Survey of Technology in Network Security Situation Awareness

Network security situation awareness (NSSA) is an integral part of cybersecurity defense, and it is essential for cybersecurity managers to respond to increasingly sophisticated cyber threats. Different from traditional security measures, NSSA can identify the behavior of various activities in the n...

Full description

Saved in:
Bibliographic Details
Published in:Sensors (Basel, Switzerland) Vol. 23; no. 5; p. 2608
Main Authors: Zhang, Junwei, Feng, Huamin, Liu, Biao, Zhao, Dongmei
Format: Journal Article
Language:English
Published: Switzerland MDPI AG 27.02.2023
MDPI
Subjects:
ISSN:1424-8220, 1424-8220
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Network security situation awareness (NSSA) is an integral part of cybersecurity defense, and it is essential for cybersecurity managers to respond to increasingly sophisticated cyber threats. Different from traditional security measures, NSSA can identify the behavior of various activities in the network and conduct intent understanding and impact assessment from a macro perspective so as to provide reasonable decision support, predicting the development trend of network security. It is a means to analyze the network security quantitatively. Although NSSA has received extensive attention and exploration, there is a lack of comprehensive reviews of the related technologies. This paper presents a state-of-the-art study on NSSA that can help bridge the current research status and future large-scale application. First, the paper provides a concise introduction to NSSA, highlighting its development process. Then, the paper focuses on the research progress of key technologies in recent years. We further discuss the classic use cases of NSSA. Finally, the survey details various challenges and potential research directions related to NSSA.
AbstractList Network security situation awareness (NSSA) is an integral part of cybersecurity defense, and it is essential for cybersecurity managers to respond to increasingly sophisticated cyber threats. Different from traditional security measures, NSSA can identify the behavior of various activities in the network and conduct intent understanding and impact assessment from a macro perspective so as to provide reasonable decision support, predicting the development trend of network security. It is a means to analyze the network security quantitatively. Although NSSA has received extensive attention and exploration, there is a lack of comprehensive reviews of the related technologies. This paper presents a state-of-the-art study on NSSA that can help bridge the current research status and future large-scale application. First, the paper provides a concise introduction to NSSA, highlighting its development process. Then, the paper focuses on the research progress of key technologies in recent years. We further discuss the classic use cases of NSSA. Finally, the survey details various challenges and potential research directions related to NSSA.
Network security situation awareness (NSSA) is an integral part of cybersecurity defense, and it is essential for cybersecurity managers to respond to increasingly sophisticated cyber threats. Different from traditional security measures, NSSA can identify the behavior of various activities in the network and conduct intent understanding and impact assessment from a macro perspective so as to provide reasonable decision support, predicting the development trend of network security. It is a means to analyze the network security quantitatively. Although NSSA has received extensive attention and exploration, there is a lack of comprehensive reviews of the related technologies. This paper presents a state-of-the-art study on NSSA that can help bridge the current research status and future large-scale application. First, the paper provides a concise introduction to NSSA, highlighting its development process. Then, the paper focuses on the research progress of key technologies in recent years. We further discuss the classic use cases of NSSA. Finally, the survey details various challenges and potential research directions related to NSSA.Network security situation awareness (NSSA) is an integral part of cybersecurity defense, and it is essential for cybersecurity managers to respond to increasingly sophisticated cyber threats. Different from traditional security measures, NSSA can identify the behavior of various activities in the network and conduct intent understanding and impact assessment from a macro perspective so as to provide reasonable decision support, predicting the development trend of network security. It is a means to analyze the network security quantitatively. Although NSSA has received extensive attention and exploration, there is a lack of comprehensive reviews of the related technologies. This paper presents a state-of-the-art study on NSSA that can help bridge the current research status and future large-scale application. First, the paper provides a concise introduction to NSSA, highlighting its development process. Then, the paper focuses on the research progress of key technologies in recent years. We further discuss the classic use cases of NSSA. Finally, the survey details various challenges and potential research directions related to NSSA.
