{"id":"https://openalex.org/W2058872795","doi":"https://doi.org/10.1109/fskd.2012.6234126","title":"The research and design of network security evaluation systems based on cloud model","display_name":"The research and design of network security evaluation systems based on cloud model","publication_year":2012,"publication_date":"2012-05-01","ids":{"openalex":"https://openalex.org/W2058872795","doi":"https://doi.org/10.1109/fskd.2012.6234126","mag":"2058872795"},"language":"en","primary_location":{"id":"doi:10.1109/fskd.2012.6234126","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fskd.2012.6234126","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 9th International Conference on Fuzzy Systems and Knowledge Discovery","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101188112","display_name":"Ziyan Shi","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Ziyan Shi","raw_affiliation_strings":["Information Combat Commanding Teaching and Research Section. Information Countermeasure Department, Air Force Radar Academy, Wuhan, China","Information Combat Commanding Teaching and Research Section. Information Countermeasure Department. Air Force Radar Academy, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Information Combat Commanding Teaching and Research Section. Information Countermeasure Department, Air Force Radar Academy, Wuhan, China","institution_ids":[]},{"raw_affiliation_string":"Information Combat Commanding Teaching and Research Section. Information Countermeasure Department. Air Force Radar Academy, Wuhan, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100742268","display_name":"Haihong Li","orcid":"https://orcid.org/0000-0002-4251-2288"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Haihong Li","raw_affiliation_strings":["Information Combat Commanding Teaching and Research Section. Information Countermeasure Department, Air Force Radar Academy, Wuhan, China","Information Combat Commanding Teaching and Research Section. Information Countermeasure Department. Air Force Radar Academy, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Information Combat Commanding Teaching and Research Section. Information Countermeasure Department, Air Force Radar Academy, Wuhan, China","institution_ids":[]},{"raw_affiliation_string":"Information Combat Commanding Teaching and Research Section. Information Countermeasure Department. Air Force Radar Academy, Wuhan, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068322067","display_name":"Boling Cheng","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Boling Cheng","raw_affiliation_strings":["Information Combat Commanding Teaching and Research Section. Information Countermeasure Department, Air Force Radar Academy, Wuhan, China","Information Combat Commanding Teaching and Research Section. Information Countermeasure Department. Air Force Radar Academy, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Information Combat Commanding Teaching and Research Section. Information Countermeasure Department, Air Force Radar Academy, Wuhan, China","institution_ids":[]},{"raw_affiliation_string":"Information Combat Commanding Teaching and Research Section. Information Countermeasure Department. Air Force Radar Academy, Wuhan, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101188112"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.7105,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.81334815,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"4","issue":null,"first_page":"2265","last_page":"2269"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13832","display_name":"Advanced Decision-Making Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13832","display_name":"Advanced Decision-Making Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14368","display_name":"Evaluation and Optimization Models","score":0.9801999926567078,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13955","display_name":"Evaluation Methods in Various Fields","score":0.9772999882698059,"subfield":{"id":"https://openalex.org/subfields/2302","display_name":"Ecological Modeling"},"field":{"id":"https://openalex.org/fields/23","display_name":"Environmental Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7893572449684143},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.702472448348999},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.6012227535247803},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.49009689688682556},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4459267854690552},{"id":"https://openalex.org/keywords/nonlinear-system","display_name":"Nonlinear system","score":0.4420319199562073},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.4126031994819641},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3766665756702423}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7893572449684143},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.702472448348999},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.6012227535247803},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.49009689688682556},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4459267854690552},{"id":"https://openalex.org/C158622935","wikidata":"https://www.wikidata.org/wiki/Q660848","display_name":"Nonlinear system","level":2,"score":0.4420319199562073},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.4126031994819641},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3766665756702423},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/fskd.2012.6234126","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fskd.2012.6234126","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 9th International Conference on Fuzzy Systems and Knowledge Discovery","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W1987630714","https://openalex.org/W1999565912","https://openalex.org/W2051321581","https://openalex.org/W4378619706","https://openalex.org/W6832052643"],"related_works":["https://openalex.org/W2931996793","https://openalex.org/W2028121791","https://openalex.org/W4205234238","https://openalex.org/W2788934790","https://openalex.org/W3167767780","https://openalex.org/W3148880067","https://openalex.org/W4205923274","https://openalex.org/W3043682580","https://openalex.org/W2941559775","https://openalex.org/W3142266060"],"abstract_inverted_index":{"Cloud":[0],"model":[1,20,34,88],"is":[2,15,57],"an":[3],"effective":[4],"tool":[5],"for":[6,67],"qualitative":[7,47],"and":[8,24,39,41,48,73,96],"quantitative":[9],"transform,":[10],"a":[11],"specific":[12],"structure":[13,29],"generator":[14],"formed":[16],"by":[17],"normal":[18,32],"cloud":[19,33,87],"through":[21],"expectation,":[22],"entropy":[23],"hyper":[25],"entropy.":[26],"This":[27],"particular":[28],"makes":[30],"the":[31,68,91,97,101],"has":[35],"more":[36],"general":[37],"applicability":[38],"simply":[40],"straightforward":[42],"completed":[43],"conversion":[44],"process":[45],"between":[46],"quantitative.":[49],"Since":[50],"The":[51,86],"frequency":[52],"of":[53,81],"network":[54,62,92,102],"security":[55,63,93,103],"incidents":[56,82],"nonlinear,":[58],"traditional":[59],"prediction":[60],"methods":[61,99],"incidents.":[64],"which":[65],"stands":[66],"number":[69],"such":[70],"as":[71],"ARMA":[72],"Gray":[74],"systems":[75,95],"are":[76],"difficult":[77],"to":[78],"deal":[79],"with":[80],"per":[83],"unit":[84],"time.":[85],"used":[89],"in":[90,100,106],"evaluation":[94,98],"domain":[104],"presented":[105],"this":[107],"paper.":[108]},"counts_by_year":[{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
