liu, M. (2018). A dynamic scalable blockchain based communication architecture for IoT. In: Int\u2019l Conf. on Smart Blockchain, pp. 159\u2013166.","DOI":"10.1007\/978-3-030-05764-0_17"},{"key":"1741_CR19","doi-asserted-by":"crossref","unstructured":"Ning, P., Cui, Y., & Reeves, D. S. (2002). Constructing attack scenarios through correlation of intrusion alerts. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 245\u2013254.","DOI":"10.1145\/586110.586144"},{"key":"1741_CR20","doi-asserted-by":"publisher","first-page":"95109","DOI":"10.1109\/ACCESS.2020.2995772","volume":"8","author":"J Cao","year":"2020","unstructured":"Cao, J., Wang, D., Qu, Z., Cui, M., Xu, P., Xue, K., & Hu, K. (2020). A novel false data injection attack detection model of the cyber-physical power system. IEEE Access, 8, 95109\u201395125.","journal-title":"IEEE Access"},{"key":"1741_CR21","doi-asserted-by":"crossref","unstructured":"Chen, X., Zhang, L., Liu, Y., & Tang, C. (2018). Ensemble learning methods for power system cyber-attack detection. In: 2018 IEEE 3rd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), pp. 613\u2013616. IEEE.","DOI":"10.1109\/ICCCBDA.2018.8386588"},{"key":"1741_CR22","doi-asserted-by":"publisher","first-page":"101867","DOI":"10.1016\/j.cose.2020.101867","volume":"95","author":"J Zhao","year":"2020","unstructured":"Zhao, J., Yan, Q., Li, J., Shao, M., He, Z., & Li, B. (2020). Timiner: Automatically extracting and analyzing categorized cyber threat intelligence from social data. Computers & Security, 95, 101867.","journal-title":"Computers & Security"},{"key":"1741_CR23","unstructured":"Mikolov, T., Chen, K., Corrado, G., & Dean, J. (2013). Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781."},{"key":"1741_CR24","unstructured":"Kipf, T.N., & Welling, M. (2016). Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907."}],"container-title":["Journal of Signal Processing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-022-01741-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11265-022-01741-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-022-01741-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,16]],"date-time":"2022-11-16T01:13:49Z","timestamp":1668561229000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11265-022-01741-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,8]]},"references-count":24,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2022,11]]}},"alternative-id":["1741"],"URL":"https:\/\/doi.org\/10.1007\/s11265-022-01741-y","relation":{},"ISSN":["1939-8018","1939-8115"],"issn-type":[{"value":"1939-8018","type":"print"},{"value":"1939-8115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,8]]},"assertion":[{"value":"18 November 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 December 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 December 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}