Audience Academic
Author Zhang, Junwei
Feng, Huamin
Zhao, Dongmei
Liu, Biao
AuthorAffiliation 1 School of Cyber Engineering, Xidian University, Xi’an 710126, China
2 School of Cyber Engineering, Beijing Electronic Science and Technology Institute, Beijing 100070, China
3 College of Computer and Cyber Security, Hebei Normal University, Shijiazhuang 050025, China
AuthorAffiliation_xml – name: 2 School of Cyber Engineering, Beijing Electronic Science and Technology Institute, Beijing 100070, China
– name: 1 School of Cyber Engineering, Xidian University, Xi’an 710126, China
– name: 3 College of Computer and Cyber Security, Hebei Normal University, Shijiazhuang 050025, China
Author_xml – sequence: 1
  givenname: Junwei
  orcidid: 0000-0002-6705-5511
  surname: Zhang
  fullname: Zhang, Junwei
– sequence: 2
  givenname: Huamin
  surname: Feng
  fullname: Feng, Huamin
– sequence: 3
  givenname: Biao
  surname: Liu
  fullname: Liu, Biao
– sequence: 4
  givenname: Dongmei
  surname: Zhao
  fullname: Zhao, Dongmei
BackLink https://www.ncbi.nlm.nih.gov/pubmed/36904812$$D View this record in MEDLINE/PubMed
BookMark eNplkk1r3DAQhkVJaT7aQ_9AMfTSHjYZfdiWoBCW0I9AaA-bnoUsjzbaeqVUshP231ebTUKSooPE6JlX82rmkOyFGJCQ9xSOOVdwkhmHmjUgX5EDKpiYScZg78l5nxzmvAJgnHP5huzzRoGQlB2QL4sp3eCmiq66RHsV4hCXm8qH6ieOtzH9qRZop-THTbXw42RGH0M1vzUJA-b8lrx2Zsj47n4_Ir-_fb08-zG7-PX9_Gx-MbM1qHGGplW1UFawxvJadgqN4W3PpOpAmt5SZ7quV05IBa7mHTpphZGuscA6QMGPyPlOt49mpa-TX5u00dF4fReIaalNGr0dUFOuRN93UvDeCYrc1Ez04GiHYGpqtlqnO63rqVtjbzGMyQzPRJ_fBH-ll_FGUwBoRdMUhU_3Cin-nTCPeu2zxWEwAeOUNWtlQ0Goui7oxxfoKk4plL_aUqU0KFChjnfU0hQHPrhYHrZl9bj2trTa-RKft4IWW63Yevjw1MNj8Q9tLcDJDrAp5pzQaevHu-YVZT8UL3o7OPpxcErG5xcZD6L_s_8AK5TBew
CitedBy_id crossref_primary_10_3390_app14188408
crossref_primary_10_3390_app14146348
crossref_primary_10_3390_sym16091183
crossref_primary_10_4018_IJICTE_337611
crossref_primary_10_60097_ACIG_190345
crossref_primary_10_3390_electronics12163458
crossref_primary_10_3390_app14083195
crossref_primary_10_3390_sym17030385
crossref_primary_10_1016_j_compeleceng_2024_109393
crossref_primary_10_3390_app14156652
crossref_primary_10_4018_IJeC_357637
crossref_primary_10_3390_electronics14081533
crossref_primary_10_1016_j_knosys_2024_112037
Cites_doi 10.1166/asl.2012.1852
10.1007/978-3-030-95903-6_3
10.1109/ICICTA.2010.575
10.1088/1742-6596/1856/1/012056
10.1145/310889.310919
10.1007/s10462-021-09976-0
10.1109/ICICIC.2008.436
10.1145/3407023.3407062
10.1186/s13638-019-1506-1
10.1109/MILCOM.2014.53
10.1016/j.ins.2020.05.012
10.1007/s12530-018-9234-z
10.3390/s21144788
10.1002/spy2.183
10.1145/2671491.2671495
10.1201/b12461
10.1109/ICETCI53161.2021.9563590
10.23919/EUSIPCO.2018.8553214
10.1088/1742-6596/1883/1/012108
10.1109/TBDATA.2016.2616146
10.23940/ijpe.20.08.p4.11711182
10.1007/s11277-020-07421-z
10.1145/3394963
10.1109/ICEIEC.2016.7589715
10.1016/j.cose.2017.09.011
10.1145/3241056
10.1002/jcc.24300
10.1109/IMCEC51613.2021.9482334
10.1016/j.dcan.2016.06.003
10.1109/DASC.2013.30
10.1109/COMST.2019.2933899
10.1145/3444370.3444607
10.1007/s11277-017-5202-3
10.1109/IWCMC48107.2020.9148549
10.1109/AICCSA53542.2021.9686823
10.1109/ICC45855.2022.9839016
10.1007/978-3-030-69717-4_81
