{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:08:12Z","timestamp":1755907692380,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1145\/3672919.3672961","type":"proceedings-article","created":{"date-parts":[[2024,7,24]],"date-time":"2024-07-24T12:39:43Z","timestamp":1721824783000},"page":"220-225","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Construction of a Layered Rule Base System Based on Cyber Security"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-9664-0749","authenticated-orcid":false,"given":"Zhiyong","family":"You","sequence":"first","affiliation":[{"name":"The Third Research Institute of Ministry of Public Security, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-9742-0559","authenticated-orcid":false,"given":"Yuan","family":"Tao","sequence":"additional","affiliation":[{"name":"The Third Research Institute of Ministry of Public Security, China"}]}],"member":"320","published-online":{"date-parts":[[2024,7,24]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"651","article-title":"Interpretable belief rule base for safety state assessment with reverse causal inference[J]","author":"Xiuxian Y","year":"2023","unstructured":"Xiuxian Y, Wei H, You C, Interpretable belief rule base for safety state assessment with reverse causal inference[J]. Information Sciences, 2023, 651.","journal-title":"Information Sciences"},{"key":"e_1_3_2_1_2_1","first-page":"147","article-title":"Refining the rule base of fuzzy classifier to support the evaluation of fetal condition[J]","author":"Robert C","year":"2023","unstructured":"Robert C, Michal J, Jacek L, Refining the rule base of fuzzy classifier to support the evaluation of fetal condition[J]. Applied Soft Computing, 2023, 147.","journal-title":"Applied Soft Computing"},{"key":"e_1_3_2_1_3_1","first-page":"233","article-title":"An ensemble belief rule base model for pathologic complete response prediction in gastric cancer[J]","author":"Zhilong W","year":"2023","unstructured":"Zhilong W, Qianwen W, Jie W, An ensemble belief rule base model for pathologic complete response prediction in gastric cancer[J]. Expert Systems With Applications, 2023, 233.","journal-title":"Expert Systems With Applications"},{"issue":"3","key":"e_1_3_2_1_4_1","volume":"36","author":"Zhichao F","year":"2023","unstructured":"Zhichao F, Zhijie Z, Xiaojun B, Sensor Fault Diagnosis and Tolerant Control Based on Belief Rule Base for Complex System[J]. Journal of Systems Science and Complexity, 2023, 36(3).","journal-title":"Journal of Systems Science and Complexity"},{"issue":"14","key":"e_1_3_2_1_5_1","article-title":"A new interval constructed belief rule base with rule reliability[J]","volume":"79","author":"Xiaoyu C","year":"2023","unstructured":"Xiaoyu C, Peng H, Wei H, A new interval constructed belief rule base with rule reliability[J]. The Journal of Supercomputing, 2023, 79(14).","journal-title":"The Journal of Supercomputing"},{"key":"e_1_3_2_1_6_1","volume-title":"Data-Driven Thyroid Nodule Diagnosis Using Belief Rule Base[J]. Diagnostics","author":"Jiang J","year":"2022","unstructured":"Jiang J, Ruirui Z, Xuan L, Data-Driven Thyroid Nodule Diagnosis Using Belief Rule Base[J]. Diagnostics, 2022, 12(10)."},{"issue":"5","key":"e_1_3_2_1_7_1","article-title":"A novel combination belief rule base model for mechanical equipment fault diagnosis[J]","volume":"35","author":"Manlin C","year":"2022","unstructured":"Manlin C, Zhijie Z, Bangcheng Z, A novel combination belief rule base model for mechanical equipment fault diagnosis[J]. Chinese Journal of Aeronautics, 2022, 35(5).","journal-title":"Chinese Journal of Aeronautics"},{"key":"e_1_3_2_1_8_1","volume-title":"A novel belief rule base expert system with interval-valued references. [J]. Scientific reports","author":"Chao S","year":"2022","unstructured":"Chao S, Ruohan Y, Wei H, A novel belief rule base expert system with interval-valued references. [J]. Scientific reports, 2022, 12(1)."},{"volume-title":"Cybersecurity and Information Assurance for the Clinical Laboratory. [J]. The journal of applied laboratory medicine","year":"2023","key":"e_1_3_2_1_9_1","unstructured":"U A P, L C W, N S H, Cybersecurity and Information Assurance for the Clinical Laboratory. [J]. The journal of applied laboratory medicine, 2023, 8(1). resswire, 2023."