{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T02:43:45Z","timestamp":1773974625144,"version":"3.50.1"},"reference-count":75,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"name":"Grants-in-Aid for Scientific Research through the Japan Society for the Promotion of Science","award":["25330270"],"award-info":[{"award-number":["25330270"]}]},{"name":"Grants-in-Aid for Scientific Research through the Japan Society for the Promotion of Science","award":["26330350"],"award-info":[{"award-number":["26330350"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["06105031"],"award-info":[{"award-number":["06105031"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61471035"],"award-info":[{"award-number":["61471035"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2015]]},"DOI":"10.1109\/access.2015.2498288","type":"journal-article","created":{"date-parts":[[2015,11,5]],"date-time":"2015-11-05T19:53:54Z","timestamp":1446753234000},"page":"2270-2280","source":"Crossref","is-referenced-by-count":28,"title":["Cybermatics: A Holistic Field for Systematic Study of Cyber-Enabled New Worlds"],"prefix":"10.1109","volume":"3","author":[{"given":"Jianhua","family":"Ma","sequence":"first","affiliation":[]},{"given":"Huansheng","family":"Ning","sequence":"additional","affiliation":[]},{"given":"Runhe","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Laurence T.","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jinjun","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Geyong","family":"Min","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-04447-7","author":"blackwell","year":"2014","journal-title":"1st CyberPatterns Unifying Design Patterns with Security Patterns and Attack Patterns"},{"key":"ref72","doi-asserted-by":"crossref","DOI":"10.21236\/ADA411943","article-title":"Information assurance cyber ecology","author":"jorgensen","year":"2003"},{"key":"ref71","year":"2015","journal-title":"Internet Science From Wikipedia the Free Encyclopedia"},{"key":"ref70","year":"2015","journal-title":"Web Science From Wikipedia the Free Encyclopedia"},{"key":"ref74","first-page":"91","article-title":"Cyber defence and warfare","volume":"9","author":"ball","year":"2013","journal-title":"Secur Challenges"},{"key":"ref39","year":"2015","journal-title":"From Wikipedia the free encyclopedia"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1057\/9781137513960"},{"key":"ref38","author":"mayer","year":"2014","journal-title":"Cyberspace Definition Draft Pisa"},{"key":"ref33","author":"lillemose","year":"2015"},{"key":"ref32","author":"wiener","year":"1948","journal-title":"Cybernetics or the Control and Communication in the Animal and the Machine"},{"key":"ref31","author":"stewart","year":"1997","journal-title":"Media New Ways and Meanings"},{"key":"ref30","author":"kutz","year":"2013","journal-title":"Data-Driven Modeling & Scientific Computation Methods for Complex Systems & Big Data"},{"key":"ref37","year":"2015","journal-title":"Cyberspace From Wikipedia the Free Encyclopedia"},{"key":"ref36","year":"2015","journal-title":"From Wikipedia the free encyclopedia"},{"key":"ref35","year":"2015","journal-title":"Burning Chrome From Wikipedia the Free Encyclopedia"},{"key":"ref34","author":"gibson","year":"1980","journal-title":"From Wikipedia the free encyclopedia"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-59412-0_17"},{"key":"ref62","author":"tsien","year":"1954","journal-title":"Engineering Cybernetics"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4573(94)90076-0"},{"key":"ref63","year":"2015","journal-title":"System Science From Wikipedia the Free Encyclopedia"},{"key":"ref28","article-title":"Cybermatics: Cyber&#x2013;physical&#x2013;social-thinking hyperspace based science and technology","author":"ning","year":"2015","journal-title":"Future Generat Comput Syst"},{"key":"ref64","year":"2015","journal-title":"Network Science From Wikipedia the Free Encyclopedia"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-014-5072-1"},{"key":"ref65","first-page":"839","article-title":"Green computing&#x2014;A survey","volume":"4","author":"mittal","year":"2013","journal-title":"International Journal of Computer Trends & Technology"},{"key":"ref66","first-page":"1","article-title":"The rise of crowdsourcing","volume":"14","author":"howe","year":"2006","journal-title":"Wired Mag"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-0685-9_6"},{"key":"ref67","first-page":"59","article-title":"Hybrid intelligence","volume":"8","author":"wu","year":"2012","journal-title":"Commun China Comput Fed"},{"key":"ref68","author":"kurzweil","year":"2013","journal-title":"Medical Nanobots Will Connect Brain to Cloud Computing"},{"key":"ref69","article-title":"Digital clone: Possible or impossible?","author":"ma","year":"2012","journal-title":"Proc Keynote World Intell