{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:15:25Z","timestamp":1759133725234,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,23]],"date-time":"2019-11-23T00:00:00Z","timestamp":1574467200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,23]]},"DOI":"10.1145\/3372422.3372427","type":"proceedings-article","created":{"date-parts":[[2020,2,7]],"date-time":"2020-02-07T23:20:13Z","timestamp":1581117613000},"page":"122-128","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A Constructive Multilevel Security System with Cryptographic Techniques by using Cyber-Physical System in the Space\/Defense Applications"],"prefix":"10.1145","author":[{"given":"Seelam Ch Vijaya","family":"Bhaskar","sequence":"first","affiliation":[{"name":"Department of IT, MVSR Engineering College, Hyderabad, India"}]},{"given":"Jagadam Vijay","family":"Gopal","sequence":"additional","affiliation":[{"name":"Charles Sturt University"}]},{"given":"Anitha","family":"S","sequence":"additional","affiliation":[{"name":"Department of ECE, ACS College of Engineering, Bangalore, India"}]}],"member":"320","published-online":{"date-parts":[[2020,2,7]]},"reference":[{"volume-title":"Yun-Chuan Guo \"A Multilevel Security Model for Wireless Sensor Networks\"","author":"Lee Chao","key":"e_1_3_2_1_1_1","unstructured":"Chao Lee , China Li-Hua Yin , Yun-Chuan Guo \"A Multilevel Security Model for Wireless Sensor Networks\" , Institute of Computing Technology Chinese Academy of Sciences, Graduate University of Chinese Academy of Sciences , Beijing, China , Chao Lee, China Li-Hua Yin, Yun-Chuan Guo \"A Multilevel Security Model for Wireless Sensor Networks\", Institute of Computing Technology Chinese Academy of Sciences, Graduate University of Chinese Academy of Sciences, Beijing, China,"},{"key":"e_1_3_2_1_2_1","unstructured":"http:\/\/www.Cryptosmith.Com\/mlslintro. \"MLS Introduction Cryptosmith. \"  http:\/\/www.Cryptosmith.Com\/mlslintro. \"MLS Introduction Cryptosmith. \""},{"key":"e_1_3_2_1_3_1","unstructured":"Mrs. Sharada Mangipudi J. Vijay Gopal Dr. P. Suresh Verma Dr. M.Srinivasa Rao \"Developing Multi Level Security System Using ESPTechnique By An Advanced Data Mining Concepts\". Abbrev. in press.  Mrs. Sharada Mangipudi J. Vijay Gopal Dr. P. Suresh Verma Dr. M.Srinivasa Rao \"Developing Multi Level Security System Using ESPTechnique By An Advanced Data Mining Concepts\". Abbrev. in press."},{"key":"e_1_3_2_1_4_1","unstructured":"http:\/\/technet.mircoso.comlem-us\/library\/cc959510.aspx \"Encapsulating Security Payload\"  http:\/\/technet.mircoso.comlem-us\/library\/cc959510.aspx \"Encapsulating Security Payload\""},{"volume-title":"Department of Computer Science","author":"Ng Raymond","key":"e_1_3_2_1_5_1","unstructured":"Raymond T. Ng , Simon Fraser \"Ef cient and Effective Clustering Methods for Spatial Data Mining\" , Department of Computer Science , Universityof BritishColumbia, Vancouver, B.C. , V6T 124, C ada, liawei Han School of Computing Sciences, University Bu aby, B.C., V5A IS6, Canada. Raymond T.Ng, Simon Fraser \"Ef cient and Effective Clustering Methods for Spatial Data Mining\", Department of Computer Science, Universityof BritishColumbia, Vancouver, B.C., V6T 124, C ada, liawei Han School of Computing Sciences, University Bu aby, B.C., V5A IS6, Canada."},{"key":"e_1_3_2_1_6_1","unstructured":"Micheline Kamber Jian Pei Simon \"Data Mining Concepts and Techniques\" by Jiawei Han University of Illinois at Urbana- Champaign Fraser University.  