{"id":"https://openalex.org/W4206285996","doi":"https://doi.org/10.1142/s0219265921430295","title":"An ISM-based Analysis Method on the Influencing Factors of Network Security Situation (NSS)","display_name":"An ISM-based Analysis Method on the Influencing Factors of Network Security Situation (NSS)","publication_year":2022,"publication_date":"2022-01-17","ids":{"openalex":"https://openalex.org/W4206285996","doi":"https://doi.org/10.1142/s0219265921430295"},"language":"en","primary_location":{"id":"doi:10.1142/s0219265921430295","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0219265921430295","pdf_url":null,"source":{"id":"https://openalex.org/S63112013","display_name":"Journal of Interconnection Networks","issn_l":"0219-2659","issn":["0219-2659","1793-6713"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Interconnection Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103121566","display_name":"Bing Xiao","orcid":null},"institutions":[{"id":"https://openalex.org/I4210122543","display_name":"Guangdong Polytechnic Normal University","ror":"https://ror.org/02pcb5m77","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210122543"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Bing Xiao","raw_affiliation_strings":["School of Computer Science, Guangdong Polytechnic Normal University, Guangzhou 510665, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Guangdong Polytechnic Normal University, Guangzhou 510665, P. R. China","institution_ids":["https://openalex.org/I4210122543"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085070266","display_name":"Yanyong Lan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210122543","display_name":"Guangdong Polytechnic Normal University","ror":"https://ror.org/02pcb5m77","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210122543"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanyong Lan","raw_affiliation_strings":["School of Computer Science, Guangdong Polytechnic Normal University, Guangzhou 510665, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Guangdong Polytechnic Normal University, Guangzhou 510665, P. R. China","institution_ids":["https://openalex.org/I4210122543"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101203217","display_name":"Huiming Zhao","orcid":null},"institutions":[{"id":"https://openalex.org/I4210122543","display_name":"Guangdong Polytechnic Normal University","ror":"https://ror.org/02pcb5m77","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210122543"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huiming Zhao","raw_affiliation_strings":["School of Computer Science, Guangdong Polytechnic Normal University, Guangzhou 510665, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Guangdong Polytechnic Normal University, Guangzhou 510665, P. R. China","institution_ids":["https://openalex.org/I4210122543"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057753330","display_name":"Xiaolin Wu","orcid":"https://orcid.org/0000-0001-5936-6021"},"institutions":[{"id":"https://openalex.org/I4210122543","display_name":"Guangdong Polytechnic Normal University","ror":"https://ror.org/02pcb5m77","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210122543"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaolin Wu","raw_affiliation_strings":["School of Computer Science, Guangdong Polytechnic Normal University, Guangzhou 510665, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Guangdong Polytechnic Normal University, Guangzhou 510665, P. R. China","institution_ids":["https://openalex.org/I4210122543"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101917066","display_name":"Weibin Liu","orcid":"https://orcid.org/0000-0001-6246-0051"},"institutions":[{"id":"https://openalex.org/I4210122543","display_name":"Guangdong Polytechnic Normal University","ror":"https://ror.org/02pcb5m77","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210122543"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weibin Liu","raw_affiliation_strings":["School of Computer Science, Guangdong Polytechnic Normal University, Guangzhou 510665, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Guangdong Polytechnic Normal University, Guangzhou 510665, P. R. China","institution_ids":["https://openalex.org/I4210122543"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5103121566"],"corresponding_institution_ids":["https://openalex.org/I4210122543"],"apc_list":null,"apc_paid":null,"fwci":1.105,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.77498856,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"22","issue":"Supp02","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9753999710083008,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6656232476234436},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6353781819343567},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5836384296417236},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5224401354789734},{"id":"https://openalex.org/keywords/asset","display_name":"Asset (computer security)","score":0.516737163066864},{"id":"https://openalex.org/keywords/offensive","display_name":"Offensive","score":0.4643481373786926},{"id":"https://openalex.org/keywords/path-analysis","display_name":"Path analysis (statistics)","score":0.42831748723983765},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.35091888904571533},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.32230037450790405},{"id":"https://openalex.org/keywords/operations-research","display_name":"Operations research","score":0.114239901304245}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6656232476234436},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6353781819343567},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5836384296417236},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5224401354789734},{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.516737163066864},{"id":"https://openalex.org/C176856949","wikidata":"https://www.wikidata.org/wiki/Q2001676","display_name":"Offensive","level":2,"score":0.4643481373786926},{"id":"https://openalex.org/C82793941","wikidata":"https://www.wikidata.org/wiki/Q1046024","display_name":"Path analysis (statistics)","level":2,"score":0.42831748723983765},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.35091888904571533},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.32230037450790405},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.114239901304245},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s0219265921430295","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0219265921430295","pdf_url":null,"source":{"id":"https://openalex.org/S63112013","display_name":"Journal of Interconnection Networks","issn_l":"0219-2659","issn":["0219-2659","1793-6713"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Interconnection Networks","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2028926203","https://openalex.org/W2415363243","https://openalex.org/W2904233487","https://openalex.org/W2904529034","https://openalex.org/W2967570265","https://openalex.org/W2990976795","https://openalex.org/W3020828406","https://openalex.org/W3164819828","https://openalex.org/W4255099472","https://openalex.org/W4390701197","https://openalex.org/W6812340227"],"related_works":["https://openalex.org/W1568520348","https://openalex.org/W3214407891","https://openalex.org/W3194113117","https://openalex.org/W3213194066","https://openalex.org/W2967125893","https://openalex.org/W268355439","https://openalex.org/W4287020359","https://openalex.org/W4385323698","https://openalex.org/W2385362579","https://openalex.org/W3126649293"],"abstract_inverted_index":{"For":[0],"the":[1,12,30,48,66,72,94,98,116,120,132,145,148],"accuracy":[2],"of":[3,15,25,32,70,147],"network":[4,16,82,84,91],"security":[5,17,85,88],"management,":[6],"an":[7],"ISM-based":[8],"analysis":[9],"method":[10],"on":[11],"influencing":[13,34,68,96,118,134],"factors":[14,24,35,69,75,101,122],"situation":[18],"(NSS)":[19],"is":[20],"proposed.":[21],"The":[22,44,136],"17":[23],"NSS":[26,33],"were":[27],"constructed":[28],"first,":[29],"ISM":[31],"was":[36,40,141],"established,":[37],"and":[38,50,62,90,110,128],"Matlab2019":[39],"used":[41],"for":[42,139],"simulation.":[43],"results":[45],"showed":[46],"that":[47],"offensive":[49],"defensive":[51],"game":[52],"factors,":[53],"such":[54,76,102,123],"as":[55,77,103,124],"attack":[56,58,60],"method,":[57],"tool,":[59],"path,":[61],"defense":[63],"strategy,":[64],"are":[65,93,115,131],"direct":[67],"NSS;":[71],"internal":[73],"environmental":[74,100],"operating":[78],"system,":[79],"application":[80],"service,":[81],"bandwidth,":[83],"device,":[86],"user":[87],"awareness,":[89],"topology":[92],"necessary":[95],"factors;":[97,119],"external":[99],"legal":[104],"environment,":[105,107],"institutional":[106],"technical":[108],"environment":[109],"business":[111],"importance":[112],"(economic":[113],"environment)":[114],"indirect":[117],"vulnerability":[121,127],"asset":[125],"value,":[126],"open":[129],"port":[130],"fundamental":[133],"factors.":[135],"corresponding":[137],"advice":[138],"management":[140],"put":[142],"forward":[143],"at":[144],"end":[146],"paper.":[149]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1}],"updated_date":"2026-02-28T09:26:25.869077","created_date":"2025-10-10T00:00:00"}
