{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T16:19:08Z","timestamp":1773591548350,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,26]],"date-time":"2024-07-26T00:00:00Z","timestamp":1721952000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,26]]},"DOI":"10.1145\/3695080.3695108","type":"proceedings-article","created":{"date-parts":[[2024,10,12]],"date-time":"2024-10-12T18:26:32Z","timestamp":1728757592000},"page":"160-166","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Dynamic Maintenance of Network Space Asset Library- Application of Neural Network Algorithms in Asset Change Perception and Confirmation Process"],"prefix":"10.1145","author":[{"given":"Chunzhi","family":"Meng","sequence":"first","affiliation":[{"name":"Information Communication Branch of Guangxi Grid Company, China"}]},{"given":"Liang","family":"Meng","sequence":"additional","affiliation":[{"name":"Information Communication Branch of Guangxi Power Grid Company, China"}]},{"given":"Mingfei","family":"Zeng","sequence":"additional","affiliation":[{"name":"Information Communication Branch of Guangxi Grid Company, China"}]},{"given":"Siwei","family":"Li","sequence":"additional","affiliation":[{"name":"Information Communication Branch of Guangxi Grid Company, China"}]}],"member":"320","published-online":{"date-parts":[[2024,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"2566","volume":"15","author":"Zhao J.","year":"2020","unstructured":"Zhao, J., Wang, J., Cao, Y., & Liu, Z. Dynamic Asset Inventory Management in Cyberspace Based on Deep Neural Network[J]. IEEE Transactions on Information Forensics and Security, 2020, 15: 2566-2578.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"e_1_3_2_1_2_1","first-page":"20","volume":"97","author":"Li Q.","year":"2021","unstructured":"Li, Q., Wang, W., & Shi, L. An Intelligent Approach for Cyberspace Asset Change Detection and Confirmation Using Convolutional Neural Networks[J]. Journal of Computer and System Sciences, 2021, 97(1): 20-33.","journal-title":"Journal of Computer and System Sciences"},{"key":"e_1_3_2_1_3_1","first-page":"103289","volume":"195","author":"Wang Y.","year":"2022","unstructured":"Wang, Y., Zhang, H., & Liu, Y. Neural Network-Based Framework for Dynamic Maintenance of Cyberspace Asset Repository[J]. Journal of Network and Computer Applications, 2022, 195: 103289.","journal-title":"Journal of Network and Computer Applications"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3015551"},{"key":"e_1_3_2_1_5_1","first-page":"102447","volume":"111","author":"Ma X.","year":"2022","unstructured":"Ma, X., Zhou, J., & He, X. An Automated System for Dynamic Asset Monitoring and Confirmation Based on Deep Learning[J]. Computers & Security, 2022, 111: 102447.","journal-title":"Computers & Security"},{"key":"e_1_3_2_1_6_1","first-page":"1","volume-title":"International Journal of Advanced Computer Science and Applications, 9(4)","author":"Al-Rodhaan M. A.","year":"2018","unstructured":"Al-Rodhaan, M. A., & Al-Dhelaan, A. M. (2018). Cybersecurity Threats and Challenges in the Internet of Things. International Journal of Advanced Computer Science and Applications, 9(4), 1-9."},{"key":"e_1_3_2_1_7_1","first-page":"59","volume-title":"International Journal of Computer Science and Network Security, 14(2)","author":"Shetty S.","year":"2014","unstructured":"Shetty, S., & Adibi, S. (2014). A Survey on Security Threats and Solutions in Cloud Computing. International Journal of Computer Science and Network Security, 14(2), 59-68."}],"event":{"name":"ICCBD 2024: 2024 International Conference on Cloud Computing and Big Data","location":"Dali China","acronym":"ICCBD 2024"},"container-title":["Proceedings of the 2024 International Conference on Cloud Computing and Big Data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3695080.3695108","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3695080.3695108","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T15:31:33Z","timestamp":1773588693000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3695080.3695108"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,26]]},"references-count":7,"alternative-id":["10.1145\/3695080.3695108","10.1145\/3695080"],"URL":"https:\/\/doi.org\/10.1145\/3695080.3695108","relation":{},"subject":[],"published":{"date-parts":[[2024,7,26]]},"assertion":[{"value":"2024-10-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}