{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T04:29:58Z","timestamp":1730262598211,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/ieem.2018.8607422","type":"proceedings-article","created":{"date-parts":[[2019,1,15]],"date-time":"2019-01-15T10:35:12Z","timestamp":1547548512000},"page":"808-813","source":"Crossref","is-referenced-by-count":1,"title":["Assessing Information Security Risk Using Markov Chain"],"prefix":"10.1109","author":[{"given":"Daniel","family":"Tse","sequence":"first","affiliation":[]},{"given":"Xiaoting","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Yuan","family":"Zong","sequence":"additional","affiliation":[]},{"given":"Jiaxi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Qinyan","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2011.2170117"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177705136"},{"key":"ref12","first-page":"117","article-title":"Principles of Information Security","author":"michael","year":"2001"},{"key":"ref13","first-page":"32","article-title":"Research on Risk Assessment Model of Universities' Information Security Based on Menace Analysis","volume":"2","author":"jiqing","year":"2013","journal-title":"Journal of Intelligence"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2001.11045662"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/AMM.608-609.295"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.5516\/NET.2007.39.2.123"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICINFA.2006.374109"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.4018\/jitpm.2010040105"},{"key":"ref8","article-title":"Markov Chain Sampling Methods for Dirichlet Process Mixture Models","volume":"9","author":"neal","year":"2000","journal-title":"Journal OfComputational and Graphical Statistics"},{"article-title":"A Markov Chain Model of Shifting Risk Parameters","year":"1998","author":"mahler","key":"ref7"},{"year":"2013","key":"ref2","article-title":"????????????? 63 ? ? ? ? ?"},{"year":"2017","key":"ref1","article-title":"???????? ?????? ? ? ? ? ? ? ?"},{"article-title":"A Markov Chain Model of Temporal Behavior for Anomaly Detection","year":"2000","author":"ye","key":"ref9"}],"event":{"name":"2018 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM)","start":{"date-parts":[[2018,12,16]]},"location":"Bangkok","end":{"date-parts":[[2018,12,19]]}},"container-title":["2018 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8589962\/8607265\/08607422.pdf?arnumber=8607422","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T00:05:35Z","timestamp":1643155535000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8607422\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/ieem.2018.8607422","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}