{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T08:15:00Z","timestamp":1765354500279,"version":"3.37.3"},"reference-count":30,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2018,9,1]],"date-time":"2018-09-01T00:00:00Z","timestamp":1535760000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61401273","61372049","61571300","61431008"],"award-info":[{"award-number":["61401273","61372049","61571300","61431008"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"JSPS KAKENHI","award":["JP16K00117","JP15K15976"],"award-info":[{"award-number":["JP16K00117","JP15K15976"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Big Data"],"published-print":{"date-parts":[[2018,9,1]]},"DOI":"10.1109\/tbdata.2016.2616146","type":"journal-article","created":{"date-parts":[[2016,10,10]],"date-time":"2016-10-10T18:08:36Z","timestamp":1476122916000},"page":"408-417","source":"Crossref","is-referenced-by-count":120,"title":["Big Data Analysis-Based Security Situational Awareness for Smart Grid"],"prefix":"10.1109","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2483-6980","authenticated-orcid":false,"given":"Jun","family":"Wu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3382-1652","authenticated-orcid":false,"given":"Kaoru","family":"Ota","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2788-3451","authenticated-orcid":false,"given":"Mianxiong","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Jianhua","family":"Li","sequence":"additional","affiliation":[]},{"given":"Hongkai","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","first-page":"474","article-title":"A quantitative\n forecast method of network-security-situation&#x2014;Based on the BP neural-network with genetic algorithm","author":"wang","year":"0","journal-title":"Proc 2nd Int Multisymposium Comput Comput Sci"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2011.62"},{"key":"ref11","first-page":"4c2-1?4c2-11","article-title":"Security situation\n management-developing a concept of operations and threat prediction capability","author":"kolev","year":"0","journal-title":"Proc IEEE\/AIAA 34th Dig Avionics Syst Conf"},{"key":"ref12","first-page":"377","article-title":"The network security situation predicting\n technology based on the small-world echo state network","author":"chen","year":"0","journal-title":"Proc 4th IEEE Int Conf Softw Eng Service Sci"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CICYBS.2011.5949399"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataService.2015.28"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2014.2361697"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2014.2373388"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2014.2356613"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TDC.2012.6281461"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/170035.170072"},{"year":"1998","key":"ref28","article-title":"DARPA 1998 intrusion detection evaluation"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2230199"},{"journal-title":"Prisoner's Dilemma","year":"1993","author":"poundstone","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2167354"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2010.2046654"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/11538059_112"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6574667"},{"key":"ref8","first-page":"24","article-title":"Multisensor data fusion for next generation distributed intrusion detection systems","author":"bass","year":"0","journal-title":"Proc IRIS Nat Symp Sensor Data Fus"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1177\/154193128803200221"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-013-1294-6"},{"key":"ref9","first-page":"2","article-title":"Topological analysis of network attack vulnerability","author":"jajodia","year":"0","journal-title":"Proc 2nd ACM Symp Inf Comput Commun Secur"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.101911.00087"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jebo.2003.12.004"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01507-6_87"},{"journal-title":"Behavioral Game Theory Experiments in Strategic Interaction","year":"2003","author":"camerer","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/BF00116251"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/0167-2681(86)90021-1"},{"journal-title":"Data Engineering Fuzzy Mathematics in Systems","year":"2001","author":"wolkenhauer","key":"ref26"},{"journal-title":"Graph Theory With Algorithms and Its Applications In Applied Science and Technology","year":"2013","author":"ray","key":"ref25"}],"container-title":["IEEE Transactions on Big Data"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6687317\/8449944\/07587350.pdf?arnumber=7587350","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:26:07Z","timestamp":1642004767000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7587350\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,1]]},"references-count":30,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tbdata.2016.2616146","relation":{},"ISSN":["2332-7790","2372-2096"],"issn-type":[{"type":"electronic","value":"2332-7790"},{"type":"electronic","value":"2372-2096"}],"subject":[],"published":{"date-parts":[[2018,9,1]]}}}