{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:09:38Z","timestamp":1750219778595,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,21]],"date-time":"2022-10-21T00:00:00Z","timestamp":1666310400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,21]]},"DOI":"10.1145\/3573428.3573466","type":"proceedings-article","created":{"date-parts":[[2023,3,15]],"date-time":"2023-03-15T10:43:09Z","timestamp":1678876989000},"page":"220-225","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on information security risk assessment based on integrated influence of neighborhood"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3331-2081","authenticated-orcid":false,"given":"Tianyu","family":"Wang","sequence":"first","affiliation":[{"name":"Key Laboratory of Networked Control Systems, Chinese Academy of Sciences, China and \rShenyang Institute of Automation, Chinese Academy of Sciences, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3517-8349","authenticated-orcid":false,"given":"Jianming","family":"Zhao","sequence":"additional","affiliation":[{"name":"Key Laboratory of Networked Control Systems, Chinese Academy of Sciences, China and \rShenyang Institute of Automation, Chinese Academy of Sciences, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1049-1985","authenticated-orcid":false,"given":"Bowen","family":"Zhang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Networked Control Systems, Chinese Academy of Sciences, China and \rShenyang Institute of Automation, Chinese Academy of Sciences, China"}]}],"member":"320","published-online":{"date-parts":[[2023,3,15]]},"reference":[{"issue":"10","key":"e_1_3_2_1_1_1","first-page":"1396","article-title":"Industrial control system cybersecurity research","volume":"52","author":"Peng Y.","year":"2012","unstructured":"Peng Y., Jiang C., Xie F., 2012. Industrial control system cybersecurity research. Journal of Tsinghua University (Science and Technology), 52(10): 1396-1408.","journal-title":"Journal of Tsinghua University (Science and Technology)"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2020\/8897926","article-title":". Anomaly Detection for Industrial Control System Based on Autoencoder Neural Network","volume":"2020","author":"Wang C","year":"2020","unstructured":"Wang C, Wang B, Liu H, 2020. Anomaly Detection for Industrial Control System Based on Autoencoder Neural Network. Wireless Communications and Mobile Computing, 2020: 1-10.","journal-title":"Wireless Communications and Mobile Computing"},{"key":"e_1_3_2_1_3_1","volume-title":"A Fuzzy Probability Bayesian Network Approach for Dynamic Cybersecurity Risk Assessment in Industrial Control Systems","author":"Qi Z.","year":"2018","unstructured":"Qi Z., Zhou C., Tian Y., A Fuzzy Probability Bayesian Network Approach for Dynamic Cybersecurity Risk Assessment in Industrial Control Systems. 2018. IEEE Transactions on Industrial Informatics, PP (99): 1-1."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2020.106302"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.3390\/su13084191"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.resconrec.2015.01.001"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2710316"},{"key":"e_1_3_2_1_8_1","first-page":"1","author":"Qiu T.","year":"2020","unstructured":"Qiu T., Zhang M., Liu X., A Directed Edge Weight Prediction Model Using Decision Tree Ensembles in Industrial Internet of Things. 2020, IEEE Transactions on Industrial Informatics, PP(99): 1-1.","journal-title":"IEEE Transactions on Industrial Informatics, PP(99)"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.03.038"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1038\/35019019"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.87.198701"}],"event":{"name":"EITCE 2022: 2022 6th International Conference on Electronic Information Technology and Computer Engineering","acronym":"EITCE 2022","location":"Xiamen China"},"container-title":["Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3573428.3573466","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3573428.3573466","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:38Z","timestamp":1750178258000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3573428.3573466"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,21]]},"references-count":11,"alternative-id":["10.1145\/3573428.3573466","10.1145\/3573428"],"URL":"https:\/\/doi.org\/10.1145\/3573428.3573466","relation":{},"subject":[],"published":{"date-parts":[[2022,10,21]]},"assertion":[{"value":"2023-03-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}