10.1016/j.cose.2014.06.008
10.1155/2022/2794889
10.1145/3264947
10.1007/978-3-030-24268-8_10
10.1007/978-3-642-00219-9_2
10.3390/sym13010132
10.3390/electronics9122102
10.1109/ICCIAS.2006.295320
10.1016/j.dcan.2022.05.012
10.1002/spy2.152
10.1007/978-3-662-46742-8_39
10.1109/JIOT.2017.2668061
10.1109/CSCITA.2014.6839299
10.1145/3199668
10.1007/978-3-030-22263-5_16
10.1016/j.asoc.2021.107096
10.1109/CompComm.2017.8322583
10.1109/TIE.2018.2798605
10.1109/CSCI51800.2020.00066
10.14704/WEB/V17I2/WEB17038
10.1109/INFOCOMWKSHPS51825.2021.9484500
10.1145/332051.332079
10.1016/S1353-4858(20)30106-9
10.3390/info11040194
10.1109/TII.2022.3215192
10.1016/j.cie.2018.01.006
10.1109/IMSNA.2013.6743245
10.1109/TEVC.2019.2890858
10.1109/ICSESS47205.2019.9040716
10.1109/ACCESS.2022.3178195
10.23919/ChiCC.2017.8027994
10.1360/jos170885
10.1109/SmartNets50376.2021.9555418
10.1109/MWC.001.2000245
10.1109/MINES.2012.38
10.1007/s00500-020-04956-y
10.1155/2018/5380481
10.3390/s22072508
10.1049/iet-ifs.2018.5189
10.1109/CyberSA.2017.8073386
10.1016/j.future.2017.10.018
10.1145/2896387.2896420
10.1109/ACCESS.2019.2939490
10.1145/1314257.1314273
10.1007/978-3-319-49568-2_33
10.1016/j.proeng.2011.08.621
10.1177/154193128803200221
10.1109/CyberC.2015.47
10.1007/s11442-019-1698-7
10.1145/996943.996947
10.1109/ACCESS.2019.2897923
ContentType Journal Article
Copyright COPYRIGHT 2023 MDPI AG
2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
2023 by the authors. 2023
Copyright_xml – notice: COPYRIGHT 2023 MDPI AG
– notice: 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
– notice: 2023 by the authors. 2023
DBID AAYXX
CITATION
NPM
3V.
7X7
7XB
88E
8FI
8FJ
8FK
ABUWG
AFKRA
AZQEC
BENPR
CCPQU
DWQXO
FYUFA
GHDGH
K9.
M0S
M1P
PHGZM
PHGZT
PIMPY
PJZUB
PKEHL
PPXIY
PQEST
PQQKQ
PQUKI
PRINS
7X8
5PM
DOA
DOI 10.3390/s23052608
DatabaseName CrossRef
PubMed
ProQuest Central (Corporate)
Health & Medical Collection (ProQuest)
ProQuest Central (purchase pre-March 2016)
Medical Database (Alumni Edition)
Hospital Premium Collection
Hospital Premium Collection (Alumni Edition)
ProQuest Central (Alumni) (purchase pre-March 2016)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Central Essentials
ProQuest Central
ProQuest One Community College
ProQuest Central Korea
Proquest Health Research Premium Collection
Health Research Premium Collection (Alumni)
ProQuest Health & Medical Complete (Alumni)
Health & Medical Collection (Alumni Edition)
Medical Database
ProQuest One Academic
ProQuest One Academic (New)
ProQuest - Publicly Available Content Database
ProQuest Health & Medical Research Collection
ProQuest One Academic Middle East (New)
ProQuest One Health & Nursing
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
MEDLINE - Academic
PubMed Central (Full Participant titles)
DOAJ: Directory of Open Access Journal (DOAJ)
DatabaseTitle CrossRef
PubMed
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest Central Essentials
ProQuest Health & Medical Complete (Alumni)
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest One Health & Nursing
ProQuest Central China
ProQuest Central
ProQuest Health & Medical Research Collection
Health Research Premium Collection
