{"id":"https://openalex.org/W3122625965","doi":"https://doi.org/10.1007/978-981-33-4922-3_6","title":"Research on Industrial Internet Security Emergency Management Framework Based on Blockchain: Take China as an Example","display_name":"Research on Industrial Internet Security Emergency Management Framework Based on Blockchain: Take China as an Example","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3122625965","doi":"https://doi.org/10.1007/978-981-33-4922-3_6","mag":"3122625965"},"language":"en","primary_location":{"id":"doi:10.1007/978-981-33-4922-3_6","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-981-33-4922-3_6","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-981-33-4922-3_6.pdf","source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007%2F978-981-33-4922-3_6.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101976753","display_name":"Huang Hai-bo","orcid":"https://orcid.org/0000-0002-7391-9697"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]},{"id":"https://openalex.org/I4210118281","display_name":"National Earthquake Response Support Service","ror":"https://ror.org/02gzvm828","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210118281"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haibo Huang","raw_affiliation_strings":["Beijing University of Posts and Telecommunications, Beijing, 100876, China","China Industrial Control Systems Cyber Security Response Team, Beijing, 100040, China"],"raw_orcid":"https://orcid.org/0000-0002-7391-9697","affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications, Beijing, 100876, China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"China Industrial Control Systems Cyber Security Response Team, Beijing, 100040, China","institution_ids":["https://openalex.org/I4210118281"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103250540","display_name":"Yuxi Gao","orcid":"https://orcid.org/0000-0001-5948-5362"},"institutions":[{"id":"https://openalex.org/I4210118281","display_name":"National Earthquake Response Support Service","ror":"https://ror.org/02gzvm828","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210118281"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuxi Gao","raw_affiliation_strings":["China Industrial Control Systems Cyber Security Response Team, Beijing, 100040, China"],"raw_orcid":"https://orcid.org/0000-0001-5948-5362","affiliations":[{"raw_affiliation_string":"China Industrial Control Systems Cyber Security Response Team, Beijing, 100040, China","institution_ids":["https://openalex.org/I4210118281"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101713386","display_name":"Min Yan","orcid":"https://orcid.org/0000-0002-8832-2009"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Min Yan","raw_affiliation_strings":["Institute of Software, Chinese Academy of Sciences, Beijing, 100093, China"],"raw_orcid":"https://orcid.org/0000-0002-8832-2009","affiliations":[{"raw_affiliation_string":"Institute of Software, Chinese Academy of Sciences, Beijing, 100093, China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100330745","display_name":"Xiaofan Zhang","orcid":"https://orcid.org/0000-0003-4867-6352"},"institutions":[{"id":"https://openalex.org/I4210118281","display_name":"National Earthquake Response Support Service","ror":"https://ror.org/02gzvm828","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210118281"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaofan Zhang","raw_affiliation_strings":["China Industrial Control Systems Cyber Security Response Team, Beijing, 100040, China"],"raw_orcid":"https://orcid.org/0000-0003-4867-6352","affiliations":[{"raw_affiliation_string":"China Industrial Control Systems Cyber Security Response Team, Beijing, 100040, China","institution_ids":["https://openalex.org/I4210118281"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101976753"],"corresponding_institution_ids":["https://openalex.org/I139759216","https://openalex.org/I4210118281"],"apc_list":null,"apc_paid":null,"fwci":0.4589,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.67636425,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"71","last_page":"85"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9847999811172485,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.8779177665710449},{"id":"https://openalex.org/keywords/traceability","display_name":"Traceability","score":0.6905038356781006},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6480855941772461},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5005021095275879},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4678412675857544},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.437768816947937},{"id":"https://openalex.org/keywords/information-assurance","display_name":"Information