{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:33Z","timestamp":1750220253822,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,2,24]],"date-time":"2022-02-24T00:00:00Z","timestamp":1645660800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,2,24]]},"DOI":"10.1145\/3523181.3523192","type":"proceedings-article","created":{"date-parts":[[2022,4,18]],"date-time":"2022-04-18T23:57:42Z","timestamp":1650326262000},"page":"74-80","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["The Research on Real-time Security Situation Assessment Technology Based on the Threat Propagation Model"],"prefix":"10.1145","author":[{"given":"Jian","family":"Chen","sequence":"first","affiliation":[{"name":"WuchanZhongda Digital Technology Co., Ltd., China"}]},{"given":"Mingyuan","family":"Yang","sequence":"additional","affiliation":[{"name":"Credit Card Center, China Merchants Bank Co., Ltd., China"}]}],"member":"320","published-online":{"date-parts":[[2022,4,18]]},"reference":[{"issue":"4","key":"e_1_3_2_1_1_1","first-page":"1010","volume":"28","author":"Jian Gong","year":"2017","unstructured":"Gong Jian , Zang Xiaodong , Su Qi , Survey of Network Security Situation Awareness [J]. Journal of Software , 2017 , 28 ( 4 ): 1010 - 1026 . Gong Jian, Zang Xiaodong, Su Qi, Survey of Network Security Situation Awareness [J]. Journal of Software, 2017, 28(4):1010-1026.","journal-title":"Journal of Software"},{"key":"e_1_3_2_1_2_1","volume-title":"Network Security Situation Assessment: A Review and Discussion[M]\/\/ Information Science and Applications","author":"Leau Y B","year":"2015","unstructured":"Leau Y B , Manickam S, Chong Y W. Network Security Situation Assessment: A Review and Discussion[M]\/\/ Information Science and Applications . Springer Berlin Heidelberg , 2015 : 407-414. Leau Y B, Manickam S, Chong Y W. Network Security Situation Assessment: A Review and Discussion[M]\/\/ Information Science and Applications. Springer Berlin Heidelberg, 2015:407-414."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1001.2011.03751"},{"key":"e_1_3_2_1_4_1","volume-title":"Risk assessment of complex information system security based on threat propagation [J]","author":"Gang Ma","year":"2014","unstructured":"Ma Gang , Du Yuge , Rong Jiang , Risk assessment of complex information system security based on threat propagation [J] . Journal of Tsinghua University(Science and Technology) , 2014 (1):35-43. Ma Gang, Du Yuge, Rong Jiang, Risk assessment of complex information system security based on threat propagation [J]. Journal of Tsinghua University(Science and Technology), 2014(1):35-43."},{"key":"e_1_3_2_1_5_1","volume-title":"A Hierarchical Evaluation Approach for Network Security Based on Threat Spread Model[J]. JOURNAL OF COMPUTER RESEARCH AND DEVELOPMENT","author":"Feng Chen","year":"2011","unstructured":"Chen Feng , Liu Dehui , Zhang Yi , A Hierarchical Evaluation Approach for Network Security Based on Threat Spread Model[J]. JOURNAL OF COMPUTER RESEARCH AND DEVELOPMENT , 2011 , 48(6):945-954. Chen Feng, Liu Dehui, Zhang Yi, A Hierarchical Evaluation Approach for Network Security Based on Threat Spread Model[J]. JOURNAL OF COMPUTER RESEARCH AND DEVELOPMENT, 2011, 48(6):945-954."},{"key":"e_1_3_2_1_6_1","volume-title":"Threat Propagation Based Security Situation Quantitative Assessment in Multi-Node Network [J]. JOURNAL OF COMPUTER RESEARCH AND DEVELOPMENT","author":"Jianwei Tian","year":"2017","unstructured":"Tian Jianwei , Tian Zheng , Qi Wenhui , Threat Propagation Based Security Situation Quantitative Assessment in Multi-Node Network [J]. JOURNAL OF COMPUTER RESEARCH AND DEVELOPMENT , 2017 , 54(4):731-741. Tian Jianwei, Tian Zheng, Qi Wenhui, Threat Propagation Based Security Situation Quantitative Assessment in Multi-Node Network [J]. JOURNAL OF COMPUTER RESEARCH AND DEVELOPMENT, 2017, 54(4):731-741."}],"event":{"name":"ASSE' 22: 2022 3rd Asia Service Sciences and Software Engineering Conference","acronym":"ASSE' 22","location":"Macau Macao"},"container-title":["2022 3rd Asia Service Sciences and Software Engineering Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3523181.3523192","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3523181.3523192","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:44Z","timestamp":1750188644000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3523181.3523192"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,24]]},"references-count":6,"alternative-id":["10.1145\/3523181.3523192","10.1145\/3523181"],"URL":"https:\/\/doi.org\/10.1145\/3523181.3523192","relation":{},"subject":[],"published":{"date-parts":[[2022,2,24]]},"assertion":[{"value":"2022-04-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}