Health and Medicine Complete (Alumni Edition)
ProQuest Central Korea
Health & Medical Research Collection
ProQuest Central (New)
ProQuest Medical Library (Alumni)
ProQuest One Academic Eastern Edition
ProQuest Hospital Collection
Health Research Premium Collection (Alumni)
ProQuest Hospital Collection (Alumni)
ProQuest Health & Medical Complete
ProQuest Medical Library
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
MEDLINE - Academic
DatabaseTitleList
PubMed


Publicly Available Content Database
CrossRef
MEDLINE - Academic
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: NPM
  name: PubMed
  url: http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed
  sourceTypes: Index Database
– sequence: 3
  dbid: PIMPY
  name: Publicly Available Content Database
  url: http://search.proquest.com/publiccontent
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1424-8220
ExternalDocumentID oai_doaj_org_article_1394ddb843df41e3a524d0f1be0a51a4
PMC10007466
A741843744
36904812
10_3390_s23052608
Genre Journal Article
Review
GeographicLocations United States
China
Germany
GeographicLocations_xml – name: China
– name: Germany
– name: United States
GrantInformation_xml – fundername: “High-precision” Discipline Construction Project of Beijing Universities
  grantid: 20210071Z0403
– fundername: Hebei Science Supported Planning Projects
  grantid: 20310701D
GroupedDBID ---
123
2WC
53G
5VS
7X7
88E
8FE
8FG
8FI
8FJ
AADQD
AAHBH
AAYXX
ABDBF
ABUWG
ACUHS
ADBBV
ADMLS
AENEX
AFFHD
AFKRA
AFZYC
ALMA_UNASSIGNED_HOLDINGS
BENPR
BPHCQ
BVXVI
CCPQU
CITATION
CS3
D1I
DU5
E3Z
EBD
ESX
F5P
FYUFA
GROUPED_DOAJ
GX1
HH5
HMCUK
HYE
IAO
ITC
KQ8
L6V
M1P
M48
MODMG
M~E
OK1
OVT
P2P
P62
PHGZM
PHGZT
PIMPY
PJZUB
PPXIY
PQQKQ
PROAC
PSQYO
RNS
RPM
TUS
UKHRP
XSB
~8M
3V.
ABJCF
ALIPV
ARAPS
HCIFZ
KB.
M7S
NPM
PDBOC
7XB
8FK
AZQEC
DWQXO
K9.
PKEHL
PQEST
PQUKI
PRINS
7X8
PUEGO
5PM
ID FETCH-LOGICAL-c509t-ea79549c426c358b9eaa37d289b08adc1fabbd9f4890f53bef8c4a8f6c02b0e43
IEDL.DBID DOA
ISICitedReferencesCount 19
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000948147600001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1424-8220
IngestDate Mon Nov 10 04:30:56 EST 2025
Tue Nov 04 02:07:36 EST 2025
Thu Sep 04 20:03:31 EDT 2025
Tue Oct 07 08:03:53 EDT 2025
Tue Nov 04 18:13:57 EST 2025
Wed Feb 19 02:24:57 EST 2025
Sat Nov 29 07:14:35 EST 2025
Tue Nov 18 21:44:36 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 5
Keywords NSSA visualization
situation prediction
situation assessment
situation awareness
artificial intelligence
Language English
License Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c509t-ea79549c426c358b9eaa37d289b08adc1fabbd9f4890f53bef8c4a8f6c02b0e43
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ObjectType-Review-3
content type line 23
ORCID 0000-0002-6705-5511
OpenAccessLink https://doaj.org/article/1394ddb843df41e3a524d0f1be0a51a4
PMID 36904812
PQID 2785240553
PQPubID 2032333
ParticipantIDs doaj_primary_oai_doaj_org_article_1394ddb843df41e3a524d0f1be0a51a4
pubmedcentral_primary_oai_pubmedcentral_nih_gov_10007466
proquest_miscellaneous_2786104955
proquest_journals_2785240553
gale_infotracacademiconefile_A741843744
pubmed_primary_36904812
crossref_citationtrail_10_3390_s23052608
