{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:59Z","timestamp":1750309559098,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,21]],"date-time":"2024-11-21T00:00:00Z","timestamp":1732147200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,21]]},"DOI":"10.1145\/3708657.3708758","type":"proceedings-article","created":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T11:13:43Z","timestamp":1748517223000},"page":"625-631","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on High Suspicious IP Detection Technology Based on Multi source Heterogeneous Data"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-4569-4192","authenticated-orcid":false,"given":"Jia","family":"Liu","sequence":"first","affiliation":[{"name":"School of Software\u00b5electronics, School of Software &amp; Microelectronics,Peking University, Beijing, Beijing, China, and Vice General Manager, SDIC CLOUD-TECH CO., LTD, Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-0343-7923","authenticated-orcid":false,"given":"Fei","family":"Wang","sequence":"additional","affiliation":[{"name":"Cloud and Network Security Department, SDIC CLOUD-TECH CO.,LTD, Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-4301-054X","authenticated-orcid":false,"given":"Ming","family":"Yan","sequence":"additional","affiliation":[{"name":"Cloud and Network Security Department, SDIC CLOUD-TECH CO.,LTD, Beijing, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,5,29]]},"reference":[{"key":"e_1_3_3_1_1_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102939"},{"key":"e_1_3_3_1_2_2","volume-title":"Research on Technical System for Cyberspace Surveying and Mapping[C]\/\/International Conference on Artificial Intelligence and Security","author":"Kou W","year":"2022","unstructured":"Kou W, Ni L, Du J. Research on Technical System for Cyberspace Surveying and Mapping[C]\/\/International Conference on Artificial Intelligence and Security. Cham: Springer International Publishing, 2022: 566-574"},{"volume-title":"Argentina: International Conference on Computing for Sustainable Global Development, IEEE","author":"Singh M","key":"e_1_3_3_1_3_2","unstructured":"Singh M, Bhandari P. Building a framework for network security situation awareness[C]. Argentina: International Conference on Computing for Sustainable Global Development, IEEE, 2016: 1256-1263."},{"volume-title":"Qinhuangdao: International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering, IEEE","author":"Wang X","key":"e_1_3_3_1_4_2","unstructured":"Wang X, Han Z, Yu R. Security situation prediction method of industrial control network based on ant colony-RBF neural network[C]. Qinhuangdao: International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering, IEEE, 2021: 623-629."},{"issue":"2","key":"e_1_3_3_1_5_2","first-page":"1","article-title":"Application of fractal neural network in network security situation awareness[J]","volume":"30","author":"Ding C","year":"2022","unstructured":"Ding C, Chen Y, Algarni A M, et al. Application of fractal neural network in network security situation awareness[J]. Interdisciplinary Journal on the Complex Geometry of Nature, 2022, 30(2) : 1-13.","journal-title":"Interdisciplinary Journal on the Complex Geometry of Nature"},{"key":"e_1_3_3_1_6_2","volume-title":"A Comparative Analysis of Port Scanning Tool Efficacy[J]. arXiv preprint arXiv:2303.11282","author":"Pittman J M","year":"2023","unstructured":"Pittman J M. A Comparative Analysis of Port Scanning Tool Efficacy[J]. arXiv preprint arXiv:2303.11282, 2023.."},{"key":"e_1_3_3_1_7_2","volume-title":"Programmable Active Scans Controlled by Passive Traffic Inference for IoT Asset Characterization[C]\/\/NOMS 2023-2023 IEEE\/IFIP Network Operations and Management Symposium","author":"Sullivan H","year":"2023","unstructured":"Sullivan H, Sivanathan A, Hamza A, et al. Programmable Active Scans Controlled by Passive Traffic Inference for IoT Asset Characterization[C]\/\/NOMS 2023-2023 IEEE\/IFIP Network Operations and Management Symposium. IEEE, 2023: 1-6."},{"key":"e_1_3_3_1_8_2","volume-title":"Cyberspace surveying and mapping: Hierarchical model and resource formalization[C]\/\/IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","author":"Xu R","year":"2019","unstructured":"Xu R, Zhang Z Y, Rao Z H, et al. Cyberspace surveying and mapping: Hierarchical model and resource formalization[C]\/\/IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, 2019: 68-72."},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.3390\/ijgi12090353"},{"key":"e_1_3_3_1_10_2","volume-title":"Cyberspace Geography and Cyber Terrain: Challenges Producing a Universal map of Cyberspace[C]\/\/European Conference on Cyber Warfare and Security","author":"Grandin A.","year":"2023","unstructured":"Grandin A. Cyberspace Geography and Cyber Terrain: Challenges Producing a Universal map of Cyberspace[C]\/\/European Conference on Cyber Warfare and Security. 2023, 22(1): 207-213"}],"event":{"name":"ICCIP 2024: 2024 the 10th International Conference on Communication and Information Processing","acronym":"ICCIP 2024","location":"Lingshui Hainan China"},"container-title":["Proceedings of the 2024 10th International Conference on Communication and Information Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3708657.3708758","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3708657.3708758","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:58Z","timestamp":1750295938000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3708657.3708758"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,21]]},"references-count":10,"alternative-id":["10.1145\/3708657.3708758","10.1145\/3708657"],"URL":"https:\/\/doi.org\/10.1145\/3708657.3708758","relation":{},"subject":[],"published":{"date-parts":[[2024,11,21]]},"assertion":[{"value":"2025-05-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}