{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T17:27:48Z","timestamp":1771003668827,"version":"3.50.1"},"reference-count":12,"publisher":"SAGE Publications","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCM"],"published-print":{"date-parts":[[2019,1,9]]},"DOI":"10.3233\/jcm-180873","type":"journal-article","created":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T12:36:48Z","timestamp":1540557408000},"page":"153-167","source":"Crossref","is-referenced-by-count":6,"title":["Network security situation prediction in the cloud environment based on grey neural network1"],"prefix":"10.1177","volume":"19","author":[{"given":"Liang","family":"Shen","sequence":"first","affiliation":[]},{"given":"Zhicheng","family":"Wen","sequence":"additional","affiliation":[]}],"member":"179","reference":[{"issue":"4","key":"10.3233\/JCM-180873_ref1","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1145\/332051.332079","article-title":"Intrusion detection systems and multisensory data fusion: Creating cyberspace situational awareness","volume":"43","author":"Bass","year":"2000","journal-title":"Communications of the ACM"},{"issue":"8","key":"10.3233\/JCM-180873_ref2","first-page":"1681","article-title":"Network situation prediction method based on spatial-time dimension analysis","volume":"51","author":"Liu","year":"2014","journal-title":"Journal of Computer Research and Development"},{"issue":"2","key":"10.3233\/JCM-180873_ref4","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1037\/a0031257","article-title":"Situation awareness as an ignored factor in the behavioral consistency paradigm underlying the validity of personnel selection procedures","volume":"98","author":"Jansen","year":"2013","journal-title":"Journal of Applied Psychology"},{"issue":"6","key":"10.3233\/JCM-180873_ref5","first-page":"1248","article-title":"A new optimized algorithm based on quantum evolutionary strategy for network security situation prediction","volume":"35","author":"Guo","year":"2014","journal-title":"Journal of Chinese Computer Systems"},{"issue":"12","key":"10.3233\/JCM-180873_ref6","first-page":"1750","article-title":"Network security situation awareness based on neural networks","volume":"53","author":"Xie","year":"2013","journal-title":"J Tsinghua Univ (Sci & Technol)"},{"issue":"2","key":"10.3233\/JCM-180873_ref7","first-page":"303","article-title":"An approach to real-time network security situation prediction","volume":"35","author":"Huang","year":"2014","journal-title":"Journal of Chinese Computer Systems"},{"issue":"4","key":"10.3233\/JCM-180873_ref8","first-page":"749","article-title":"An improved quantitative evaluation method for network security","volume":"38","author":"Xi","year":"2015","journal-title":"Chinese Journal of Computers"},{"issue":"3","key":"10.3233\/JCM-180873_ref10","first-page":"353","article-title":"A network security situational awareness model based on information fusion","volume":"46","author":"Wei","year":"2009","journal-title":"Journal of Computer Research and Development"},{"issue":"10","key":"10.3233\/JCM-180873_ref11","first-page":"122","article-title":"Quantitative method for network security situation based on attack prediction","volume":"38","author":"Hu","year":"2017","journal-title":"Journal on Communications"},{"issue":"6","key":"10.3233\/JCM-180873_ref12","first-page":"1860","article-title":"Awareness of network security situation based on grey relational analysis and support vector machine","volume":"30","author":"Wang","year":"2013","journal-title":"Application Research of Computers"},{"issue":"2","key":"10.3233\/JCM-180873_ref13","first-page":"556","article-title":"Hierarchical situation evaluation model for network information content security incidents","volume":"46","author":"Ge","year":"2016","journal-title":"Journal of Jilin University (Engineering and Technology Edition)"},{"issue":"1","key":"10.3233\/JCM-180873_ref14","first-page":"187","article-title":"Network security situation evaluation method for multi-step attack","volume":"38","author":"Yang","year":"2017","journal-title":"Journal on Communications"}],"container-title":["Journal of Computational Methods in Sciences and Engineering"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JCM-180873","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T16:32:28Z","timestamp":1771000348000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JCM-180873"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,9]]},"references-count":12,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.3233\/jcm-180873","relation":{},"ISSN":["1472-7978","1875-8983"],"issn-type":[{"value":"1472-7978","type":"print"},{"value":"1875-8983","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,9]]}}}