crossref_primary_10_3390_s23052608
PublicationCentury 2000
PublicationDate 20230227
PublicationDateYYYYMMDD 2023-02-27
PublicationDate_xml – month: 2
  year: 2023
  text: 20230227
  day: 27
PublicationDecade 2020
PublicationPlace Switzerland
PublicationPlace_xml – name: Switzerland
– name: Basel
PublicationTitle Sensors (Basel, Switzerland)
PublicationTitleAlternate Sensors (Basel)
PublicationYear 2023
Publisher MDPI AG
MDPI
Publisher_xml – name: MDPI AG
– name: MDPI
References Yang (ref_74) 2021; 102
ref_94
Ebazadeh (ref_81) 2022; 5
ref_93
ref_92
ref_90
Rongrong (ref_30) 2019; 13
ref_14
ref_13
ref_12
ref_11
ref_130
ref_133
ref_97
Wang (ref_7) 2022; 8
Jibao (ref_37) 2007; 24
ref_134
Chen (ref_28) 2018; 45
Feng (ref_101) 2018; 13
ref_18
ref_17
Zhang (ref_98) 2016; 2
ref_15
ref_126
ref_125
ref_128
ref_127
ref_25
Liu (ref_50) 2012; 5
Maintz (ref_113) 2016; 37
Li (ref_21) 2019; 2019
Chang (ref_54) 2020; 11
ref_120
Ren (ref_99) 2006; 42
Prvan (ref_4) 2020; 20
Mondal (ref_10) 2020; 17
ref_20
Xiaofei (ref_123) 2021; 8
Yan (ref_38) 2011; 38
Hu (ref_102) 2019; 7
Wu (ref_2) 2019; 92
Juan (ref_48) 2007; 27
Zarei (ref_1) 2021; 4
ref_72
Khan (ref_132) 2020; 22
ref_79
Nour (ref_5) 2021; 28
Xiuzhen (ref_63) 2006; 17
ref_73
Alali (ref_69) 2018; 74
Hossain (ref_75) 2019; 15
Su (ref_124) 2019; 23
ref_83
ref_82
Ioannou (ref_84) 2019; 7
Tian (ref_77) 2018; 2
Gong (ref_22) 2017; 28
Li (ref_55) 2020; 534
Zhang (ref_122) 2021; 55
Zhang (ref_78) 2018; 3
Chen (ref_111) 2022; 2022
Azhagiri (ref_16) 2017; 5
ref_87
ref_86
ref_85
Zaminkar (ref_131) 2020; 114
Zhang (ref_96) 2020; 16
Bass (ref_35) 2000; 43
Ahmad (ref_76) 2018; 14
ref_57
ref_56
ref_52
ref_51
Ning (ref_45) 2004; 7
ref_59
Zhao (ref_29) 2018; 125
Deng (ref_110) 2015; 29
ref_61
ref_60
ref_67
ref_66
ref_65
ref_64
(ref_24) 2018; 21
ref_62
Lai (ref_53) 2010; 37
Chen (ref_119) 2017; 39
Giacobe (ref_33) 2010; Volume 7710
Dong (ref_104) 2021; 1856
ref_114
Polatidis (ref_88) 2018; 11
ref_117
ref_118
Franke (ref_19) 2014; 46
Jia (ref_23) 2019; 18
ref_34
Zhao (ref_70) 2006; 27
Aanjankumar (ref_9) 2020; 24
ref_32
ref_31
Wu (ref_80) 2017; 4
ref_39
Beaver (ref_129) 2011; Volume 8019
Chen (ref_112) 2022; 1
Wu (ref_116) 2018; 4
Liang (ref_91) 2018; 2018
ref_103
Bass (ref_27) 1999; 24
ref_106
ref_108
ref_109
ref_47
ref_46
Wang (ref_58) 2018; 102
Lin (ref_107) 2021; 15
Gao (ref_121) 2019; 29
ref_44
ref_43
ref_100
ref_42
ref_41
ref_40
Barak (ref_8) 2020; 2020
Xue (ref_105) 2022; 2022
ref_3
Tang (ref_95) 2011; 15
ref_49
Huang (ref_89) 2018; 65
Zhuo (ref_71) 2012; 34
Zhu (ref_115) 2019; 21
Kong (ref_68) 2021; 1883
Huiqiang (ref_36) 2006; 33
Endsley (ref_26) 1988; Volume 32
ref_6
References_xml – volume: 5
  start-page: 775
  year: 2012
  ident: ref_50
  article-title: Network security situation awareness model based on multi-source fusion
  publication-title: Adv. Sci. Lett.
  doi: 10.1166/asl.2012.1852
– ident: ref_106
  doi: 10.1007/978-3-030-95903-6_3
– volume: 2022
  start-page: 6314262
  year: 2022
  ident: ref_111
  article-title: Multimedia Security Situation Prediction Based on Optimization of Radial Basis Function Neural Network Algorithm
  publication-title: Comput. Intell. Neurosci.
