{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T22:10:04Z","timestamp":1755900604314,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T00:00:00Z","timestamp":1695340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"The National Natural Science Foundation of China","award":["62106053"],"award-info":[{"award-number":["62106053"]}]},{"name":"The Natural Science Foundation of Jilin Province, China","award":["20210101474JC"],"award-info":[{"award-number":["20210101474JC"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,9,22]]},"DOI":"10.1145\/3617184.3630145","type":"proceedings-article","created":{"date-parts":[[2023,12,28]],"date-time":"2023-12-28T14:41:42Z","timestamp":1703774502000},"page":"247-254","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Cross-Level Network Security Element Fusion Extraction Method Based on Deep Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0824-538X","authenticated-orcid":false,"given":"Jianping","family":"Zhao","sequence":"first","affiliation":[{"name":"Changchun University of Science and Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9688-6242","authenticated-orcid":false,"given":"Huan","family":"Wang","sequence":"additional","affiliation":[{"name":"Guangxi University of Science and Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6575-1954","authenticated-orcid":false,"given":"Yichuan","family":"Wang","sequence":"additional","affiliation":[{"name":"Xi'an University of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8566-1558","authenticated-orcid":false,"given":"Hua","family":"Li","sequence":"additional","affiliation":[{"name":"Changchun University of Science and Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5575-1210","authenticated-orcid":false,"given":"Yan","family":"Wang","sequence":"additional","affiliation":[{"name":"Guangxi University of Science and Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2023,12,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.3390\/rs13132585"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.107096"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/3429227"},{"issue":"5","key":"e_1_3_2_1_4_1","first-page":"173","article-title":"Research on Network Security Situational Elements Knowledge Base Model Based on Ontology","volume":"42","author":"Zhang H.","year":"2015","unstructured":"Si Cheng, H. Zhang, Y. Wang, and Y. Yang, \u201cResearch on Network Security Situational Elements Knowledge Base Model Based on Ontology,\u201d Computer Science, vol. 42, no. 5, pp. 173\u2013177, 2015.","journal-title":"Computer Science"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3084796"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2019.00059"},{"key":"e_1_3_2_1_7_1","volume-title":"Jan. 03, 2022. Accessed","author":"Mojtahedi A.","year":"2022","unstructured":"A. Mojtahedi, F. Sorouri, A. N. Souha, A. Molazadeh, and S. S. Mehr, \u201cFeature Selection-based Intrusion Detection System Using Genetic Whale Optimization Algorithm and Sample-based Classification.\u201d arXiv, Jan. 03, 2022. Accessed: Sep. 14, 2022. [Online]. Available: http:\/\/arxiv.org\/abs\/2201.00584"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13634-022-00871-6"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.107810"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-021-05933-8"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-023-00694-8"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-022-10297-z"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45855.2022.9838780"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-021-00448-4"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2021.1004261"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.35940\/ijrte.E6580.018520"}],"event":{"name":"ICCSIE 2023: 8th International Conference on Cyber Security and Information Engineering","acronym":"ICCSIE 2023","location":"Putrajaya Malaysia"},"container-title":["Proceedings of the 8th International Conference on Cyber Security and Information Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3617184.3630145","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3617184.3630145","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T21:56:21Z","timestamp":1755899781000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3617184.3630145"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,22]]},"references-count":16,"alternative-id":["10.1145\/3617184.3630145","10.1145\/3617184"],"URL":"https:\/\/doi.org\/10.1145\/3617184.3630145","relation":{},"subject":[],"published":{"date-parts":[[2023,9,22]]},"assertion":[{"value":"2023-12-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}