{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:01:23Z","timestamp":1750309283924,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,7]],"date-time":"2024-06-07T00:00:00Z","timestamp":1717718400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,7]]},"DOI":"10.1145\/3675018.3675026","type":"proceedings-article","created":{"date-parts":[[2024,8,4]],"date-time":"2024-08-04T22:24:38Z","timestamp":1722810278000},"page":"114-119","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Multidimensional data fusion detection method based on time series data model"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-6047-5160","authenticated-orcid":false,"given":"Lina","family":"Zhao","sequence":"first","affiliation":[{"name":"Information &amp; Telecommunications Company, State Grid Shandong Electric Power Company, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-0297-9275","authenticated-orcid":false,"given":"Ming","family":"Li","sequence":"additional","affiliation":[{"name":"Information &amp; Telecommunications Company, State Grid Shandong Electric Power Company, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-5627-3678","authenticated-orcid":false,"given":"Jinchao","family":"Ni","sequence":"additional","affiliation":[{"name":"Information &amp; Telecommunications Company, State Grid Shandong Electric Power Company, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-7319-844X","authenticated-orcid":false,"given":"Xue","family":"Liu","sequence":"additional","affiliation":[{"name":"Information &amp; Telecommunications Company, State Grid Shandong Electric Power Company, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3386-4756","authenticated-orcid":false,"given":"Lijuan","family":"Xu","sequence":"additional","affiliation":[{"name":"Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan), Qilu University of Technology (Shandong Academy of Sciences);Shandong Provincial Key Laboratory of Computer Networks, Shandong Fundamental Research Center for Computer Science, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-9319-4456","authenticated-orcid":false,"given":"Zhiang","family":"Yao","sequence":"additional","affiliation":[{"name":"Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan), Qilu University of Technology (Shandong Academy of Sciences);Shandong Provincial Key Laboratory of Computer Networks, Shandong Fundamental Research Center for Computer Science, China"}]}],"member":"320","published-online":{"date-parts":[[2024,8,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4150"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2000.854086"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2023.109999"},{"key":"e_1_3_2_1_4_1","volume-title":"Logic Level Alarm Analysis of Monitoring and Measurement System in Coal Mines Based on Multi-system Data Fusion. Shanxi Coal5","author":"Gang Du.","year":"2017","unstructured":"Gang Du. 2017. Logic Level Alarm Analysis of Monitoring and Measurement System in Coal Mines Based on Multi-system Data Fusion. Shanxi Coal5 (2017), 13\u201321."},{"key":"e_1_3_2_1_5_1","volume-title":"LogETA: Time-aware cross-system log-based anomaly detection with inter-class boundary optimization. Future Generation Computer Systems","author":"Gong Kun","year":"2024","unstructured":"Kun Gong, Senlin Luo, Limin Pan, Linghao Zhang, Yifei Zhang, and Haomiao Yu. 2024. LogETA: Time-aware cross-system log-based anomaly detection with inter-class boundary optimization. Future Generation Computer Systems (2024)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2023.110689"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.3024645"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.09.004"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103248"},{"key":"e_1_3_2_1_10_1","first-page":"981","article-title":"Research on Security Information Fusion from Multiple Heterogeneous Sensors","volume":"20","author":"Ma Linru","year":"2008","unstructured":"Linru Ma, Lin Yang, and Jianxin Wang. 2008. Research on Security Information Fusion from Multiple Heterogeneous Sensors. Journal of System Simulation 20, 4 (2008), 981\u2013985.","journal-title":"Journal of System Simulation"},{"key":"e_1_3_2_1_11_1","volume-title":"Analysis method of multi-source flow characteristics and its application in anomaly detection","author":"Niu Guolin","year":"2009","unstructured":"Guolin Niu, Xiaohong Guan, Yi Long, and Tao Qin. 2009. Analysis method of multi-source flow characteristics and its application in anomaly detection. Journal of PLA University of Science and Technology(Natural Science Edition)4 (2009), 350\u2013355."},{"key":"e_1_3_2_1_12_1","volume-title":"The application of fuzzy logic to the construction of the ranking function of information retrieval systems. Information systems 10, 1","author":"Rubens Neil","year":"2006","unstructured":"Neil Rubens. 2006. The application of fuzzy logic to the construction of the ranking function of information retrieval systems. Information systems 10, 1 (2006), 20\u201327."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.2514\/1.12348"},{"key":"e_1_3_2_1_14_1","volume-title":"IDS alert verification based on multi-source security information. journal of Computer Applications 27, 8","author":"Wang Jingxin","year":"2007","unstructured":"Jingxin Wang, Zhiying Wang, and Kui Dai. 2007. IDS alert verification based on multi-source security information. journal of Computer Applications 27, 8 (2007), 1910\u20131912."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103631"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00130"},{"key":"e_1_3_2_1_17_1","first-page":"266","article-title":"Information Fusion Method of Wavelet Neural Network According to D-S Evidence Theory","volume":"26","author":"Yang Yajun","year":"2006","unstructured":"Yajun Yang and Fuming Wang. 2006. Information Fusion Method of Wavelet Neural Network According to D-S Evidence Theory. Journal of Projectiles, Rockets, Missiles and Guidance 26, 4 (2006), 266\u2013268.","journal-title":"Journal of Projectiles, Rockets, Missiles and Guidance"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611978032.76"}],"event":{"name":"HP3C 2024: 2024 8th International Conference on High Performance Compilation, Computing and Communications","acronym":"HP3C 2024","location":"Guangzhou China"},"container-title":["Proceedings of the 2024 8th International Conference on High Performance Compilation, Computing and Communications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3675018.3675026","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3675018.3675026","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:03:14Z","timestamp":1750291394000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3675018.3675026"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,7]]},"references-count":18,"alternative-id":["10.1145\/3675018.3675026","10.1145\/3675018"],"URL":"https:\/\/doi.org\/10.1145\/3675018.3675026","relation":{},"subject":[],"published":{"date-parts":[[2024,6,7]]},"assertion":[{"value":"2024-08-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}