{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:10:04Z","timestamp":1755882604185,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1145\/3672919.3672932","type":"proceedings-article","created":{"date-parts":[[2024,7,24]],"date-time":"2024-07-24T12:39:43Z","timestamp":1721824783000},"page":"66-71","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Survey of cyberspace surveying and mapping"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-1022-3624","authenticated-orcid":false,"given":"Zhenwan","family":"Zou","sequence":"first","affiliation":[{"name":"Electric Power Research Institute of State Grid Xinjiang Electric Power Co., Ltd., China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-9926-6996","authenticated-orcid":false,"given":"Jia","family":"Chen","sequence":"additional","affiliation":[{"name":"State Grid Xinjiang Electric Power Co., Ltd., China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-0458-4763","authenticated-orcid":false,"given":"Wenshou","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Software, Xinjiang University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-3488-4682","authenticated-orcid":false,"given":"Bin","family":"Wang","sequence":"additional","affiliation":[{"name":"Electric Power Research Institute of State Grid Xinjiang Electric Power Co., Ltd., China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-9125-1638","authenticated-orcid":false,"given":"Yicheng","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Software, Xinjiang University, China"}]}],"member":"320","published-online":{"date-parts":[[2024,7,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-43639-5_2"},{"issue":"8","key":"e_1_3_2_1_2_1","first-page":"30","article-title":"Practice and thinking of cyberspace surveying and mapping technology","volume":"47","author":"Qing C.","year":"2021","unstructured":"Qing, C., Han, L., Yuejin, D. and Yirong, Z. 2021. Practice and thinking of cyberspace surveying and mapping technology. Information and Communications Technology and Policy, 47(8), 30.","journal-title":"Information and Communications Technology and Policy"},{"issue":"9","key":"e_1_3_2_1_3_1","first-page":"1","article-title":"Research on cyberspace surveying and mapping technology","volume":"2","author":"Zhao F.","year":"2016","unstructured":"Zhao, F., Luo, X. and Liu, F. 2016. Research on cyberspace surveying and mapping technology. Chinese Journal of Network and Information Security, 2(9), 1-11.","journal-title":"Chinese Journal of Network and Information Security"},{"key":"e_1_3_2_1_4_1","first-page":"13","article-title":"Treasure map: the NSA breach of telekom and other German firms","volume":"12","author":"M\u00fcller-Maguhn A.","year":"2014","unstructured":"M\u00fcller-Maguhn, A., Poitras, L., Rosenbach, M., Sontheimer, M. and Grothoff, C. 2014. Treasure map: the NSA breach of telekom and other German firms. Feedback, 12, 13.","journal-title":"Feedback"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111293.1111302"},{"issue":"02","key":"e_1_3_2_1_6_1","first-page":"74","article-title":"Model and application of cyberspace information system","volume":"41","author":"Wang J.","year":"2020","unstructured":"Wang, J., Zhuang, S., Miao, C. and An C. 2020. Model and application of cyberspace information system. Journal on Communications, 41(02): 74-83.","journal-title":"Journal on Communications"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1108\/20450621111180954"},{"issue":"05","key":"e_1_3_2_1_8_1","first-page":"1","article-title":"Research on Definition and Technological System of Cyberspace Surveying and Mapping","volume":"45","author":"Zhou Y.","year":"2018","unstructured":"Zhou, Y., Xu Q., Luo, X., Liu, F., Zhang, L. and Hu, X. 2018. Research on Definition and Technological System of Cyberspace Surveying and Mapping. Computer Science, 45(05): 1-7. (in Chinese)","journal-title":"Computer Science"},{"issue":"04","key":"e_1_3_2_1_9_1","first-page":"1","article-title":"Cyberspace resource mapping: concept and technology[J]","volume":"3","author":"Guo L.","year":"2018","unstructured":"Guo, L., Cao, Y., Su, M., Shang, Y., Zhu, Y., Zhang, P. and Zhou, C. 2018. Cyberspace resource mapping: concept and technology[J]. Journal of Information Security, 3(04): 1-14. (in Chinese)","journal-title":"Journal of Information Security"},{"volume-title":"2018 IEEE Third International Conference on Data Science in Cyberspace. Guangzhou. 