{"id":"https://openalex.org/W4396667819","doi":"https://doi.org/10.1515/comp-2023-0104","title":"Communication network security situation analysis based on time series data mining technology","display_name":"Communication network security situation analysis based on time series data mining technology","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4396667819","doi":"https://doi.org/10.1515/comp-2023-0104"},"language":"en","primary_location":{"id":"doi:10.1515/comp-2023-0104","is_oa":true,"landing_page_url":"https://doi.org/10.1515/comp-2023-0104","pdf_url":"https://www.degruyter.com/document/doi/10.1515/comp-2023-0104/pdf","source":{"id":"https://openalex.org/S4210177004","display_name":"Open Computer Science","issn_l":"2299-1093","issn":["2299-1093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Open Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.degruyter.com/document/doi/10.1515/comp-2023-0104/pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109548902","display_name":"Qingjian Jiang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156834","display_name":"Institute of Economics","ror":"https://ror.org/04v31xa23","country_code":"CN","type":"facility","lineage":["https://openalex.org/I114218197","https://openalex.org/I4210156834"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qingjian Jiang","raw_affiliation_strings":["International Joint Research Laboratory for Agricultural Products Traceability of Henan , Zhengzhou 450018, Henan , China","School of Internet of Things Technology, Henan Institute of Economics and Trade , Zhengzhou 450018, Henan , China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"International Joint Research Laboratory for Agricultural Products Traceability of Henan , Zhengzhou 450018, Henan , China","institution_ids":[]},{"raw_affiliation_string":"School of Internet of Things Technology, Henan Institute of Economics and Trade , Zhengzhou 450018, Henan , China","institution_ids":["https://openalex.org/I4210156834"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5109548902"],"corresponding_institution_ids":["https://openalex.org/I4210156834"],"apc_list":{"value":1000,"currency":"EUR","value_usd":1078},"apc_paid":{"value":1000,"currency":"EUR","value_usd":1078},"fwci":0.993,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.75723663,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"14","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13832","display_name":"Advanced Decision-Making Techniques","score":0.9714999794960022,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6034764051437378},{"id":"https://openalex.org/keywords/time-series","display_name":"Time series","score":0.5834569334983826},{"id":"https://openalex.org/keywords/series","display_name":"Series (stratigraphy)","score":0.5793320536613464},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4664425551891327},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.44440606236457825},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.4165189564228058},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.405362069606781},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.09779629111289978},{"id":"https://openalex.org/keywords/geology","display_name":"Geology","score":0.08086669445037842}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6034764051437378},{"id":"https://openalex.org/C151406439","wikidata":"https://www.wikidata.org/wiki/Q186588","display_name":"Time series","level":2,"score":0.5834569334983826},{"id":"https://openalex.org/C143724316","wikidata":"https://www.wikidata.org/wiki/Q312468","display_name":"Series (stratigraphy)","level":2,"score":0.5793320536613464},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4664425551891327},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.44440606236457825},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.4165189564228058},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.405362069606781},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.09779629111289978},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.08086669445037842},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1515/comp-2023-0104","is_oa":true,"landing_page_url":"https://doi.org/10.1515/comp-2023-0104","pdf_url":"https://www.degruyter.com/document/doi/10.1515/comp-2023-0104/pdf","source":{"id":"https://openalex.org/S4210177004","display_name":"Open Computer Science","issn_l":"2299-1093","issn":["2299-1093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Open Computer Science","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:c474f065c397435eb696df88a0343c32","is_oa":true,"landing_page_url":"https://doaj.org/article/c474f065c397435eb696df88a0343c32","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Open