– ident: ref_49
  doi: 10.1109/ICICTA.2010.575
– volume: 1856
  start-page: 012056
  year: 2021
  ident: ref_104
  article-title: Network security situation prediction method based on strengthened LSTM neural network
  publication-title: J. Phys. Conf. Ser. IOP Publ.
  doi: 10.1088/1742-6596/1856/1/012056
– ident: ref_87
  doi: 10.1145/310889.310919
– volume: 55
  start-page: 1029
  year: 2021
  ident: ref_122
  article-title: Artificial intelligence in cyber security: Research advances, challenges, and opportunities
  publication-title: Artif. Intell. Rev.
  doi: 10.1007/s10462-021-09976-0
– ident: ref_65
– ident: ref_94
  doi: 10.1109/ICICIC.2008.436
– ident: ref_18
  doi: 10.1145/3407023.3407062
– volume: 2019
  start-page: 205
  year: 2019
  ident: ref_21
  article-title: Analysis framework of network security situational awareness and comparison of implementation methods
  publication-title: EURASIP J. Wirel. Commun. Netw.
  doi: 10.1186/s13638-019-1506-1
– ident: ref_42
  doi: 10.1109/MILCOM.2014.53
– volume: 534
  start-page: 53
  year: 2020
  ident: ref_55
  article-title: Multi-source information fusion based heterogeneous network embedding
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2020.05.012
– volume: 11
  start-page: 479
  year: 2018
  ident: ref_88
  article-title: From product recommendation to cyber-attack prediction: Generating attack graphs and predicting future attacks
  publication-title: Evol. Syst.
  doi: 10.1007/s12530-018-9234-z
– ident: ref_60
  doi: 10.3390/s21144788
– volume: 5
  start-page: e183
  year: 2022
  ident: ref_81
  article-title: A reliable and secure method for network-layer attack discovery and elimination in mobile ad-hoc networks based on a probabilistic threshold
  publication-title: Secur. Priv.
  doi: 10.1002/spy2.183
– ident: ref_118
  doi: 10.1145/2671491.2671495
– volume: 3
  start-page: 1
  year: 2018
  ident: ref_78
  article-title: Dependable deep computation model for feature learning on big data in cyber-physical systems
  publication-title: ACM Trans. Cyber-Phys. Syst.
– ident: ref_25
  doi: 10.1201/b12461
– ident: ref_97
  doi: 10.1109/ICETCI53161.2021.9563590
– ident: ref_125
  doi: 10.23919/EUSIPCO.2018.8553214
– volume: 13
  start-page: 25
  year: 2018
  ident: ref_101
  article-title: A new method for the prediction of network security situations based on recurrent neural network with gated recurrent unit
  publication-title: Int. J. Intell. Comput. Cybern.
– volume: 1883
  start-page: 012108
  year: 2021
  ident: ref_68
  article-title: Research on Network Security Situation Assessment Technology Based on Fuzzy Evaluation Method
  publication-title: J. Phys. Conf. Ser. IOP
  doi: 10.1088/1742-6596/1883/1/012108
– ident: ref_56
– volume: 4
  start-page: 408
  year: 2018
  ident: ref_116
  article-title: Big Data Analysis-Based Security Situational Awareness for Smart Grid
  publication-title: IEEE Trans. Big Data
  doi: 10.1109/TBDATA.2016.2616146
– volume: 16
  start-page: 1171
  year: 2020
  ident: ref_96
  article-title: Prediction Algorithm for Network Security Situation based on BP Neural Network Optimized by SA-SOA
  publication-title: Int. J. Perform. Eng.
  doi: 10.23940/ijpe.20.08.p4.11711182
– volume: 29
  start-page: 5
  year: 2015
  ident: ref_110
  article-title: Network Security Situation Prediction Method Based on Grey Theory
  publication-title: J. Hunan Univ. Technol.
– volume: 114
  start-page: 1287
  year: 2020
  ident: ref_131
  article-title: SoS-RPL: Securing internet of things against sinkhole attack using RPL protocol-based node rating and ranking mechanism
  publication-title: Wirel. Pers. Commun.
  doi: 10.1007/s11277-020-07421-z
– volume: 20
  start-page: 1
  year: 2020
  ident: ref_4
  article-title: Methods in Teaching Computer Networks: A Literature Review
  publication-title: ACM Trans. Comput. Educ.
  doi: 10.1145/3394963
– ident: ref_72
  doi: 10.1109/ICEIEC.2016.7589715
– volume: 74
  start-page: 323
  year: 2018
  ident: ref_69
  article-title: Improving risk assessment model of cyber security using fuzzy logic inference system
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2017.09.011
– volume: 15
  start-page: 1
  year: 2019
  ident: ref_75
  article-title: Applying deep learning for epilepsy seizure detection and brain mapping visualization
  publication-title: ACM Trans. Multimed. Comput. Commun. Appl. (TOMM)
  doi: 10.1145/3241056
– volume: 37
  start-page: 1030
  year: 2016
  ident: ref_113
  article-title: LOBSTER: A tool to extract chemical bonding from plane-wave based DFT
  publication-title: J. Comput. Chem.
  doi: 10.1002/jcc.24300
– volume: 39
  start-page: 112
  year: 2017
  ident: ref_119
  article-title: Big data analytics for network security and intelligence
  publication-title: Adv. Eng. Sci.