646-651","author":"Sun W.","key":"e_1_3_2_1_10_1","unstructured":"Sun, W., Jiang, J. and Su, M., 2018. A passive-measurement-guided tree network surveying and mapping model. In 2018 IEEE Third International Conference on Data Science in Cyberspace. Guangzhou. 646-651."},{"volume-title":"Proceedings of the Internet Measurement Conference","author":"Gasser O.","key":"e_1_3_2_1_11_1","unstructured":"Gasser, O., Scheitle, Q., Foremski, P., Lone, Q., Korczy\u0144ski, M., Strowes, S. D., Hendriks L. and Carle, G., 2018. Clusters in the expanse: Understanding and unbiasing IPv6 hitlists. In Proceedings of the Internet Measurement Conference. Boston. 364-378."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17277-0_10"},{"volume-title":"Networked Device Identification: A Survey. In 2021 IEEE Sixth International Conference on Data Science in Cyberspace. Shenzhen. 543-548","author":"Jiang Y.","key":"e_1_3_2_1_13_1","unstructured":"Jiang, Y., Li, Y. and Sun, Y., 2021. Networked Device Identification: A Survey. In 2021 IEEE Sixth International Conference on Data Science in Cyberspace. Shenzhen. 543-548."},{"volume-title":"2017 IEEE 37th international conference on distributed computing systems. Atlanta. 2177-2184","author":"Miettinen M.","key":"e_1_3_2_1_14_1","unstructured":"Miettinen, M., Marchal, S., Hafeez, I., Asokan, N., Sadeghi, A. R. and Tarkoma, S., 2017. Iot sentinel: Automated device-type identification for security enforcement in iot. In 2017 IEEE 37th international conference on distributed computing systems. Atlanta. 2177-2184."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2007.4444750"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2010.2096232"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2567561.2567568"},{"volume-title":"Proceedings of the 25th ACM international on conference on information and knowledge management. Indianapolis. 1483-1492","author":"Zamani H.","key":"e_1_3_2_1_18_1","unstructured":"Zamani, H., Dadashkarimi, J., Shakery, A. and Croft, W. B., 2016. Pseudo-relevance feedback based on matrix factorization. In Proceedings of the 25th ACM international on conference on information and knowledge management. Indianapolis. 1483-1492."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2013.06.010"},{"issue":"4","key":"e_1_3_2_1_20_1","first-page":"189","article-title":"Social network bursty topic discovery based on RNN and topic model","volume":"39","author":"Shi L.","year":"2018","unstructured":"Shi, L., Du, J. and Liang, M. 2018. Social network bursty topic discovery based on RNN and topic model. J. Commun., 39(4), 189-198.","journal-title":"J. Commun."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1177\/0020294019865750"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1080\/13691180500146235"},{"volume-title":"Network Entity Landmark Mining Technology. In 2020 6th International Symposium on System and Software Reliability. Chengdu. 75-82","author":"Gan Y.","key":"e_1_3_2_1_23_1","unstructured":"Gan, Y., Liu, Y., Zhang, H. and Jia, D., 2020. Network Entity Landmark Mining Technology. In 2020 6th International Symposium on System and Software Reliability. Chengdu. 75-82."},{"volume-title":"2015 18th International Conference on Network-Based Information Systems. Taipei. 294-301","author":"Zhu G.","key":"e_1_3_2_1_24_1","unstructured":"Zhu, G., Luo, X., Liu, F. and Chen, J., 2015. An algorithm of city-level landmark mining based on internet forum. In 2015 18th International Conference on Network-Based Information Systems. Taipei. 294-301."},{"issue":"2","key":"e_1_3_2_1_25_1","first-page":"283","article-title":"Street-level Landmark Mining Algorithm Based on Radar Search","volume":"22","author":"Liu X.","year":"2021","unstructured":"Liu, X., Yang, W., Yin, M., Liu, F. and Yun, C. 2021. Street-level Landmark Mining Algorithm Based on Radar Search. Journal of Internet Technology, 22(2), 283-295.","journal-title":"Journal of Internet Technology"},{"volume-title":"MILCOM 2012-2012 IEEE Military Communications Conference. Orlando. 1-6.","author":"Maziku H.","key":"e_1_3_2_1_26_1","unstructured":"Maziku, H., Shetty, S., Han, K. and Rogers, T., 2012. Enhancing the classification accuracy of IP geolocation. In MILCOM 2012-2012 IEEE Military Communications Conference. Orlando. 1-6."},{"volume-title":"Proceedings of the Ninth ACM International Conference on Web Search and Data Mining","author":"Dan O.","key":"e_1_3_2_1_27_1","unstructured":"Dan, O., Parikh, V. and Davison, B. D., 2016. Improving IP geolocation using query logs. In Proceedings of the Ninth ACM International Conference on Web Search and Data Mining. San Francisco. 