{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:21:16Z","timestamp":1750220476069,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T00:00:00Z","timestamp":1632441600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,9,24]]},"DOI":"10.1145\/3482632.3487515","type":"proceedings-article","created":{"date-parts":[[2021,11,22]],"date-time":"2021-11-22T17:26:58Z","timestamp":1637602018000},"page":"2787-2790","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Hierarchical Quantitative Assessment Method of Network Security Threat Situation"],"prefix":"10.1145","author":[{"given":"Xinlin","family":"Liu","sequence":"first","affiliation":[{"name":"Shenzhen Power Grid, China"}]},{"given":"Wei","family":"Deng","sequence":"additional","affiliation":[{"name":"Shenzhen Power Grid, China"}]},{"given":"Ping","family":"Huang","sequence":"additional","affiliation":[{"name":"Shenzhen Power Grid, China"}]}],"member":"320","published-online":{"date-parts":[[2021,11,22]]},"reference":[{"issue":"12","key":"e_1_3_2_1_1_1","first-page":"8","article-title":"Network Security Situation Awareness Based on Machine Learning","volume":"10","author":"Yi Yang","year":"2020","unstructured":"Yang Yi , Bian Yuan , Zhang Tianqiao . Network Security Situation Awareness Based on Machine Learning . Computer Science and Application , 2020 , 10 ( 12 ): 8 Yang Yi, Bian Yuan, Zhang Tianqiao. Network Security Situation Awareness Based on Machine Learning. Computer Science and Application, 2020, 10 (12): 8","journal-title":"Computer Science and Application"},{"key":"e_1_3_2_1_2_1","first-page":"70","volume":"23","author":"Zhiyong Li","year":"2016","unstructured":"Li Zhiyong . Hierarchical Network Security Threat Situation Quantitative Assessment Method. Communication World , 2016 , 23 : 70 - 70 Li Zhiyong. Hierarchical Network Security Threat Situation Quantitative Assessment Method. Communication World, 2016, 23: 70-70","journal-title":"Hierarchical Network Security Threat Situation Quantitative Assessment Method. Communication World"},{"key":"e_1_3_2_1_3_1","first-page":"107","article-title":"Analysis of Secure Routing Protocols for Wireless Sensor Networks","volume":"29","author":"Wenji Hu","year":"2006","unstructured":"Hu Wenji , Xu Mingwei . Analysis of Secure Routing Protocols for Wireless Sensor Networks . Journal of Beijing University of Posts and Telecommunications , 2006 , 29 (s1): 107 - 111 Hu Wenji, Xu Mingwei. Analysis of Secure Routing Protocols for Wireless Sensor Networks. Journal of Beijing University of Posts and Telecommunications, 2006, 29 (s1): 107-111","journal-title":"Journal of Beijing University of Posts and Telecommunications"},{"issue":"3","key":"e_1_3_2_1_4_1","first-page":"353","article-title":"Network Security Situation Assessment Model Based on Information Fusion","volume":"46","author":"Yonglian Wei","year":"2009","unstructured":"Wei Yonglian , Yi Feng , Feng Dengguo , Yong W, Yifeng L . Network Security Situation Assessment Model Based on Information Fusion . Computer Research and Development , 2009 , 46 ( 3 ): 353 - 362 Wei Yonglian, Yi Feng, Feng Dengguo, Yong W, Yifeng L. Network Security Situation Assessment Model Based on Information Fusion. Computer Research and Development, 2009, 46 (3): 353-362","journal-title":"Computer Research and Development"},{"issue":"12","key":"e_1_3_2_1_5_1","first-page":"945","article-title":"A Network Security Real-time Risk Detection Method Based on Artificial Immune","volume":"31","author":"Guoguang Xu","year":"2005","unstructured":"Xu Guoguang , Li Tao , Wang Yifeng . A Network Security Real-time Risk Detection Method Based on Artificial Immune . Computer Engineering , 2005 , 31 ( 12 ): 945 - 949 Xu Guoguang, Li Tao, Wang Yifeng. A Network Security Real-time Risk Detection Method Based on Artificial Immune. Computer Engineering, 2005,31 (12): 945-949","journal-title":"Computer Engineering"},{"issue":"004","key":"e_1_3_2_1_6_1","first-page":"817","article-title":"Network