{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:22Z","timestamp":1750220362010,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,27]],"date-time":"2020-10-27T00:00:00Z","timestamp":1603756800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61703426"],"award-info":[{"award-number":["61703426"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10,27]]},"DOI":"10.1145\/3437802.3437837","type":"proceedings-article","created":{"date-parts":[[2021,1,5]],"date-time":"2021-01-05T06:24:42Z","timestamp":1609827882000},"page":"207-212","source":"Crossref","is-referenced-by-count":0,"title":["Hierarchical Network Security Situation Prediction Based on Belief Rule Base"],"prefix":"10.1145","author":[{"given":"Qingshuang","family":"Hu","sequence":"first","affiliation":[{"name":"Air Force Engineering University, China"}]},{"given":"Yibiao","family":"Fang","sequence":"additional","affiliation":[{"name":"Air Force Engineering University, China"}]},{"given":"Yimeng","family":"Li","sequence":"additional","affiliation":[{"name":"Air Force Engineering University, China"}]},{"given":"Chenghai","family":"Li","sequence":"additional","affiliation":[{"name":"Air Force Engineering University, China"}]},{"given":"Zilong","family":"Wang","sequence":"additional","affiliation":[{"name":"Air Force Engineering University, China"}]},{"given":"Yanqiang","family":"Tang","sequence":"additional","affiliation":[{"name":"Air Force Engineering University, China"}]},{"given":"Yu","family":"Yang","sequence":"additional","affiliation":[{"name":"Air Force Engineering University, China"}]}],"member":"320","published-online":{"date-parts":[[2021,1,4]]},"reference":[{"issue":"2","key":"e_1_3_2_1_1_1","first-page":"10","article-title":"Network Security Situation Assessment and Prediction Method based on HMM","volume":"17","author":"Wu T.","year":"2018","unstructured":"T. Wu , Y. F. Qiao , S. F. Zhu , , \u201c Network Security Situation Assessment and Prediction Method based on HMM ,\u201d Navigation and Control , vol. 17 , no. 2 , pp. 10 - 17 , Apr 2018 . T. Wu, Y. F. Qiao, S. F. Zhu, , \u201cNetwork Security Situation Assessment and Prediction Method based on HMM,\u201d Navigation and Control, vol. 17, no.2, pp.10-17, Apr 2018.","journal-title":"Navigation and Control"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2018.5147"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10845-014-0978-4"},{"issue":"6","key":"e_1_3_2_1_4_1","first-page":"130","article-title":"Network security situation awareness model based on Bayesian approach","volume":"46","author":"H. D.","year":"2020","unstructured":"H. D. DING, H. H. XU, R. DUAN, and F. CHEN , \u201c Network security situation awareness model based on Bayesian approach ,\u201d Computer engineering , vol. 46 , no. 6 , pp. 130 - 135 , Jun 2020 . H. D. DING, H. H. XU, R. DUAN, and F. CHEN, \u201cNetwork security situation awareness model based on Bayesian approach,\u201d Computer engineering, vol. 46, no. 6, pp. 130-135, Jun 2020.","journal-title":"Computer engineering"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2524404"},{"issue":"5","key":"e_1_3_2_1_6_1","first-page":"173","article-title":"Research on Ontology based Knowledge Base Model of Network Security Situation Elements","volume":"42","author":"Si C.","year":"2015","unstructured":"C. Si , H. Q. Zhang , Y. W. Wang , , \u201c Research on Ontology based Knowledge Base Model of Network Security Situation Elements ,\u201d Computer Science , vol. 42 , no. 5 , pp. 173 - 177 , May 2015 . C. Si, H. Q. Zhang, Y. W. Wang, , \u201cResearch on Ontology based Knowledge Base Model of Network Security Situation Elements,\u201d Computer Science, vol. 42, no. 5, pp. 173-177, May 2015.","journal-title":"Computer Science"},{"issue":"2","key":"e_1_3_2_1_7_1","first-page":"393","article-title":"Construction and Analysis of Network Security Situational Awareness Model Based on Colored Petri nets","volume":"47","author":"Hui X. Y.","year":"2019","unstructured":"X. Y. Hui , J. H. Liu , H. Liu . , \u201c Construction and Analysis of Network Security Situational Awareness Model Based on Colored Petri nets ,\u201d Computer and Digital Engineering , vol. 47 , no. 2 , pp. 393 - 396 +401, Mar 2019 . X. Y. Hui, J. H. Liu, H. Liu., \u201cConstruction and Analysis of Network Security Situational Awareness Model Based on Colored Petri nets,\u201d Computer and Digital Engineering, vol. 47, no. 2, pp. 393-396+401, Mar 2019.","journal-title":"Computer and Digital Engineering"},{"issue":"6","key":"e_1_3_2_1_8_1","first-page":"86","article-title":"Application of improved convolutional neural network for network security situation prediction","volume":"55","author":"Zhang R. C.","year":"2019","unstructured":"R. C. Zhang , Y. C. Zhang , J. Liu , , \u201c Application of improved convolutional neural network for network security situation prediction ,\u201d Computer Engineering and Applications , vol. 55 , no. 6 , pp. 86 - 93 , Apr 2019 . R. C. Zhang, Y. C. Zhang, J. Liu, , \u201cApplication of improved convolutional neural network for network security situation prediction,\u201d Computer Engineering and Applications, vol. 55, no. 6, pp. 86-93, Apr 2019.","journal-title":"Computer Engineering and Applications"},{"issue":"5","key":"e_1_3_2_1_9_1","first-page":"78","article-title":"A Network Security Situation Prediction Model