347-356."},{"volume-title":"2014 IEEE Workshop on Advanced Research and Technology in Industry Applications","author":"Zhu B.","key":"e_1_3_2_1_28_1","unstructured":"Zhu B., Tian Z. and Duan W., 2014. A survey on IP geolocation. In 2014 IEEE Workshop on Advanced Research and Technology in Industry Applications. Ottawa. 1039-1041."},{"volume-title":"2015 17th International Conference on Advanced Communication Technology. PyeongChang. 176-181","author":"Ding S.","key":"e_1_3_2_1_29_1","unstructured":"Ding, S., Luo, X., Yin, M., Liu, Y. and Liu, F., 2015. An IP geolocation method based on rich-connected sub-networks. In 2015 17th International Conference on Advanced Communication Technology. PyeongChang. 176-181."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.14311\/AP.2019.59.0035"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2018.2822738"},{"volume-title":"2017 12th IEEE Conference on Industrial Electronics and Applications. Siem Reap. 995-999","author":"Zhang Z.","key":"e_1_3_2_1_32_1","unstructured":"Zhang, Z., Gong, Y., Wang, K. and Gu, J., 2017. A survey of overlapping community detection based on multi-label propagation. In 2017 12th IEEE Conference on Industrial Electronics and Applications. Siem Reap. 995-999."},{"volume-title":"2018 10th International Conference on Communication Systems and Networks. Bengaluru 649-654","author":"Sarswat A.","key":"e_1_3_2_1_33_1","unstructured":"Sarswat, A. and Guddeti, R. M. R., 2018. A novel overlapping community detection using parallel CFM and sequential nash equilibrium. In 2018 10th International Conference on Communication Systems and Networks. Bengaluru 649-654."},{"volume-title":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies. Kanyakumari District. 31-35","author":"Bhargav M.","key":"e_1_3_2_1_34_1","unstructured":"Bhargav, M. and Bhargav, A., 2014. Mining relationships from text in social networking sites. In 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies. Kanyakumari District. 31-35."},{"key":"e_1_3_2_1_35_1","volume-title":"Achieving secure role-based access control on encrypted data in cloud storage","author":"Zhou L.","year":"1947","unstructured":"Zhou, L., Varadharajan, V., & Hitchens, M. 2013. Achieving secure role-based access control on encrypted data in cloud storage. IEEE transactions on information forensics and security, 8(12), 1947-1960."},{"volume-title":"2020 International Conference on Urban Engineering and Management Science. Zhuhai. 245-250","author":"Liang W.","key":"e_1_3_2_1_36_1","unstructured":"Liang, W., Yuanyuan, S., Wei, M. and Zhonghua, X., 2020. Research on Topology Model of Power System optimization Based on Greedy Algorithm. In 2020 International Conference on Urban Engineering and Management Science. Zhuhai. 245-250."},{"volume-title":"Annals of the 26th Cartographic Conference\u2013ICC. Dresden. 231-237","author":"Sluter C. R.","key":"e_1_3_2_1_37_1","unstructured":"Sluter, C. R., Brandalize, M. C. B., VAN ELZAKKER, C. J. P. and Iv\u00e1nov\u00e1, I., 2013. Defining standard symbols for street network maps for urban planning based on user requirements. In Annals of the 26th Cartographic Conference\u2013ICC. Dresden. 231-237."},{"volume-title":"IGARSS 2004. 2004 IEEE International Geoscience and Remote Sensing Symposium. Anchorage. 2971-2974","author":"Yang J.","key":"e_1_3_2_1_38_1","unstructured":"Yang, J., Yang, C., Yu, Z. and Zhang, L., 2004. Research on high-performance Web GIS system for map symbol dynamic editing and network publishing. In IGARSS 2004. 2004 IEEE International Geoscience and Remote Sensing Symposium. Anchorage. 2971-2974."}],"event":{"name":"CSAIDE 2024: 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy","acronym":"CSAIDE 2024","location":"Nanjing China"},"container-title":["Proceedings of the 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672919.3672932","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3672919.3672932","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:36:02Z","timestamp":1755880562000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672919.3672932"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3]]},"references-count":38,"alternative-id":["10.1145\/3672919.3672932","10.1145\/3672919"],"URL":"https:\/\/doi.org\/10.1145\/3672919.3672932","relation":{},"subject":[],"published":{"date-parts":[[2024,3]]},"assertion":[{"value":"2024-07-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}