Security Evaluation and Optimal Active Defense Based on Attack Defense Game Model","volume":"32","author":"Wei Jiang","year":"2009","unstructured":"Jiang Wei , Fang Binxing , Tian Zhihong . Network Security Evaluation and Optimal Active Defense Based on Attack Defense Game Model . Acta Computer Sinica , 2009 , 32 ( 004 ): 817 - 827 Jiang Wei, Fang Binxing, Tian Zhihong. Network Security Evaluation and Optimal Active Defense Based on Attack Defense Game Model. Acta Computer Sinica, 2009, 32 (004): 817-827","journal-title":"Acta Computer Sinica"},{"key":"e_1_3_2_1_7_1","first-page":"314","article-title":"Stochastic Model Method and Evaluation Technology of Network Security","volume":"4","author":"Yongqing Miao","year":"2017","unstructured":"Miao Yongqing . Stochastic Model Method and Evaluation Technology of Network Security . China Science and Technology Investment , 2017 , 4 : 314 Miao Yongqing. Stochastic Model Method and Evaluation Technology of Network Security. China Science and Technology Investment, 2017, 4: 314","journal-title":"China Science and Technology Investment"},{"issue":"14","key":"e_1_3_2_1_8_1","first-page":"169","article-title":"Research on Computer Network Security Teaching Mode for Postgraduates under the Background of New Engineering","volume":"3","author":"Zhou Yi Hua","year":"2020","unstructured":"Yi Hua Zhou , Wei Min Shi , Wei Ma . Research on Computer Network Security Teaching Mode for Postgraduates under the Background of New Engineering . Innovation and Practice of Teaching Methods , 2020 , 3 ( 14 ): 169 Yi Hua Zhou, Wei Min Shi, Wei Ma. Research on Computer Network Security Teaching Mode for Postgraduates under the Background of New Engineering. Innovation and Practice of Teaching Methods, 2020, 3 (14): 169","journal-title":"Innovation and Practice of Teaching Methods"},{"issue":"9","key":"e_1_3_2_1_9_1","first-page":"34","article-title":"Two Quantitative Analysis Methods for Survivability of Network Security Management Systems","volume":"25","author":"Xiuguo Bao","year":"2004","unstructured":"Bao Xiuguo , Hu Mingzeng , Zhang Hongli . Two Quantitative Analysis Methods for Survivability of Network Security Management Systems . Acta Communication Sinica , 2004 , 25 ( 9 ): 34 - 41 Bao Xiuguo, Hu Mingzeng, Zhang Hongli. Two Quantitative Analysis Methods for Survivability of Network Security Management Systems. Acta Communication Sinica, 2004, 25 (9): 34-41","journal-title":"Acta Communication Sinica"},{"issue":"04","key":"e_1_3_2_1_10_1","first-page":"793","volume":"2009","author":"Weiming Li","unstructured":"Li Weiming , Lei Jie , Dong Jing. An Optimized Real-time Network Security Risk Quantification Method. Acta Computa Sinica , 2009 ( 04 ): 793 - 804 Li Weiming, Lei Jie, Dong Jing. An Optimized Real-time Network Security Risk Quantification Method. Acta Computa Sinica, 2009 (04): 793-804","journal-title":"Dong Jing. An Optimized Real-time Network Security Risk Quantification Method. Acta Computa Sinica"}],"event":{"name":"ICISCAE 2021: 2021 IEEE 4th International Conference on Information Systems and Computer Aided Education","acronym":"ICISCAE 2021","location":"Dalian China"},"container-title":["2021 4th International Conference on Information Systems and Computer Aided Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3482632.3487515","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3482632.3487515","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:44Z","timestamp":1750193324000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3482632.3487515"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,24]]},"references-count":10,"alternative-id":["10.1145\/3482632.3487515","10.1145\/3482632"],"URL":"https:\/\/doi.org\/10.1145\/3482632.3487515","relation":{},"subject":[],"published":{"date-parts":[[2021,9,24]]},"assertion":[{"value":"2021-11-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}