– ident: ref_62
– ident: ref_90
  doi: 10.1109/IMCEC51613.2021.9482334
– volume: 2
  start-page: 139
  year: 2016
  ident: ref_98
  article-title: A network security situation prediction model based on wavelet neural network with optimized parameters
  publication-title: Digit. Commun. Netw.
  doi: 10.1016/j.dcan.2016.06.003
– ident: ref_57
  doi: 10.1109/DASC.2013.30
– volume: 22
  start-page: 196
  year: 2020
  ident: ref_132
  article-title: A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions
  publication-title: IEEE Commun. Surv. Tutor.
  doi: 10.1109/COMST.2019.2933899
– ident: ref_59
– ident: ref_15
  doi: 10.1145/3444370.3444607
– volume: 102
  start-page: 1401
  year: 2018
  ident: ref_58
  article-title: Research on network security situation assessment and quantification method based on analytic hierarchy process
  publication-title: Wirel. Pers. Commun.
  doi: 10.1007/s11277-017-5202-3
– volume: 27
  start-page: 4
  year: 2006
  ident: ref_70
  article-title: Research on survivability situation assessment of network based on grey relational analysis
  publication-title: Small Microcomput. Syst.
– ident: ref_17
  doi: 10.1109/IWCMC48107.2020.9148549
– ident: ref_120
  doi: 10.1109/AICCSA53542.2021.9686823
– ident: ref_126
  doi: 10.1109/ICC45855.2022.9839016
– ident: ref_47
– volume: 24
  start-page: 40
  year: 1999
  ident: ref_27
  article-title: A glimpse into the future of id
  publication-title: Mag. Usenix Sage
– volume: 15
  start-page: 386
  year: 2021
  ident: ref_107
  article-title: The prediction of network security situation based on deep learning method
  publication-title: Int. J. Inf. Comput. Secur.
– ident: ref_114
  doi: 10.1007/978-3-030-69717-4_81
– ident: ref_11
– ident: ref_86
– volume: 21
  start-page: 115
  year: 2019
  ident: ref_115
  article-title: Three Kinds of Network Security Situation Awareness Model Based on Big Data
  publication-title: Int. J. Netw. Secur.
– volume: 46
  start-page: 18
  year: 2014
  ident: ref_19
  article-title: Cyber situational awareness–a systematic review of the literature
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2014.06.008
– volume: 1
  start-page: 103
  year: 2022
  ident: ref_112
  article-title: Research on Internet Security Situation Awareness Prediction Technology based on Improved RBF Neural Network Algorithm
  publication-title: J. Comput. Cogn. Eng.
– volume: 38
  start-page: 4
  year: 2011
  ident: ref_38
  article-title: YHSSAS: Large-scale Network Oriented Security Situational Awareness System
  publication-title: Comput. Sci.
– ident: ref_14
– volume: 2022
  start-page: 2794889
  year: 2022
  ident: ref_105
  article-title: Prediction of Computer Network Security Situation Based on Association Rules Mining
  publication-title: Wirel. Commun. Mob. Comput.
  doi: 10.1155/2022/2794889
– volume: 11
  start-page: 6
  year: 2020
  ident: ref_54
  article-title: Security situation element extraction based on probabilistic neural network
  publication-title: Cyberspace Secur.
– volume: 37
  start-page: 64
  year: 2010
  ident: ref_53
  article-title: Network Security Situation Element Extraction Method based on DsimC and EWDS
  publication-title: Comput. Sci.
– volume: 2
  start-page: 1
  year: 2018
  ident: ref_77
  article-title: RF-based fall monitoring using convolutional neural networks
  publication-title: Proc. ACM Interactive Mobile Wearable Ubiquitous Technol.
  doi: 10.1145/3264947
– ident: ref_13
  doi: 10.1007/978-3-030-24268-8_10
– ident: ref_128
  doi: 10.1007/978-3-642-00219-9_2
– volume: 33
  start-page: 5
  year: 2006
  ident: ref_36
  article-title: Survey of Network Situation Awareness System
  publication-title: Comput. Sci.
