{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:01:23Z","timestamp":1750309283844,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,7]],"date-time":"2024-06-07T00:00:00Z","timestamp":1717718400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,7]]},"DOI":"10.1145\/3675018.3675772","type":"proceedings-article","created":{"date-parts":[[2024,8,4]],"date-time":"2024-08-04T22:24:38Z","timestamp":1722810278000},"page":"65-70","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Power Data Security Risk Assessment Method Based on Probabilistic Hesitant Fuzzy Multi-Attribute Decision Making"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-6822-2177","authenticated-orcid":false,"given":"ying xian","family":"chang","sequence":"first","affiliation":[{"name":"State Grid Shandong Electric Power Company, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-4200-2977","authenticated-orcid":false,"given":"shi chao","family":"zhang","sequence":"additional","affiliation":[{"name":"State Grid Shandong Electric Power Company, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-8345-1877","authenticated-orcid":false,"given":"xin","family":"liu","sequence":"additional","affiliation":[{"name":"State Grid Shandong Electric Power Research Institute, China and Shandong Smart Grid Technology Innovation Center, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0166-6077","authenticated-orcid":false,"given":"dong lan","family":"liu","sequence":"additional","affiliation":[{"name":"State Grid Shandong Electric Power Research Institute, China and Shandong Smart Grid Technology Innovation Center, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-0786-1151","authenticated-orcid":false,"given":"meng qian","family":"sun","sequence":"additional","affiliation":[{"name":"State Grid Shandong Electric Power Research Institute, China and Shandong Smart Grid Technology Innovation Center, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-5267-1529","authenticated-orcid":false,"given":"fu hui","family":"zhao","sequence":"additional","affiliation":[{"name":"State Grid Shandong Electric Power Research Institute, China and Shandong Smart Grid Technology Innovation Center, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1883-181X","authenticated-orcid":false,"given":"hong lei","family":"yao","sequence":"additional","affiliation":[{"name":"State Grid Shandong Electric Power Research Institute, China and Shandong Smart Grid Technology Innovation Center, China"}]}],"member":"320","published-online":{"date-parts":[[2024,8,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2881129"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2957747"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.10.059"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3330459"},{"issue":"9","key":"e_1_3_2_1_5_1","first-page":"90","article-title":"Research and design of data security evaluation model based on DSMM model","volume":"21","author":"Yang Xiaoqi","year":"2021","unstructured":"[5] Xiaoqi Yang, Lifang Bai, and Gang Tang. Research and design of data security evaluation model based on DSMM model. Netinfo Security, 21(9):90\u201395, September 2021.","journal-title":"Netinfo Security"},{"issue":"6","key":"e_1_3_2_1_6_1","first-page":"80","article-title":"Research on national security risk assessment model of open government data","volume":"6","author":"Wang Biao","year":"2020","unstructured":"[6] Biao Wang, Xingyang Liu, Ka\u00a0XU, Wangyang Liu, Kenan Wang, and Yuqing Xia. Research on national security risk assessment model of open government data. Chinese Journal of Network and Information Security, 6(6):80\u201387, December 2020.","journal-title":"Chinese Journal of Network and Information Security"},{"issue":"24","key":"e_1_3_2_1_7_1","first-page":"21","article-title":"Research on BlM data security evaluation system","volume":"27","author":"Gu Xin","year":"2021","unstructured":"[7] Xin Gu, Hao Yi, Shuzhi Xu, and Liang Le. Research on BlM data security evaluation system. Modern Computer, 27(24):21\u201325, August 2021.","journal-title":"Modern Computer"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.34"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-020-09558-5"},{"key":"e_1_3_2_1_10_1","first-page":"960","volume-title":"Suleyman Kondakci. Network Security Risk Assessment Using Bayesian Belief Networks. In 2010 IEEE Second International Conference on Social Computing","year":"2010","unstructured":"[10] Suleyman Kondakci. Network Security Risk Assessment Using Bayesian Belief Networks. In 2010 IEEE Second International Conference on Social Computing, pages 952\u2013960, August 2010."