based on GSA-SVM","volume":"19","author":"Y. X.","year":"2018","unstructured":"Y. X. CHEN, X. C. YIN, and R. TAN , \u201c A Network Security Situation Prediction Model based on GSA-SVM ,\u201d Journal of Air Force University of Engineering (Natural Science) , vol. 19 , no. 5 , pp. 78 - 83 , Oct 2018 . Y. X. CHEN, X. C. YIN, and R. TAN, \u201cA Network Security Situation Prediction Model based on GSA-SVM,\u201d Journal of Air Force University of Engineering (Natural Science), vol.19, no.5, pp.78-83, Oct 2018.","journal-title":"Journal of Air Force University of Engineering (Natural Science)"},{"issue":"3","key":"e_1_3_2_1_10_1","first-page":"232","article-title":"Method based on adaptive Grey Wells Model","volume":"47","author":"Wang H.","year":"2018","unstructured":"H. Wang , \u201cC4 ISR Security Situation Prediction Method based on adaptive Grey Wells Model ,\u201d Journal of Inner Mongolia Normal University , vol. 47 , no. 3 , pp. 232 - 236 , Nov 2018 . H. Wang, \u201cC4ISR Security Situation Prediction Method based on adaptive Grey Wells Model,\u201d Journal of Inner Mongolia Normal University, vol. 47, no. 3, pp. 232-236, Nov 2018.","journal-title":"Journal of Inner Mongolia Normal University"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2005.851270"},{"issue":"2","key":"e_1_3_2_1_12_1","first-page":"59","article-title":"Network Security Situation Assessment based on Improved Bayesian Network","volume":"10","author":"Li M.","year":"2018","unstructured":"M. Li , \u201c Network Security Situation Assessment based on Improved Bayesian Network ,\u201d Journal of Nanyang Institute of Technology , vol. 10 , no. 2 , pp. 59 - 62 , 2018 . M. Li, \u201cNetwork Security Situation Assessment based on Improved Bayesian Network,\u201d Journal of Nanyang Institute of Technology, vol. 10, no. 2, pp. 59-62, 2018.","journal-title":"Journal of Nanyang Institute of Technology"},{"issue":"7","key":"e_1_3_2_1_13_1","first-page":"1926","article-title":"Network Security situation Assessment Method based on BP Neural Network Optimized by Cuckoo search","volume":"37","author":"L. X.","year":"2017","unstructured":"L. X. XIE, and Z. H. WANG , \u201c Network Security situation Assessment Method based on BP Neural Network Optimized by Cuckoo search ,\u201d Computer Applications , vol. 37 , no. 7 , pp. 1926 - 1930 , Jul 2017 . L. X. XIE, and Z. H. WANG, \u201cNetwork Security situation Assessment Method based on BP Neural Network Optimized by Cuckoo search,\u201d Computer Applications, vol. 37, no.7, pp. 1926-1930, Jul 2017.","journal-title":"Computer Applications"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2018.5147"},{"key":"e_1_3_2_1_15_1","unstructured":"Q. S. Hu C. H. LI Y. L. LU \u201cNetwork Security Situation Prediction Method based on hierarchical Optimization Confidence Rule Base \u201d Computer engineering to be published. DOI: 10.19678\/j.issn.1000-3428.0059022.    10.19678\/j.issn.1000-3428.0059022\nQ. S. Hu C. H. LI Y. L. LU \u201cNetwork Security Situation Prediction Method based on hierarchical Optimization Confidence Rule Base \u201d Computer engineering to be published. DOI: 10.19678\/j.issn.1000-3428.0059022."},{"issue":"5","key":"e_1_3_2_1_16_1","first-page":"56","article-title":"Research on Network Security Situation Prediction by Improving PSO to Optimize RBF","volume":"37","author":"Y.","year":"2018","unstructured":"Y. JIANG, C. H. LI, X. H. WEI , , \u201c Research on Network Security Situation Prediction by Improving PSO to Optimize RBF ,\u201d Measurement and Control Technology , vol. 37 , no. 5 , pp. 56 - 60 , May 2018 . Y. JIANG, C. H. LI, X. H. WEI, , \u201cResearch on Network Security Situation Prediction by Improving PSO to Optimize RBF,\u201d Measurement and Control Technology, vol.37, no.5, pp. 56-60, May 2018.","journal-title":"Measurement and Control Technology"},{"issue":"7","key":"e_1_3_2_1_17_1","first-page":"1926","article-title":"Network Security situation Assessment Method based on BP Neural Network Optimized by Cuckoo search","volume":"37","author":"L. X.","year":"2017","unstructured":"L. X. XIE, and Z. H. WANG , \u201c Network Security situation Assessment Method based on BP Neural Network Optimized by Cuckoo search ,\u201d Computer Applications , vol. 37 , no. 7 , pp. 1926 - 1930 , Jul 2017 . L. X. XIE, and Z. H. WANG, \u201cNetwork Security situation Assessment Method based on BP Neural Network Optimized by Cuckoo search,\u201d Computer Applications, vol. 37, no.7, pp. 1926-1930, Jul 2017.","journal-title":"Computer Applications"}],"event":{"name":"CCRIS 2020: 2020 International Conference on Control, Robotics and Intelligent System","acronym":"CCRIS 2020","location":"Xiamen China"},"container-title":["2020 International Conference on Control, Robotics and Intelligent System"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3437802.3437837","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3437802.3437837","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:26Z","timestamp":1750191446000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3437802.3437837"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,27]]},"references-count":17,"alternative-id":["10.1145\/3437802.3437837","10.1145\/3437802"],"URL":"https:\/\/doi.org\/10.1145\/3437802.3437837","relation":{},"subject":[],"published":{"date-parts":[[2020,10,27]]}}}