{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T15:10:02Z","timestamp":1755875402042,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,27]],"date-time":"2023-10-27T00:00:00Z","timestamp":1698364800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,27]]},"DOI":"10.1145\/3640912.3640953","type":"proceedings-article","created":{"date-parts":[[2024,2,22]],"date-time":"2024-02-22T13:37:41Z","timestamp":1708609061000},"page":"207-210","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["FusedCNN-LSTM-AttNet: A Neural Network Model for Cyber Security Situation Prediction"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-4166-491X","authenticated-orcid":false,"given":"Zihan","family":"Xiong","sequence":"first","affiliation":[{"name":"China Telecom Research Institute, Institute of Security Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6150-1165","authenticated-orcid":false,"given":"Yuxuan","family":"Li","sequence":"additional","affiliation":[{"name":"China Telecom Research Institute, Institute of Security Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-7661-5568","authenticated-orcid":false,"given":"Jun","family":"Chen","sequence":"additional","affiliation":[{"name":"China Telecom Research Institute, Institute of Security Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-7413-2323","authenticated-orcid":false,"given":"Dabei","family":"Chen","sequence":"additional","affiliation":[{"name":"China Telecom Research Institute, Institute of Security Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2024,2,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.138"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.23919\/APNOMS.2019.8893096"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.3778\/j.issn.1002-8331.1808-0016"},{"issue":"11","key":"e_1_3_2_1_4_1","first-page":"3671","volume":"45","author":"Sun J.","year":"2023","unstructured":"Sun, J.; Li, C.; Cao, B. Network Security Situation Prediction Based on TCN-BiLSTM. Systems Engineering and Electronics, 2023, 45 (11), 3671-3679.","journal-title":"Network Security Situation Prediction Based on TCN-BiLSTM. Systems Engineering and Electronics"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.13245\/j.hust.220508"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3175516"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD54268.2022.9776030"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.24432\/C51C7N"},{"key":"e_1_3_2_1_9_1","volume-title":"Deep Learning for Time-Series Analysis. arXiv","author":"Gamboa J. C. B.","year":"2017","unstructured":"Gamboa, J. C. B. Deep Learning for Time-Series Analysis. arXiv January 7, 2017. http:\/\/arxiv.org\/abs\/1701.01887 (accessed 2023-07-27)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"volume-title":"Proceedings of the 31st International Conference on Neural Information Processing Systems; NIPS\u201917; Curran Associates Inc.: Red Hook, NY, USA","author":"Vaswani A.","key":"e_1_3_2_1_11_1","unstructured":"Vaswani, A.; Shazeer, N.; Parmar, N.; Uszkoreit, J.; Jones, L.; Gomez, A. N.; Kaiser, Lukasz; Polosukhin, I. Attention Is All You Need. In Proceedings of the 31st International Conference on Neural Information Processing Systems; NIPS\u201917; Curran Associates Inc.: Red Hook, NY, USA, 2017; pp 6000\u20136010."}],"event":{"name":"CNML 2023: 2023 International Conference on Communication Network and Machine Learning","acronym":"CNML 2023","location":"Zhengzhou China"},"container-title":["Proceedings of the 2023 International Conference on Communication Network and Machine Learning"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3640912.3640953","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3640912.3640953","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T14:47:15Z","timestamp":1755874035000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3640912.3640953"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,27]]},"references-count":11,"alternative-id":["10.1145\/3640912.3640953","10.1145\/3640912"],"URL":"https:\/\/doi.org\/10.1145\/3640912.3640953","relation":{},"subject":[],"published":{"date-parts":[[2023,10,27]]},"assertion":[{"value":"2024-02-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}