{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T08:54:39Z","timestamp":1762505679229,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,11]]},"DOI":"10.1109\/dbta.2010.5659017","type":"proceedings-article","created":{"date-parts":[[2010,12,11]],"date-time":"2010-12-11T13:53:44Z","timestamp":1292075624000},"page":"1-4","source":"Crossref","is-referenced-by-count":2,"title":["A New Method of Data Preprocessing for Network Security Situational Awareness"],"prefix":"10.1109","author":[{"given":"Aiping","family":"Lu","sequence":"first","affiliation":[]},{"given":"Jianping","family":"Li","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"5","article-title":"Survey of Network Situation Awareness System","volume":"33","author":"wang","year":"2006","journal-title":"Computer Science"},{"key":"ref3","first-page":"13","article-title":"A Technique Independent Fusion Model For Network Intrusion Detection","volume":"3","author":"shifflet","year":"2005","journal-title":"Proceedings of the Midstates Conference on Undergraduate Research in Computer Science and Mat hematics"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/AINAW.2007.126"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1360\/jos170885"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SecTech.2008.26"},{"key":"ref5","first-page":"155","article-title":"Study and implementation of integrated network security monitoring system","volume":"24","author":"zhang","year":"2003","journal-title":"Journal on Communications"},{"key":"ref12","first-page":"804","article-title":"Automatic Recognition of Chinese Organization Name Based on Cascaded Conditional Random Fields","volume":"34","author":"zhou","year":"2006","journal-title":"Chinese Journal of Electronics"},{"key":"ref8","first-page":"6942703","article-title":"Multisensor real-time risk assessment using continuous time hidden Markov models","author":"kjetil","year":"2006","journal-title":"Proceedings of the International Conference on ComputationalIntelligence and Security (CIS)"},{"key":"ref7","first-page":"95","article-title":"A Method of Network Security Situation Awareness Based on Rough Set Theory","volume":"34","author":"liang","year":"2007","journal-title":"Computer Science"},{"journal-title":"Distributed Intrusion Detection and At tack Containment for Organizational Cyber Security","year":"2005","key":"ref2"},{"key":"ref9","first-page":"282","article-title":"Conditional random fields: probabilistic models for segmenting and labeling sequence data","author":"lafferty","year":"2001","journal-title":"International Conference on Machine Learning"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/332051.332079"}],"event":{"name":"2010 2nd International Workshop on Database Technology and Applications (DBTA)","start":{"date-parts":[[2010,11,27]]},"location":"Wuhan, China","end":{"date-parts":[[2010,11,28]]}},"container-title":["2010 2nd International Workshop on Database Technology and Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5658186\/5658597\/05659017.pdf?arnumber=5659017","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T10:51:34Z","timestamp":1490093494000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5659017\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/dbta.2010.5659017","relation":{},"subject":[],"published":{"date-parts":[[2010,11]]}}}