{"id":"https://openalex.org/W3087182984","doi":"https://doi.org/10.3233/jifs-189287","title":"Network security model based on active defense and passive defense hybrid strategy","display_name":"Network security model based on active defense and passive defense hybrid strategy","publication_year":2020,"publication_date":"2020-09-18","ids":{"openalex":"https://openalex.org/W3087182984","doi":"https://doi.org/10.3233/jifs-189287","mag":"3087182984"},"language":"en","primary_location":{"id":"doi:10.3233/jifs-189287","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-189287","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036238810","display_name":"Gaoli Zhao","orcid":"https://orcid.org/0000-0001-5469-4261"},"institutions":[{"id":"https://openalex.org/I4210163247","display_name":"Henan Institute of Science and Technology","ror":"https://ror.org/0578f1k82","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210163247"]},{"id":"https://openalex.org/I196699116","display_name":"Wuhan University of Technology","ror":"https://ror.org/03fe7t173","country_code":"CN","type":"education","lineage":["https://openalex.org/I196699116"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Gaoli Zhao","raw_affiliation_strings":["School of Information Engineering, Henan institute of Science and Technology, Xinxiang, China","School of Information Engineering, Wuhan University of Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Henan institute of Science and Technology, Xinxiang, China","institution_ids":["https://openalex.org/I4210163247"]},{"raw_affiliation_string":"School of Information Engineering, Wuhan University of Technology, Wuhan, China","institution_ids":["https://openalex.org/I196699116"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007493569","display_name":"Junping Song","orcid":"https://orcid.org/0000-0002-4451-1297"},"institutions":[{"id":"https://openalex.org/I4210163247","display_name":"Henan Institute of Science and Technology","ror":"https://ror.org/0578f1k82","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210163247"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junping Song","raw_affiliation_strings":["Xinke college, Henan institute of Science and Technology, Xinxiang, China"],"affiliations":[{"raw_affiliation_string":"Xinke college, Henan institute of Science and Technology, Xinxiang, China","institution_ids":["https://openalex.org/I4210163247"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5036238810"],"corresponding_institution_ids":["https://openalex.org/I196699116","https://openalex.org/I4210163247"],"apc_list":null,"apc_paid":null,"fwci":1.0792,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.79567275,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":97},"biblio":{"volume":"39","issue":"6","first_page":"8897","last_page":"8905"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9775000214576721,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.708554744720459},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6909607648849487},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6012629866600037},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5159369111061096},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.49277451634407043},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.48914435505867004},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.46833205223083496},{"id":"https://openalex.org/keywords/security-management","display_name":"Security management","score":0.4672152101993561},{"id":"https://openalex.org/keywords/security-controls","display_name":"Security controls","score":0.41316381096839905},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.4084668755531311},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.35093212127685547},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.24161118268966675},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.15084874629974365},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09740570187568665}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.708554744720459},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6909607648849487},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6012629866600037},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5159369111061096},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.49277451634407043},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.48914435505867004},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.46833205223083496},{"id":"https://openalex.org/C83163435","wikidata":"https://www.wikidata.org/wiki/Q3954104","display_name":"Security management","level":2,"score":0.4672152101993561},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.41316381096839905},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4084668755531311},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.35093212127685547},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.24161118268966675},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.15084874629974365},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09740570187568665},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jifs-189287","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-189287","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1987102699","https://openalex.org/W1988669659","https://openalex.org/W1999432873","https://openalex.org/W2082619801","https://openalex.org/W2096388142","https://openalex.org/W2131773410","https://openalex.org/W2161025225","https://openalex.org/W2161663610","https://openalex.org/W2248049238","https://openalex.org/W2344403065","https://openalex.org/W2772067505","https://openalex.org/W2783316698","https://openalex.org/W2785464388","https://openalex.org/W2798275759","https://openalex.org/W2893263387","https://openalex.org/W2913662041","https://openalex.org/W2916257864","https://openalex.org/W2920892691","https://openalex.org/W2949212025","https://openalex.org/W2952374996","https://openalex.org/W2969960094","https://openalex.org/W2972838451","https://openalex.org/W2976989213","https://openalex.org/W6650072702"],"related_works":["https://openalex.org/W2404921573","https://openalex.org/W2081253120","https://openalex.org/W3015787821","https://openalex.org/W2373184951","https://openalex.org/W2744631404","https://openalex.org/W2388760686","https://openalex.org/W2355938062","https://openalex.org/W2382223981","https://openalex.org/W103469691","https://openalex.org/W2348947824"],"abstract_inverted_index":{"To":[0],"build":[1,26,122],"a":[2,27,105,123],"network":[3,33,95,101,128],"security":[4,102,129,148],"system":[5,44,107,130],"combining":[6],"active":[7,32,139],"defense":[8,11,23,37,137,140],"and":[9,25,31,51,74,82,92,119,121,126,138],"passive":[10,22,136],"during":[12,149],"covid-19,":[13],"we":[14,97],"need":[15],"to":[16,35,48,62,72],"break":[17],"the":[18,43,64,76,85,90,113,132],"original":[19],"Castle":[20],"type":[21],"concept":[24],"reliable,":[28],"controllable,":[29],"flexible":[30],"environment":[34],"find":[36],"points.":[38],"The":[39],"key":[40],"is":[41,104],"that":[42,100],"should":[45,98,110],"be":[46],"able":[47],"actively":[49,83],"predict":[50,75],"control":[52],"our":[53],"defenses.":[54],"Any":[55],"scheme":[56],"cannot":[57],"achieve":[58],"absolute":[59],"safety,":[60],"only":[61],"minimize":[63],"probability":[65],"of":[66,79,87,94,116,134],"safety":[67,80],"accidents,":[68,81],"through":[69],"various":[70],"measures":[71],"assess":[73],"possible":[77],"points":[78],"prevent":[84],"occurrence":[86],"accidents.":[88],"In":[89],"management":[91,103,118],"construction":[93],"security,":[96],"realize":[99],"comprehensive":[106],"engineering.":[108],"We":[109],"start":[111],"from":[112],"three":[114],"aspects":[115],"strategy,":[117],"technology,":[120,141],"more":[124],"effective":[125],"reliable":[127],"on":[131],"basis":[133],"traditional":[135],"which":[142],"can":[143],"better":[144],"maintain":[145],"big":[146],"data":[147],"covid-19.":[150]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