},{"issue":"12","key":"e_1_3_2_1_11_1","first-page":"6","article-title":"Research on risk assessment model of grade protection based on Bayesian network","volume":"37","author":"Zhao Yiming","year":"2018","unstructured":"[11] Yiming Zhao, Jiong Xie, Gang Wang, Xiaoyu Chen, and Xiaotong Li. Research on risk assessment model of grade protection based on Bayesian network. Information Technology and Network Security, 37(12):6\u201310, December 2018.","journal-title":"Information Technology and Network Security"},{"issue":"3","key":"e_1_3_2_1_12_1","first-page":"729","article-title":"Probabilistic hesitant fuzzy multi-attribute group decision-making based on new distance measure","volume":"37","author":"Fang Bing","year":"2022","unstructured":"[12] Bing Fang, Bing Han, and Chuanhua Wen. Probabilistic hesitant fuzzy multi-attribute group decision-making based on new distance measure. Control and Decision, 37(3):729\u2013736, March 2022.","journal-title":"Control and Decision"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10700-016-9257-5"},{"key":"e_1_3_2_1_14_1","volume-title":"A new probabilistic hesitant fuzzy multi-attribute group decision making methodbased on improved distance measures","author":"Liu Mengdi","year":"2024","unstructured":"[14] Mengdi Liu, Xianyong Zhang, and Zhiwen Mo. A new probabilistic hesitant fuzzy multi-attribute group decision making methodbased on improved distance measures. Joural of Shandong University (Natural Science), 59(03):118\u2013126, January 2024."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40815-017-0311-4"},{"issue":"6","key":"e_1_3_2_1_16_1","first-page":"256","article-title":"Q-Rung Orthopair Hesitant Fuzzy TOPSIS Method Under Unknown Attribute Weigh","volume":"58","author":"Jin Gui","year":"2022","unstructured":"[16] Gui Jin, Ligang Zhou, Peng Wu, and Xinyue Liu. Q-Rung Orthopair Hesitant Fuzzy TOPSIS Method Under Unknown Attribute Weigh. Computer Engineering and Applications, 58(6):256\u2013263, March 2022.","journal-title":"Computer Engineering and Applications"},{"issue":"3","key":"e_1_3_2_1_17_1","first-page":"66","article-title":"TOPSIS method with intuitionistic hesitant fuzzy sets","volume":"27","author":"Tan Chunqiao","year":"2018","unstructured":"[17] Chunqiao Tan and Shuai Zhi. TOPSIS method with intuitionistic hesitant fuzzy sets. Operations Research and Management Science, 27(3):66\u201373, 2018.","journal-title":"Operations Research and Management Science"},{"issue":"7","key":"e_1_3_2_1_18_1","first-page":"1146","article-title":"Interval-valued hesitant fuzzy TOPSIS decision making method with group consistency","volume":"40","author":"Liang Wei","year":"2020","unstructured":"[18] Wei Liang and Yingming Wang. Interval-valued hesitant fuzzy TOPSIS decision making method with group consistency. Journal of Systems Science and Mathematical Sciences, 40(7):1146\u20131156, July 2020.","journal-title":"Journal of Systems Science and Mathematical Sciences"}],"event":{"name":"HP3C 2024: 2024 8th International Conference on High Performance Compilation, Computing and Communications","acronym":"HP3C 2024","location":"Guangzhou China"},"container-title":["Proceedings of the 2024 8th International Conference on High Performance Compilation, Computing and Communications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3675018.3675772","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3675018.3675772","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:03:14Z","timestamp":1750291394000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3675018.3675772"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,7]]},"references-count":18,"alternative-id":["10.1145\/3675018.3675772","10.1145\/3675018"],"URL":"https:\/\/doi.org\/10.1145\/3675018.3675772","relation":{},"subject":[],"published":{"date-parts":[[2024,6,7]]},"assertion":[{"value":"2024-08-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}