{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:06:13Z","timestamp":1771697173346,"version":"3.50.1"},"reference-count":32,"publisher":"Zhejiang University Press","issue":"9","license":[{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front Inform Technol Electron Eng"],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1631\/fitee.2300662","type":"journal-article","created":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T06:01:56Z","timestamp":1727676116000},"page":"1209-1225","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["OntoCSD: an ontology-based security model for an integrated solution of cyberspace defense","OntoCSD: \u57fa\u4e8e\u672c\u4f53\u7684\u7f51\u7edc\u7a7a\u95f4\u9632\u5fa1\u7efc\u5408\u89e3\u51b3\u65b9\u6848\u5b89\u5168\u6a21\u578b"],"prefix":"10.1631","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5214-387X","authenticated-orcid":false,"given":"Dandan","family":"Wu","sequence":"first","affiliation":[]},{"given":"Jie","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Ruiyun","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Ke","family":"Chen","sequence":"additional","affiliation":[]}],"member":"635","published-online":{"date-parts":[[2024,9,30]]},"reference":[{"issue":"1","key":"ref1","first-page":"184","article-title":"An extensible description model of cyber war system","volume-title":"J Natl Univ Def Technol","volume":"36","author":"Deng","year":"2014"},{"issue":"8","key":"ref2","first-page":"14","article-title":"Research progress in secu-rityontology","volume-title":"Comput Sci","volume":"39","author":"Gao","year":"2012"},{"issue":"12","key":"ref3","first-page":"1139","article-title":"Research on key technologies of ontology based threat modeling for cyber range","volume-title":"J CAEIT","volume":"15","author":"Gong","year":"2020"},{"issue":"7","key":"ref4","first-page":"761","article-title":"Intelligent road-network selection using cases based reasoning","volume-title":"Acta Geod Carto-graph Sin","volume":"43","author":"Guo","year":"2014"},{"issue":"12","key":"ref5","first-page":"1717","article-title":"A method of road network selection based on case and ontology reasoning","volume-title":"Acta Geod Cartograph Sin","volume":"50","author":"Guo","year":"2021"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2022.107088"},{"issue":"3","key":"ref7","first-page":"344","article-title":"Automatic line simplification algorithm selecting and parameter setting based on case-based reasoning","volume-title":"Geomat Inform Sci Wuhan Univ","volume":"45","author":"He","year":"2020"},{"issue":"S2","key":"ref8","first-page":"95","article-title":"Network security situation know-ledge base model based on ontology","volume":"34","author":"Hua","year":"2014","journal-title":"J Comput Appl"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2746266.2746278"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.2514\/1.i010989"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1631\/fitee.2200060"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.eng.2018.01.004"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30796-7_13"},{"issue":"2","key":"ref14","first-page":"149","article-title":"Ontology-based knowledge management model for high-speed railway onboard equipment mainte-nance cases","volume-title":"Railw Stand Des","volume":"66","author":"Li","year":"2022"},{"issue":"3","key":"ref15","first-page":"745","article-title":"Situational awareness ontology modeling for threat from space cyber operations","volume-title":"Syst Eng Electron","volume":"45","author":"Liu","year":"2023"},{"issue":"3","key":"ref16","first-page":"90","article-title":"Study on cyberspace situation ontology for situation awareness","volume-title":"Fire Contr Command Contr","volume":"45","author":"Liu","year":"2020"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3397056.3397083"},{"issue":"2","key":"ref18","first-page":"15","article-title":"Survey on the development of mimic defense in cyberspace: from mimic concept to \u201cmimic+\u201d ecology","volume-title":"Chin J Netw Inform Secur","volume":"8","author":"Ma","year":"2022"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/icrami52622.2021.9585984"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102751"},{"key":"ref21","article-title":"A product line approach to the development of advanced emergency plans","author":"Penad\u00e9s","year":"2011","journal-title":"Proc 8th Int Conf on Information Systems for Crisis Response and Management"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/p18-1199"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-1922-2_1"},{"issue":"5","key":"ref24","first-page":"173","article-title":"Research on network security situational elements knowledge base model based on ontology","volume-title":"Comput Sci","volume":"42","author":"Si","year":"2015"},{"issue":"2","key":"ref25","first-page":"4959","article-title":"Ontology for data integration in honeynet","volume":"13","author":"Silva","year":"2023","journal-title":"Res Milit"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.08.004"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11950"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1049\/cje.2020.02.017"},{"key":"ref29","volume-title":"Ontology-Based Digital Method and Application of Urban Rail Transit Emergency Plan","author":"Zhang","year":"2012"},{"issue":"12","key":"ref30","first-page":"2735","article-title":"IoT security knowledge reasoning method of multi-source data fusion","volume-title":"J Comput Res Dev","volume":"59","author":"Zhang","year":"2022"},{"issue":"8","key":"ref31","first-page":"17","article-title":"Ontology-based know-ledge modeling of metro emergency response plan and construction of case database","volume-title":"Urban Mass Transit","volume":"25","author":"Zhang","year":"2022"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.10.082"}],"container-title":["Frontiers of Information Technology &amp; Electronic Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.2300662.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1631\/FITEE.2300662\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.2300662.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T06:37:11Z","timestamp":1771655831000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1631\/FITEE.2300662"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9]]},"references-count":32,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["2032"],"URL":"https:\/\/doi.org\/10.1631\/fitee.2300662","relation":{},"ISSN":["2095-9184","2095-9230"],"issn-type":[{"value":"2095-9184","type":"print"},{"value":"2095-9230","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9]]},"assertion":[{"value":"27 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 February 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 September 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"All the authors declare that they have no conflict of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}