{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:21:51Z","timestamp":1759134111502,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":19,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1145\/3335484.3335486","type":"proceedings-article","created":{"date-parts":[[2019,7,8]],"date-time":"2019-07-08T16:54:49Z","timestamp":1562604889000},"page":"194-197","source":"Crossref","is-referenced-by-count":7,"title":["Network Security Situation Factor Extraction Based on Random Forest of Information Gain"],"prefix":"10.1145","author":[{"given":"Yongcheng","family":"Duan","sequence":"first","affiliation":[{"name":"College of Information Technology and Network Security, People's Public Security University of China, Beijing, China"}]},{"given":"Xin","family":"Li","sequence":"additional","affiliation":[{"name":"College of Information Technology and Network Security, People's Public Security University of China, Beijing, China"}]},{"given":"Xue","family":"Yang","sequence":"additional","affiliation":[{"name":"College of Information Technology and Network Security, People's Public Security University of China, Beijing, China"}]},{"given":"Le","family":"Yang","sequence":"additional","affiliation":[{"name":"College of Information Technology and Network Security, People's Public Security University of China, Beijing, China"}]}],"member":"320","reference":[{"key":"key-10.1145\/3335484.3335486-1","unstructured":"Gong J, Zang XD, Su Q, Hu XY, Xu J. Survey of Network Security Situation Awareness[J]. Journal of Software, 2017, 28(4): 1010--1026(in Chinese).DOI=http:\/\/www.jos.org.cn\/1000-9825\/5142.htm."},{"key":"key-10.1145\/3335484.3335486-2","unstructured":"Bass T, Gruber D. A glimpse into the future of id[J]. login:: the magazine of USENIX & SAGE, 1999, 24:p&#225;gs. 40--45."},{"key":"key-10.1145\/3335484.3335486-3","unstructured":"Yurcik W. Visualizing NetFlows for security at line speed: the SIFT tool suite[C]\/\/ Conference on Systems Administration. DBLP, 2005: 169--176."},{"key":"key-10.1145\/3335484.3335486-4","doi-asserted-by":"crossref","unstructured":"Lau S. The Spinning Cube of Potential Doom.[J]. Comm Acm, 2004, 47(6):p&#225;gs. 25--26.","DOI":"10.1145\/990680.990699"},{"key":"key-10.1145\/3335484.3335486-5","doi-asserted-by":"crossref","unstructured":"Li D, Liu Z. Situation element extraction of network security based on Logistic Regression and Improved Particle Swarm Optimization[C]\/\/Natural Computation (ICNC), 2013 Ninth International Conference on. IEEE, 2013: 569--573.","DOI":"10.1109\/ICNC.2013.6818041"},{"key":"key-10.1145\/3335484.3335486-6","doi-asserted-by":"crossref","unstructured":"Huiqiang Wang, Ying Liang, Haizhi Ye. An Extraction Method of situation Factors for Network Security situation Awareness[P]. Internet Computing in Science and Engineering, 2008. ICICSE '08. International Conference on,2008.","DOI":"10.1109\/ICICSE.2008.53"},{"key":"key-10.1145\/3335484.3335486-7","unstructured":"Si Cheng,Zhang Hongqi,Wang Yongwei,Yang Yingjie.Research on Knowledge Base Model of Network Security Situational Elements Based on Ontology[J].Computer Science,2015,42(05): 173--177."},{"key":"key-10.1145\/3335484.3335486-8","unstructured":"LIU Xiao-Wu, WANG Hui-Qiang,L&#252; Hong-Wu,YU Ji-Guo,ZHANG Shu-Wen Fusion-Based Cognitive Awareness-Control Model for Network Security Situation[J]. Journal of Software, 2016, 27(8): 2099--2114(in Chinese).DOI=http:\/\/www.jos.org.cn\/1000-9825\/4611.htm."},{"key":"key-10.1145\/3335484.3335486-9","unstructured":"9Guo Jian. Research on the acquisition technology of situational factors in network security situational awareness[D]. Northeastern University, 2011."},{"key":"key-10.1145\/3335484.3335486-10","unstructured":"10Lai Jibao,Wang Ying,Wang Huiqiang,Zheng Fengbin,Zhou Bing.Research on the Structure of Network Security Situation Awareness System Based on Multi-source Heterogeneous Sensors[J].Computer Science,2011,38(03): 144--149+158."},{"key":"key-10.1145\/3335484.3335486-11","unstructured":"LIN Weining, CHEN Mingzhi, ZHAN Yunqing, et al. Research on an Intrusion Detection Algorithm Based on PCA and Random-forest Classification[J].Netinfo Security,2017(11): 50--54."},{"key":"key-10.1145\/3335484.3335486-12","unstructured":"Liang Ying,Wang Huiqiang,Lai Jibao.A Network Security Situational Awareness Method Based on Rough Set Theory[J].Computer Science,2007(08): 95--97+147."},{"key":"key-10.1145\/3335484.3335486-13","unstructured":"Li Hong. Research on Extraction of Network Security Situation Factors Based on Rough Sets[D].Hebei Normal University, 2017."},{"key":"key-10.1145\/3335484.3335486-14","unstructured":"Kwok SW, Carter C. Multiple decision trees[EB\/OL].[2018-01-31].https:\/\/arxiv.org\/abs\/1304.2363"},{"key":"key-10.1145\/3335484.3335486-15","doi-asserted-by":"crossref","unstructured":"Ho TK. The random subspace method for constructing decision forests[J]. IEEE transactions on pattern analysis and machine intelligence, 1998, 20(8): 832--44","DOI":"10.1109\/34.709601"},{"key":"key-10.1145\/3335484.3335486-16","doi-asserted-by":"crossref","unstructured":"Quinlan JR. Induction of decision trees[J]. Machine learning, 1986, 1(1): 81--106","DOI":"10.1007\/BF00116251"},{"key":"key-10.1145\/3335484.3335486-17","unstructured":"Quinlan JR. C4. 5: programs for machine learning[M].Elsevier, 2014"},{"key":"key-10.1145\/3335484.3335486-18","unstructured":"Breiman L,Friedman J,Stone C J,et al.Classification and Regression Trees[M]. CRC press, 1984"},{"key":"key-10.1145\/3335484.3335486-19","unstructured":"QI Ben, WANG Mengdi. A Method Using Information Gain and Naive Bayes to Extract Network Situation Information [J]. Netinfo Security, 2017(9): 54--57"}],"event":{"number":"4","sponsor":["Shenzhen University","Sun Yat-Sen University"],"acronym":"ICBDC 2019","name":"the 2019 4th International Conference","start":{"date-parts":[[2019,5,10]]},"location":"Guangzhou, China","end":{"date-parts":[[2019,5,12]]}},"container-title":["Proceedings of the 2019 4th International Conference on Big Data and Computing  - ICBDC 2019"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3335484.3335486","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3335486&ftid=2070072&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:19Z","timestamp":1750206379000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3335484.3335486"}},"subtitle":[],"proceedings-subject":"Big Data and Computing","short-title":[],"issued":{"date-parts":[[2019]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1145\/3335484.3335486","relation":{},"subject":[],"published":{"date-parts":[[2019]]}}}