{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:07Z","timestamp":1750220887420,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T00:00:00Z","timestamp":1573776000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,15]]},"DOI":"10.1145\/3371676.3371677","type":"proceedings-article","created":{"date-parts":[[2020,1,14]],"date-time":"2020-01-14T04:40:36Z","timestamp":1578976836000},"page":"103-108","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Deep Security Analysis of DCS for Ship's Nuclear Power System based on Improved DEMATEL"],"prefix":"10.1145","author":[{"given":"Yu","family":"Kun","sequence":"first","affiliation":[{"name":"China Ship Development and Design Center, Wuhan, Hubei Province"}]}],"member":"320","published-online":{"date-parts":[[2020,1,13]]},"reference":[{"volume-title":"An introduction to ship technology and design. National defense industry press","author":"Shao K.W.","key":"e_1_3_2_1_1_1","unstructured":"Shao , K.W. , Ma Y.Y. 2005. An introduction to ship technology and design. National defense industry press . Beijing , 172--174. Shao, K.W., Ma Y.Y.2005. An introduction to ship technology and design. National defense industry press. Beijing, 172--174."},{"key":"e_1_3_2_1_2_1","unstructured":"Valley Star Network Technology Co. Ltd. 2015. Industrial control network security series iv: typical industrial control system network security events. Microcomputers and applications 34 (05) 1--5.  Valley Star Network Technology Co. Ltd. 2015. Industrial control network security series iv: typical industrial control system network security events. Microcomputers and applications 34 (05) 1--5."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Li H.F. Liu F. Hou Y.H. 2010. Railway hazardous articles monitoring system based on wireless sensor network. Information engineering and computer science(ICIECS) (16): 1--4.  Li H.F. Liu F. Hou Y.H. 2010. Railway hazardous articles monitoring system based on wireless sensor network. Information engineering and computer science(ICIECS) (16): 1--4.","DOI":"10.1109\/ICIECS.2010.5677835"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Patel Sandip C. Sanyal Pritimoy.2003. Secring SCADA systems. Information management and computer security 16(4) 398--414.  Patel Sandip C. Sanyal Pritimoy.2003. Secring SCADA systems. Information management and computer security 16(4) 398--414.","DOI":"10.1108\/09685220810908804"},{"issue":"01","key":"e_1_3_2_1_5_1","first-page":"186","article-title":"The research of Industry control network security defense system","volume":"22","author":"Li P.","year":"2019","unstructured":"Li , P. , Li , C.C. 2019 . The research of Industry control network security defense system . China Management Informationization , 22 ( 01 ), 186 -- 188 . Li, P., Li, C.C.2019.The research of Industry control network security defense system. China Management Informationization, 22(01), 186--188.","journal-title":"China Management Informationization"},{"key":"e_1_3_2_1_6_1","unstructured":"Zhang Y.Q. Gao S.W. Wang F. Jianghao Bian J.H.2018. Summary of research on security technology of industrial control system Xian 57--62.  Zhang Y.Q. Gao S.W. Wang F. Jianghao Bian J.H.2018. Summary of research on security technology of industrial control system Xian 57--62."},{"key":"e_1_3_2_1_7_1","unstructured":"Gan X.R.2018.Design of information security for industrial control system based on defense in depth. Industrial control computer 31(10) 38--39.  Gan X.R.2018.Design of information security for industrial control system based on defense in depth. Industrial control computer 31(10) 38--39."},{"key":"e_1_3_2_1_8_1","unstructured":"Yang W. Zhou Q.2018. Industrial control system security and countermeasures. Cyberspace security 09(07) 60--63.  Yang W. Zhou Q.2018. Industrial control system security and countermeasures. Cyberspace security 09(07) 60--63."},{"key":"e_1_3_2_1_9_1","unstructured":"Tao Y.D. Jia X.T.2018. Research on industrial control system cyber security situation awareness framework. Information technology and network security 05 3--6.  Tao Y.D. Jia X.T.2018. Research on industrial control system cyber security situation awareness framework. Information technology and network security 05 3--6."},{"key":"e_1_3_2_1_10_1","unstructured":"Lu G.G. 2018. The analysis of present situation and future threats for the industrial control security in China. Cyberspace security 9(3):1--7.  Lu G.G. 2018. The analysis of present situation and future threats for the industrial control security in China. Cyberspace security 9(3):1--7."},{"issue":"5","key":"e_1_3_2_1_11_1","first-page":"61","article-title":"Application of DEMATEL algorithm in identification key factors of complex security system","volume":"38","author":"Zhang Y.Y.","year":"2018","unstructured":"Zhang , Y.Y. , Chen , X.B. , Wang , M. , Zhang , J.E. , Zhao , B. 2018 . Application of DEMATEL algorithm in identification key factors of complex security system . Journal of Liaoning Shihua University , 38 ( 5 ), 61 -- 66 . Zhang, Y.Y., Chen, X.B., Wang, M., Zhang, J.E., Zhao, B.2018. Application of DEMATEL algorithm in identification key factors of complex security system. Journal of Liaoning Shihua University, 38(5), 61--66.","journal-title":"Journal of Liaoning Shihua University"},{"key":"e_1_3_2_1_12_1","unstructured":"Geng X.L. Dong X.Q. Xu S.D. 2018.Concept evaluation approach based on gray incidence analysis and cloud model. Application research of computers 35(8) 2351--2354 2359.  Geng X.L. Dong X.Q. Xu S.D. 2018.Concept evaluation approach based on gray incidence analysis and cloud model. Application research of computers 35(8) 2351--2354 2359."},{"issue":"1","key":"e_1_3_2_1_13_1","first-page":"132","article-title":"Scale model for judgment linguistic of paired comparison based on psychophysics law","volume":"39","author":"Yu K.","year":"2017","unstructured":"Yu , K. 2017 . Scale model for judgment linguistic of paired comparison based on psychophysics law . Systems Engineering and Electronics , 39 ( 1 ), 132 -- 137 . Yu, K. 2017. Scale model for judgment linguistic of paired comparison based on psychophysics law. Systems Engineering and Electronics, 39(1), 132--137.","journal-title":"Systems Engineering and Electronics"}],"event":{"name":"ICCNS 2019: 2019 the 9th International Conference on Communication and Network Security","sponsor":["University of Tokyo","Chongqing University of Posts and Telecommunications"],"location":"Chongqing China","acronym":"ICCNS 2019"},"container-title":["Proceedings of the 2019 9th International Conference on Communication and Network Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3371676.3371677","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3371676.3371677","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:23Z","timestamp":1750203863000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3371676.3371677"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,15]]},"references-count":13,"alternative-id":["10.1145\/3371676.3371677","10.1145\/3371676"],"URL":"https:\/\/doi.org\/10.1145\/3371676.3371677","relation":{},"subject":[],"published":{"date-parts":[[2019,11,15]]},"assertion":[{"value":"2020-01-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}