Micheline Kamber Jian Pei Simon \"Data Mining Concepts and Techniques\" by Jiawei Han University of Illinois at Urbana- Champaign Fraser University."},{"key":"e_1_3_2_1_7_1","unstructured":"Mrs. Sharada Mangipudi Dr.P.SureshVer a Dr. M.Srinivasa Rao \"Pragmatic  Mrs. Sharada Mangipudi Dr.P.SureshVer a Dr. M.Srinivasa Rao \"Pragmatic"},{"key":"e_1_3_2_1_8_1","unstructured":"Approach for Financial Networking System Using Cyber Physical Systems Through Advanced Data Mining Concepts\".  Approach for Financial Networking System Using Cyber Physical Systems Through Advanced Data Mining Concepts\"."},{"volume-title":"Center for Hybrid & Embedded So ware Syst","author":"E.A.","key":"e_1_3_2_1_9_1","unstructured":"Lee, E.A. EECS , Center for Hybrid & Embedded So ware Syst ., Univ. Of California at Berkeley, Berkeley, CA \"Cyber Physical Systems : Design \". Lee, E.A. EECS, Center for Hybrid & Embedded So ware Syst., Univ. Of California at Berkeley, Berkeley, CA \"Cyber Physical Systems: Design\"."},{"key":"e_1_3_2_1_10_1","volume-title":"Vo1.2, No.3","author":"Padhy Neelamadhab","year":"2012","unstructured":"Neelamadhab Padhy , Dr. Pragnyaban Mishra , and Rasmita Panigr i3 , ' The Survey of Data Mining Applications And Feature Scope\" (IJCSEIT) , Vo1.2, No.3 , June 2012 . Neelamadhab Padhy, Dr. Pragnyaban Mishra, and Rasmita Panigr i3, 'The Survey of Data Mining Applications And Feature Scope\" (IJCSEIT), Vo1.2, No.3, June 2012."},{"key":"e_1_3_2_1_11_1","unstructured":"Codd E.F. S.B.Codd C.T.Salley \"Providing OLAP (On-Line Analytical Processing) to User Analyst: An IT Mandate.\"Available from Arbor So ware's web site h p:\/\/www.arborso.com\/OLAP.html..  Codd E.F. S.B.Codd C.T.Salley \"Providing OLAP (On-Line Analytical Processing) to User Analyst: An IT Mandate.\"Available from Arbor So ware's web site h p:\/\/www.arborso.com\/OLAP.html.."},{"issue":"4","key":"e_1_3_2_1_12_1","first-page":"1994","article-title":"Barclay, T., R. Barnes, J. Gray, P. Sundaresan, \"Loading Databases using Data Flow Parallelism","volume":"23","author":"Warehouse Toolkit R. The Data","year":"1996","unstructured":"Kimball, R. The Data Warehouse Toolkit . John Wiley , 1996 . Barclay, T., R. Barnes, J. Gray, P. Sundaresan, \"Loading Databases using Data Flow Parallelism .\" SIGMOD Record , Vol. 23 , No. 4 , Dec. 1994 . Kimball, R. The Data Warehouse Toolkit. John Wiley, 1996. Barclay, T., R. Barnes, J. Gray, P. Sundaresan, \"Loading Databases using Data Flow Parallelism.\" SIGMOD Record, Vol. 23, No. 4, Dec.1994.","journal-title":"SIGMOD Record"},{"key":"e_1_3_2_1_13_1","unstructured":"Daron Acemoglu Asuman Ozdaglar Alireza Tahbaz-Salehi. \"Systemic Risk and Stability in Financial Networks\".  Daron Acemoglu Asuman Ozdaglar Alireza Tahbaz-Salehi. \"Systemic Risk and Stability in Financial Networks\"."},{"key":"e_1_3_2_1_14_1","unstructured":"Han Chen d Shaun Wang \"A Network Model Approach to Systemic Risk in the Financial System\" January 2013 Han Chen d Shaun Wang \"A Network Model Approach to Systemic Risk in the Financial System\" January 2013"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Castren O. And Kavonius I. K. \"Balance Sheet Interlinkages and Macro- n cial Risk Analysis in the Euro Area.\" European Central B k Working Paper Series 1124 December 2009. Abbrev. in press.  Castren O. And Kavonius I. K. \"Balance Sheet Interlinkages and Macro- n cial Risk Analysis in the Euro Area.