assurance","score":0.4289632737636566},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.41349726915359497},{"id":"https://openalex.org/keywords/emergency-management","display_name":"Emergency management","score":0.41151130199432373},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3656418025493622},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.3628966808319092},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.362507164478302},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3237454295158386},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.09914156794548035}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.8779177665710449},{"id":"https://openalex.org/C153876917","wikidata":"https://www.wikidata.org/wiki/Q899704","display_name":"Traceability","level":2,"score":0.6905038356781006},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6480855941772461},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5005021095275879},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4678412675857544},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.437768816947937},{"id":"https://openalex.org/C2780795517","wikidata":"https://www.wikidata.org/wiki/Q6030997","display_name":"Information assurance","level":3,"score":0.4289632737636566},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.41349726915359497},{"id":"https://openalex.org/C62555980","wikidata":"https://www.wikidata.org/wiki/Q1460420","display_name":"Emergency management","level":2,"score":0.41151130199432373},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3656418025493622},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.3628966808319092},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.362507164478302},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3237454295158386},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.09914156794548035},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-981-33-4922-3_6","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-981-33-4922-3_6","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-981-33-4922-3_6.pdf","source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.1007/978-981-33-4922-3_6","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-981-33-4922-3_6","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-981-33-4922-3_6.pdf","source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5389229631","display_name":null,"funder_award_id":"2018YFB2100400","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3122625965.pdf","grobid_xml":"https://content.openalex.org/works/W3122625965.grobid-xml"},"referenced_works_count":9,"referenced_works":["https://openalex.org/W162076806","https://openalex.org/W629406306","https://openalex.org/W1936442755","https://openalex.org/W2106278016","https://openalex.org/W2914409645","https://openalex.org/W2944145405","https://openalex.org/W2946260370","https://openalex.org/W2963591109","https://openalex.org/W2971944335"],"related_works":["https://openalex.org/W3216065934","https://openalex.org/W2488601579","https://openalex.org/W1761928473","https://openalex.org/W2991148700","https://openalex.org/W2391901998","https://openalex.org/W2066272013","https://openalex.org/W4241003180","https://openalex.org/W1573839549","https://openalex.org/W2351247954","https://openalex.org/W4232461742"],"abstract_inverted_index":{"Abstract":[0],"Building":[1],"a":[2],"national":[3],"unified":[4],"ISEMS":[5,29],"(industrial":[6],"internet":[7],"security":[8,35,46],"emergency":[9,81,121],"management":[10,25,82],"system)":[11],"plays":[12],"an":[13,44],"important":[14],"role":[15],"in":[16],"industrial":[17],"cybersecurity":[18],"defense.":[19],"However,":[20],"due":[21],"to":[22,42],"technical":[23],"and":[24,40,54,89,97,104,120],"constraints,":[26],"the":[27,60,77,80,87,94,102,106],"current":[28],"has":[30,59],"problems":[31],"such":[32],"as":[33],"scattered":[34],"organizations,":[36],"poor":[37],"sharing":[38],"channels,":[39],"fails":[41],"form":[43],"overall":[45],"guarantee":[47],"capability":[48],"for":[49],"threat":[50,114],"reporting,":[51],"analyzing,":[52],"warning,":[53],"disposing.":[55],"The":[56],"blockchain":[57],"technology":[58],"characters":[61],"of":[62,79,91,110],"decentralized":[63],"trust":[64],"construction,":[65],"inter-organizational":[66],"data":[67,69,72],"sharing,":[68],"integrity":[70],"assurance,":[71],"traceability,":[73],"which":[74],"just":[75],"meets":[76],"requirements":[78],"process.":[83],"This":[84],"paper":[85],"analyzes":[86],"situation":[88],"challenges":[90],"ISEMS,":[92,112],"describes":[93,105],"system":[95],"architecture":[96],"organizational":[98],"structure":[99],"based":[100],"on":[101],"blockchain,":[103],"key":[107],"implementation":[108],"processes":[109],"blockchain-based":[111],"including":[113],"report,":[115],"risk":[116],"analysis,":[117],"warning":[118],"release":[119],"response.":[122]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
