{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:41:22Z","timestamp":1761896482607,"version":"3.30.1"},"reference-count":16,"publisher":"Tech Science Press","issue":"1","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["AUTOSOFT"],"published-print":{"date-parts":[[2018,1]]},"DOI":"10.1080\/10798587.2016.1267444","type":"journal-article","created":{"date-parts":[[2017,1,13]],"date-time":"2017-01-13T18:56:14Z","timestamp":1484333774000},"page":"133-138","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":53,"title":["The Study on Evaluation Method of Urban Network Security in the Big Data Era"],"prefix":"10.32604","volume":"24","author":[{"given":"Qingyuan","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Jianjian","family":"Luo","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2018]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.06.006"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1023\/A:1006651927333"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1016\/j.ecolmodel.2009.10.018"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1080\/10798587.2015.1048967"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1016\/S0964-5691(02)00105-9"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1111\/risk.2009.29.issue-3"},{"key":"CIT0007","first-page":"1681","volume":"51","author":"Liu Y.","year":"2014","journal-title":"Journal of Computer Research and Development"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1016\/j.jag.2011.12.012"},{"key":"CIT0009","first-page":"1750","volume":"53","author":"Xie L.","year":"2013","journal-title":"Journals of Tsinghua University Science and Technology"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-016-0581-x"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3112-5"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1016\/j.ecolmodel.2006.02.032"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1016\/j.jenvman.2005.08.019"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-016-0580-y"},{"issue":"5","key":"CIT0015","first-page":"327","volume":"30","author":"Zhou Q.","year":"2015","journal-title":"Computer Systems Science & Engineering"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1166\/jctn.2015.4661"}],"container-title":["Intelligent Automation and Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/uploads\/attached\/file\/20200807\/20200807080005_74234.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T18:22:58Z","timestamp":1733509378000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/iasc\/v24n1\/39734"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":16,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2018,1]]},"published-print":{"date-parts":[[2018,1]]}},"URL":"https:\/\/doi.org\/10.1080\/10798587.2016.1267444","relation":{},"ISSN":["1079-8587","2326-005X"],"issn-type":[{"type":"print","value":"1079-8587"},{"type":"electronic","value":"2326-005X"}],"subject":[],"published":{"date-parts":[[2018,1]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tasj20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tasj20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}