},{"issue":"1","key":"e_1_3_2_1_10_1","article-title":"Examining the Cyber Skills Gap: An Analysis of Cybersecurity Positions by Sub-Field[J]","volume":"34","author":"Ramezan A C","year":"2023","unstructured":"Ramezan A C. Examining the Cyber Skills Gap: An Analysis of Cybersecurity Positions by Sub-Field[J]. Journal of Information Systems Education, 2023, 34(1).","journal-title":"Journal of Information Systems Education"},{"issue":"11","key":"e_1_3_2_1_11_1","article-title":"Interactions between artificial intelligence and cybersecurity to protect future networks[J]","volume":"77","author":"Gregory B","year":"2022","unstructured":"Gregory B, Yang L, Rongxing L, Interactions between artificial intelligence and cybersecurity to protect future networks[J]. Annals of Telecommunications, 2022, 77(11-12).","journal-title":"Annals of Telecommunications"},{"key":"e_1_3_2_1_12_1","first-page":"644","article-title":"Measurement and optimization of rule consistency in a belief rule base system[J]","author":"Yaqian Y","year":"2023","unstructured":"Yaqian Y, Jianbin S, Ruirui Z, Measurement and optimization of rule consistency in a belief rule base system[J]. Information Sciences, 2023, 644.","journal-title":"Information Sciences"},{"key":"e_1_3_2_1_13_1","volume-title":"Fault Diagnosis for Body-in-White Welding Robot Based on Multi-Layer Belief Rule Base[J]. Applied Sciences","author":"Zhang C B","year":"2023","unstructured":"Zhang C B, Wang D J, Zheng Z, Fault Diagnosis for Body-in-White Welding Robot Based on Multi-Layer Belief Rule Base[J]. Applied Sciences, 2023, 13(8)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.3390\/s23063000"},{"key":"e_1_3_2_1_15_1","volume-title":"System Approach to the Creation of Cybersecurity Centers of Critical Infrastructure[J]","author":"Skiter I.","year":"2022","unstructured":"Skiter I. System Approach to the Creation of Cybersecurity Centers of Critical Infrastructure[J]. 2022."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103139"},{"issue":"5","key":"e_1_3_2_1_17_1","article-title":"A primer on insider threats in cybersecurity[J]","volume":"31","author":"Sunitha P","year":"2022","unstructured":"Sunitha P, Nik T. A primer on insider threats in cybersecurity[J]. Information Security Journal: A Global Perspective, 2022, 31(5).","journal-title":"Information Security Journal: A Global Perspective"},{"key":"e_1_3_2_1_18_1","volume-title":"Social Sciences","author":"Suhani N S","year":"2022","unstructured":"Suhani N S, Ashraf M F, Walton W, Cyber\u2013Information Security Compliance and Violation Behaviour in Organisations: A Systematic Review[J]. Social Sciences, 2022, 11(9)."},{"key":"e_1_3_2_1_19_1","first-page":"120","article-title":"The cybersecurity behavioral research: A tertiary study[J]","author":"Farooq N K","year":"2022","unstructured":"Farooq N K, Amber Y, Saud M K, The cybersecurity behavioral research: A tertiary study[J]. Computers & Security, 2022, 120.","journal-title":"Computers & Security"},{"key":"e_1_3_2_1_20_1","volume-title":"Sustainability","author":"Huajing N","year":"2022","unstructured":"Huajing N, Yunyan Y, Lu B. Unsafe Behaviors Analysis of Sideswipe Collision on Urban Expressways Based on Bayesian Network[J]. Sustainability, 2022, 14(13)."},{"key":"e_1_3_2_1_21_1","first-page":"8","article-title":"Rule base construction method of section out of limit disposal strategy for thermal power unit equipment fault[J]","author":"Zhongming X","year":"2022","unstructured":"Zhongming X, Xiang M, Jianye C, Rule base construction method of section out of limit disposal strategy for thermal power unit equipment fault[J]. Energy Reports, 2022, 8.","journal-title":"Energy Reports"}],"event":{"name":"CSAIDE 2024: 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy","acronym":"CSAIDE 2024","location":"Nanjing China"},"container-title":["Proceedings of the 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672919.3672961","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3672919.3672961","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:35:36Z","timestamp":1755880536000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672919.3672961"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3]]},"references-count":21,"alternative-id":["10.1145\/3672919.3672961","10.1145\/3672919"],"URL":"https:\/\/doi.org\/10.1145\/3672919.3672961","relation":{},"subject":[],"published":{"date-parts":[[2024,3]]},"assertion":[{"value":"2024-07-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}