{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T18:47:33Z","timestamp":1767034053336},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/iccomm.2014.6866746","type":"proceedings-article","created":{"date-parts":[[2014,7,30]],"date-time":"2014-07-30T21:12:11Z","timestamp":1406754731000},"page":"1-4","source":"Crossref","is-referenced-by-count":4,"title":["Biologically inspired risk assessment in cyber security using neural networks"],"prefix":"10.1109","author":[{"given":"Mihai-Gabriel","family":"Ionita","sequence":"first","affiliation":[]},{"given":"Victor-Valeriu","family":"Patriciu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","article-title":"Requirements for a future EWS cyber defence in the internet of the future","author":"golling","year":"2011","journal-title":"2011 3rd International Conference on Cyber Conflict"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1989656.1989664"},{"key":"10","article-title":"DC++ and DDOS attacks","author":"bica","year":"2009","journal-title":"The 12th World Multi-Conference on Systemics Cybernetics and Informatics Proceedings"},{"journal-title":"Autonomic Computer Network Defence Using Risk State and Reinforcement Learning","year":"0","author":"beaudoin","key":"1"},{"key":"7","first-page":"141","author":"aickelin","year":"2002","journal-title":"The Danger Theory and Its Application to Artificial Immune Systems"},{"key":"6","article-title":"Analysis of the recent cyberspace attacks","author":"bica","year":"2009","journal-title":"The 2nd International Conference on Security for Information Technology and Communications SECITC'09"},{"journal-title":"Internet Analysis System (IAS)","year":"0","key":"5"},{"journal-title":"Early Warning and Intrusion Detection Based on Combined AI Methods","year":"0","author":"edelkamp","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-3083.2001.00974.x"},{"key":"8","article-title":"A cyber attack modeling and impact assessment framework","author":"kotenko","year":"2013","journal-title":"5th International Conference on Cyber Conflict"}],"event":{"name":"2014 10th International Conference on Communications (COMM)","start":{"date-parts":[[2014,5,29]]},"location":"Bucharest, Romania","end":{"date-parts":[[2014,5,31]]}},"container-title":["2014 10th International Conference on Communications (COMM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6856368\/6866648\/06866746.pdf?arnumber=6866746","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T20:51:26Z","timestamp":1490302286000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6866746\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/iccomm.2014.6866746","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}