\" European Central B k Working Paper Series 1124 December 2009. Abbrev. in press.","DOI":"10.2139\/ssrn.1516167"},{"key":"e_1_3_2_1_16_1","volume-title":"ISO 9001:2008 Certi ed Journal","author":"Emerging Technology International Journal","year":"2013","unstructured":"International Journal of Emerging Technology and Advanced Engineering Web Site : www.ijetae.com (ISSN 2250-2459 , ISO 9001:2008 Certi ed Journal , Volume 3 , Issue 8, August 2013 ) International Journal of Emerging Technology and Advanced Engineering Web Site: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certi ed Journal, Volume 3, Issue 8, August 2013)"},{"volume-title":"Conference on Information Technology","author":"Chitra K.","key":"e_1_3_2_1_17_1","unstructured":"K. Chitra , B. Subashini ,\"International Conference on Information Technology , Alzaytoonah University, Amman, Jordan, www.zuj.edujo\/conferences\/icitll\/paperlist\/Papers\/ K. Chitra, B. Subashini,\"International Conference on Information Technology, Alzaytoonah University, Amman, Jordan, www.zuj.edujo\/conferences\/icitll\/paperlist\/Papers\/"},{"key":"e_1_3_2_1_18_1","volume-title":"International Journal of Scienti c & Engineering Research (IJSER)","author":"Chitra K.","year":"2013","unstructured":"K. Chitra , B. Subashini , Automatic Credit Approval uses Classi cation Method , International Journal of Scienti c & Engineering Research (IJSER) , Volume 4 , Issue 7, July - 2013 -2027 ISSN 2229-5518. K. Chitra, B. Subashini, Automatic Credit Approval uses Classi cation Method, International Journal of Scienti c & Engineering Research (IJSER), Volume 4, Issue 7, July-2013-2027 ISSN 2229-5518."},{"key":"e_1_3_2_1_19_1","first-page":"738","volume-title":"Mar-Apr 2012","author":"Moin Kazi Imran","unstructured":"Kazi Imran Moin , Dr. Qazi Baser Ahmed I International Journal of Engineering Research d Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 2 , Mar-Apr 2012 , pp. 738 -- 742 -7381 P a g e Use of Data Mining in B king. Kazi Imran Moin, Dr. Qazi Baser Ahmed I International Journal of Engineering Research d Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 2, Mar-Apr 2012, pp. 738--742-7381 P a g e Use of Data Mining in B king."},{"key":"e_1_3_2_1_20_1","volume-title":"International Journal of Computer Science and Technology","author":"Data Vivek Bhambri","year":"2011","unstructured":"Vivek Bhambri \"Application of Data Mining in Banking Sector\" , International Journal of Computer Science and Technology Vol. 2 , Issue 2, June 2011 . Vivek Bhambri \"Application of Data Mining in Banking Sector\", International Journal of Computer Science and Technology Vol. 2, Issue 2, June 2011."}],"event":{"name":"CIIS 2019: 2019 The 2nd International Conference on Computational Intelligence and Intelligent Systems","sponsor":["Queensland University of Technology","City University of Hong Kong City University of Hong Kong"],"location":"Bangkok Thailand","acronym":"CIIS 2019"},"container-title":["Proceedings of the 2019 2nd International Conference on Computational Intelligence and Intelligent Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372422.3372427","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372422.3372427","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:21Z","timestamp":1750197741000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372422.3372427"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,23]]},"references-count":20,"alternative-id":["10.1145\/3372422.3372427","10.1145\/3372422"],"URL":"https:\/\/doi.org\/10.1145\/3372422.3372427","relation":{},"subject":[],"published":{"date-parts":[[2019,11,23]]},"assertion":[{"value":"2020-02-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}