Congr"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1185214"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0991-94"},{"key":"ref20","author":"riva","year":"2001","journal-title":"Towards Cyberpsychology Mind Cognition and Society in the Internet Age"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2014.139"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.7951"},{"key":"ref24","year":"2015","journal-title":"Information Science From Wikipedia the Free Encyclopedia"},{"key":"ref23","year":"2015","journal-title":"Computer Science From Wikipedia the Free Encyclopedia"},{"key":"ref26","year":"2013","journal-title":"The 2013 World Cybermatics Congress"},{"key":"ref25","year":"2015","journal-title":"Informatics From Wikipedia the Free Encyclopedia"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1177\/194675670900100303"},{"key":"ref51","year":"2015","journal-title":"IBM Watson"},{"key":"ref59","year":"2015","journal-title":"VHDL (VHSIC Hardware Description Language)"},{"key":"ref58","year":"2015","journal-title":"DBMS Database Management System"},{"key":"ref57","year":"2015","journal-title":"Cybernetics From Wikipedia the Free Encyclopedia"},{"key":"ref56","year":"2015","journal-title":"-Matic Suffix What Does the Suffix -Matic Mean?"},{"key":"ref55","year":"2015","journal-title":"Cyber- Prefix the Internet-Related Prefixes From Wikipedia"},{"key":"ref54","year":"2015","journal-title":"Entity From Wikipedia the Free Encyclopedia"},{"key":"ref53","year":"2015","journal-title":"EntityCube"},{"key":"ref52","year":"2015","journal-title":"From Wikipedia the free encyclopedia"},{"key":"ref10","first-page":"1133","article-title":"Digital explosions and digital clones","author":"ma","year":"2015","journal-title":"Proc Int IEEE Conf Internet People"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/11839569_37"},{"key":"ref40","year":"2015","journal-title":"Mazak Cyber World"},{"key":"ref12","first-page":"1063","article-title":"Wear-I: A new computing paradigm in wearable computing","author":"ma","year":"2015","journal-title":"Proc Int IEEE Conf Ubiquitous Comput Commun"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2009.143"},{"key":"ref14","author":"cook","year":"2005","journal-title":"Smart Environments Technology Protocols and Applications"},{"key":"ref15","author":"miller","year":"2015","journal-title":"The Internet of Things How Smart TVs Smart Cars Smart Homes and Smart Cities are Changing the World"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosust.2014.07.002"},{"key":"ref17","year":"2013","journal-title":"Ensuring the Global Participation in the Internet Economy for Development"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.2307\/j.ctt7zsxqq","author":"mehan","year":"2014","journal-title":"CyberWar CyberTerror CyberCrime and CyberActivism"},{"key":"ref19","author":"casey","year":"2008","journal-title":"Physics and Cyber-Enabled Manufacturing Process Control"},{"key":"ref4","first-page":"46","article-title":"Improving human interaction with a hyperworld","author":"ma","year":"1996","journal-title":"Proc DMS Hong Kong"},{"key":"ref3","first-page":"1","article-title":"Hyperworld modeling","author":"kunii","year":"1996","journal-title":"Proc Int Conf Inf Vis"},{"key":"ref6","first-page":"146","article-title":"Smart u-things&#x2014;Challenging real world complexity","author":"ma","year":"2005","journal-title":"Proc IPSJ DSP Symp Ser"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1108\/17427370580000113"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2009.127"},{"key":"ref7","author":"ma","year":"2005","journal-title":"Ubiquitous Intelligence&#x2014;The Intelligence Revolution"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29023-7_18"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2011.55"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2005.1415605"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/FGCNS.2008.107"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.81"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/5254.941359"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CW.2004.63"},{"key":"ref41","year":"2015","journal-title":"Fall Course&#x2014;CSCI-E45a&#x2014;The Cyber World Hardware Software Networks Security and Management"},{"key":"ref44","year":"2015","journal-title":"Cyberworlds Int Conf"},{"key":"ref43","year":"2002","journal-title":"In Proc First International symposium on cyber worlds"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/7042252\/07320961.pdf?arnumber=7320961","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,12]],"date-time":"2024-06-12T07:47:42Z","timestamp":1718178462000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7320961\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"references-count":75,"URL":"https:\/\/doi.org\/10.1109\/access.2015.2498288","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}