Computer Science, Vol 14, Iss 1, Pp pp. 1-10 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1515/comp-2023-0104","is_oa":true,"landing_page_url":"https://doi.org/10.1515/comp-2023-0104","pdf_url":"https://www.degruyter.com/document/doi/10.1515/comp-2023-0104/pdf","source":{"id":"https://openalex.org/S4210177004","display_name":"Open Computer Science","issn_l":"2299-1093","issn":["2299-1093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Open Computer Science","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.7599999904632568,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4396667819.pdf"},"referenced_works_count":32,"referenced_works":["https://openalex.org/W2888963768","https://openalex.org/W2978259066","https://openalex.org/W2994537010","https://openalex.org/W3004262881","https://openalex.org/W3005006109","https://openalex.org/W3006014289","https://openalex.org/W3044515030","https://openalex.org/W3048031588","https://openalex.org/W3068850285","https://openalex.org/W3082748375","https://openalex.org/W3098798241","https://openalex.org/W3101655119","https://openalex.org/W3105324058","https://openalex.org/W3105678465","https://openalex.org/W3114496279","https://openalex.org/W3118600567","https://openalex.org/W3120726845","https://openalex.org/W3128356418","https://openalex.org/W3135300514","https://openalex.org/W3139008799","https://openalex.org/W3160611354","https://openalex.org/W3171551824","https://openalex.org/W3179235264","https://openalex.org/W3200480793","https://openalex.org/W3206399905","https://openalex.org/W4226099585","https://openalex.org/W4285291151","https://openalex.org/W4285592928","https://openalex.org/W4306366503","https://openalex.org/W4312269968","https://openalex.org/W4319150141","https://openalex.org/W4323775803"],"related_works":["https://openalex.org/W1919101720","https://openalex.org/W4390822878","https://openalex.org/W96888382","https://openalex.org/W2041308758","https://openalex.org/W4386126592","https://openalex.org/W4392529072","https://openalex.org/W2622688551","https://openalex.org/W1550175370","https://openalex.org/W1990205660","https://openalex.org/W2360633292"],"abstract_inverted_index":{"Abstract":[0],"Communication":[1],"network":[2,83,115,129,177],"security":[3,16,24,84,90,116,130,178],"situation":[4,85,117],"analysis":[5,17,43,86,118,190],"prevents":[6],"unauthorized":[7],"users":[8],"from":[9],"accessing":[10],"and":[11,22,33,69,93,132,173,205],"stealing":[12],"sensitive":[13],"information.":[14],"Network":[15],"aims":[18],"to":[19,35,51,60,112,126],"monitor,":[20],"discover,":[21],"eradicate":[23],"flaws":[25],"by":[26,44,140],"carefully":[27],"examining":[28],"the":[29,57,134,137,142,150,153,169,175,185,194],"network\u2019s":[30],"architecture,":[31],"data,":[32],"traffic":[34],"ensure":[36],"safety.":[37],"In":[38],"time":[39,120,143,180,197],"series":[40,121,144,160,181,198],"data":[41,88,122,145,162,182,195],"mining":[42,163,183,196],"cyber":[45,52],"terrorism,":[46],"specialists":[47],"must":[48],"pay":[49],"attention":[50,99],"security,":[53],"which":[54],"involves":[55],"identifying":[56],"elements":[58],"contributing":[59],"long-term":[61],"trends":[62],"or":[63],"systemic":[64],"patterns":[65],"via":[66],"pattern-matching":[67],"algorithms":[68],"other":[70],"types":[71],"of":[72,81,191,201],"inferential":[73],"processing":[74],"on":[75],"large":[76],"datasets.":[77],"The":[78,165,188],"challenging":[79],"characteristics":[80],"communication":[82,114,128,154,176],"are":[87],"loss,":[89],"breaches,":[91],"hacking,":[92],"viruses.":[94],"Hence,":[95],"in":[96,119,152,179,199],"this":[97],"research,":[98],"mechanism-based":[100],"convolutional":[101],"neural":[102],"network-enabled":[103],"practical":[104],"byzantine":[105],"fault":[106],"tolerant":[107],"(AMBCNN-PBFT)":[108],"has":[109],"been":[110],"designed":[111],"improve":[113],"mining.":[123,146],"AMBCNN-PBFT":[124,147,170,192],"helps":[125],"increase":[127],"usage":[131],"support":[133],"expansion":[135],"during":[136,184],"evaluation":[138,186],"system":[139],"optimizing":[141],"effectively":[148],"predicts":[149],"rise":[151],"network,":[155],"associated":[156],"with":[157],"faster":[158],"times":[159],"benefits":[161],"approach.":[164],"study":[166],"concludes":[167],"that":[168],"efficiently":[171],"indicates":[172],"validates":[174],"system.":[187],"experimental":[189],"outperforms":[193],"terms":[200],"accuracy,":[202],"efficiency,":[203],"performance,":[204],"prediction.":[206]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2024-05-07T00:00:00"}
