{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T22:41:06Z","timestamp":1776811266141,"version":"3.51.2"},"reference-count":15,"publisher":"European Society of Computational Methods in Sciences and Engineering","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCM"],"published-print":{"date-parts":[[2020,4,10]]},"DOI":"10.3233\/jcm-193574","type":"journal-article","created":{"date-parts":[[2019,6,4]],"date-time":"2019-06-04T12:47:56Z","timestamp":1559652476000},"page":"13-24","source":"Crossref","is-referenced-by-count":4,"title":["Research on anomaly detection of network security situation based on interval estimation"],"prefix":"10.66113","volume":"20","author":[{"given":"Liang","family":"Shen","sequence":"first","affiliation":[]},{"given":"Zhicheng","family":"Wen","sequence":"additional","affiliation":[]}],"member":"55691","reference":[{"issue":"4","key":"10.3233\/JCM-193574_ref1","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1145\/332051.332079","article-title":"Intrusion detection systems and multisensory data fusion: creating cyberspace situational awareness","volume":"43","author":"Bass","year":"2000","journal-title":"Communications of the ACM"},{"issue":"2","key":"10.3233\/JCM-193574_ref2","doi-asserted-by":"crossref","first-page":"764","DOI":"10.1016\/j.cie.2018.01.006","article-title":"Study on network security situation awareness based on particle swarm optimization algorithm","volume":"125","author":"Zhao","year":"2018","journal-title":"Computers & Industrial Engineering"},{"key":"10.3233\/JCM-193574_ref3","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/s13218-012-0179-2","article-title":"Sol: an agent-based framework for cyber situation awareness","volume":"26","author":"Bradshaw","year":"2012","journal-title":"K\u00fcnstl Intell Springer"},{"issue":"10","key":"10.3233\/JCM-193574_ref4","first-page":"3689","article-title":"Network security situation prediction method based on hidden Markov model","volume":"46","author":"Wen","year":"2015","journal-title":"Journal of Central South University (Science and Technology)"},{"issue":"4","key":"10.3233\/JCM-193574_ref5","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1108\/IJICC-06-2017-0066","article-title":"A new method for the prediction of network security situations based on recurrent neural network with gated recurrent unit","volume":"11","author":"Wei","year":"2018","journal-title":"International Journal of Intelligent Computing and Cybernetics"},{"issue":"3","key":"10.3233\/JCM-193574_ref6","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1057\/ivs.2010.5","article-title":"A multi-phase network situational awareness cognitive task analysis","volume":"9","author":"Erbachera","year":"2010","journal-title":"Information Visualization"},{"issue":"19","key":"10.3233\/JCM-193574_ref7","first-page":"97","article-title":"Method of network security situation prediction based on likelihood BP","volume":"36","author":"Tang","year":"2009","journal-title":"Computer Science"},{"issue":"10","key":"10.3233\/JCM-193574_ref8","first-page":"122","article-title":"Quantitative method for network security situation based on attack prediction","volume":"38","author":"Hu","year":"2017","journal-title":"Journal on Communications"},{"issue":"1","key":"10.3233\/JCM-193574_ref9","first-page":"187","article-title":"Network security situation evaluation method for multi-step attack","volume":"38","author":"Yang","year":"2017","journal-title":"Journal on Communications"},{"issue":"6","key":"10.3233\/JCM-193574_ref10","first-page":"1248","article-title":"A new network security situation optimization prediction algorithm based on quantum evolutionary strategy","volume":"35","author":"Guo","year":"2014","journal-title":"Mini-Micro Computer System"},{"issue":"2","key":"10.3233\/JCM-193574_ref11","first-page":"303","article-title":"A real-time network security situation prediction method","volume":"35","author":"Huang","year":"2014","journal-title":"Mini-Micro Computer System"},{"issue":"1","key":"10.3233\/JCM-193574_ref12","first-page":"144","article-title":"Network anomaly detector based on multiple time series analysis","volume":"49","author":"Cheng","year":"2017","journal-title":"Advanced Engineering Sciences"},{"issue":"5","key":"10.3233\/JCM-193574_ref13","first-page":"59","article-title":"Research on grey bayesian interval estimation of system parameters in random information","volume":"35","author":"Li","year":"2011","journal-title":"Journal of Southwest China Normal University (Natural Science Edition)"},{"issue":"2","key":"10.3233\/JCM-193574_ref14","first-page":"364","article-title":"Energy detection algorithm for noise power uncertainty interval estimation and reduced SNR WALL deterioration","volume":"36","author":"Xie","year":"2014","journal-title":"Journal of Electronics & Information Technology"},{"issue":"12","key":"10.3233\/JCM-193574_ref15","first-page":"1","article-title":"Interval estimation of sensor fault for linear systems","volume":"35","author":"Zhang","year":"2018","journal-title":"Control Theory & Applications"}],"container-title":["Journal of Computational Methods in Sciences and Engineering"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JCM-193574","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T22:05:54Z","timestamp":1776809154000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JCM-193574"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,10]]},"references-count":15,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.3233\/jcm-193574","relation":{},"ISSN":["1472-7978","1875-8983"],"issn-type":[{"value":"1472-7978","type":"print"},{"value":"1875-8983","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,10]]}}}