{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T07:32:09Z","timestamp":1767771129600,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/fskd.2017.8393160","type":"proceedings-article","created":{"date-parts":[[2018,7,16]],"date-time":"2018-07-16T22:38:33Z","timestamp":1531780713000},"page":"2457-2461","source":"Crossref","is-referenced-by-count":5,"title":["Network attack path reconstruction based on similarity computation"],"prefix":"10.1109","author":[{"given":"Jian-wei","family":"Tian","sequence":"first","affiliation":[]},{"given":"Xi","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Wei-hui","family":"Qi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/DISCEX.2003.1194892"},{"key":"ref3","article-title":"A Network Security Situational Awareness Model Based on Information Fusion [J]","volume":"3","author":"yong","year":"2009","journal-title":"Journal of Computer research and development"},{"key":"ref10","article-title":"Review on DARPA Intrusion Detection Evaluation[J]","author":"zhang","year":"2002","journal-title":"Communications Technology"},{"year":"2005","author":"batsell","journal-title":"Distributed Intrusion Detection and Attack Containment for Organizational Cyber Security","key":"ref6"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/AINA.2016.129"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/332051.332079"},{"key":"ref12","article-title":"Research on network attack intention recognition technology based on attack path graph[J]","author":"teng","year":"2016","journal-title":"Modern Electronics Technique"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/SAS.2006.1634267"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1117\/12.603735"},{"key":"ref2","first-page":"1907","article-title":"Study on index system in network situation awareness[J]","volume":"27","author":"wang","year":"2007","journal-title":"Jisuanji Yingyong\/ Journal of Computer Applications"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.3233\/JCS-2005-13505"},{"year":"2014","author":"pierson","journal-title":"Network security and fraud detection system and method[J]","key":"ref1"}],"event":{"name":"2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)","start":{"date-parts":[[2017,7,29]]},"location":"Guilin","end":{"date-parts":[[2017,7,31]]}},"container-title":["2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8384043\/8392854\/08393160.pdf?arnumber=8393160","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T00:50:41Z","timestamp":1598230241000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8393160\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/fskd.2017.8393160","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}