– ident: ref_92
  doi: 10.3390/sym13010132
– ident: ref_134
  doi: 10.3390/electronics9122102
– ident: ref_108
  doi: 10.1109/ICCIAS.2006.295320
– volume: 21
  start-page: 640
  year: 2018
  ident: ref_24
  article-title: Survey of attack projection, prediction, and forecasting in cyber security
  publication-title: IEEE Commun. Surv. Tutor.
– volume: 8
  start-page: 644
  year: 2022
  ident: ref_7
  article-title: Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT
  publication-title: Digit. Commun. Netw.
  doi: 10.1016/j.dcan.2022.05.012
– volume: Volume 7710
  start-page: 77100R
  year: 2010
  ident: ref_33
  article-title: Application of the JDL data fusion process model for cyber security
  publication-title: Proceedings of the Multisensor, Multisource Information Fusion: Architectures, Algorithms, and Applications
– volume: 27
  start-page: 1907
  year: 2007
  ident: ref_48
  article-title: Study on index system in network situation awareness
  publication-title: Comput. Appl.
– ident: ref_64
– volume: 4
  start-page: e152
  year: 2021
  ident: ref_1
  article-title: Defense against flooding attacks using probabilistic thresholds in the internet of things ecosystem
  publication-title: Secur. Priv.
  doi: 10.1002/spy2.152
– ident: ref_83
  doi: 10.1007/978-3-662-46742-8_39
– volume: 4
  start-page: 636
  year: 2017
  ident: ref_80
  article-title: Survey on prediction algorithms in smart homes
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2017.2668061
– ident: ref_117
  doi: 10.1109/CSCITA.2014.6839299
– volume: 14
  start-page: 1
  year: 2018
  ident: ref_76
  article-title: Ensemble of deep models for event recognition
  publication-title: ACM Trans. Multimed. Comput. Commun. Appl. (TOMM)
  doi: 10.1145/3199668
– ident: ref_109
– ident: ref_103
  doi: 10.1007/978-3-030-22263-5_16
– volume: 102
  start-page: 107096
  year: 2021
  ident: ref_74
  article-title: A network security situation assessment method based on adversarial deep learning
  publication-title: Appl. Soft Comput.
  doi: 10.1016/j.asoc.2021.107096
– ident: ref_79
  doi: 10.1109/CompComm.2017.8322583
– ident: ref_32
– volume: 65
  start-page: 8153
  year: 2018
  ident: ref_89
  article-title: Assessing the physical impact of cyberattacks on industrial cyber-physical systems
  publication-title: IEEE Trans. Ind. Electron.
  doi: 10.1109/TIE.2018.2798605
– ident: ref_127
– volume: 5
  start-page: 71
  year: 2017
  ident: ref_16
  article-title: A multi-perspective and multi-level analysis framework in network security situational awareness
  publication-title: Int. J. Comput. Netw. Commun. Secur.
– volume: 34
  start-page: 1
  year: 2012
  ident: ref_71
  article-title: Rough set analysis model for network situation assessment
  publication-title: Comput. Eng. Sci.
– ident: ref_61
– ident: ref_130
  doi: 10.1109/CSCI51800.2020.00066
– volume: 17
  start-page: 363
  year: 2020
  ident: ref_10
  article-title: Review Study on Different Attack Strategies of Worm in a Network
  publication-title: Webology
  doi: 10.14704/WEB/V17I2/WEB17038
– ident: ref_31
  doi: 10.1109/INFOCOMWKSHPS51825.2021.9484500
– volume: 43
  start-page: 99
  year: 2000
  ident: ref_35
  article-title: Intrusion detection systems and multisensor data fusion
  publication-title: Commun. ACM
  doi: 10.1145/332051.332079
– volume: 2020
  start-page: 16
  year: 2020
  ident: ref_8
  article-title: Critical infrastructure under attack: Lessons from a honeypot
  publication-title: Netw. Secur.
  doi: 10.1016/S1353-4858(20)30106-9
– ident: ref_73
  doi: 10.3390/info11040194
– ident: ref_52
– ident: ref_3
  doi: 10.1109/TII.2022.3215192
– volume: 125
  start-page: 764
  year: 2018
  ident: ref_29
  article-title: Study on network security situation awareness based on particle swarm optimization algorithm
  publication-title: Comput. Ind. Eng.
  doi: 10.1016/j.cie.2018.01.006
– ident: ref_82
  doi: 10.1109/IMSNA.2013.6743245
– volume: 23
  start-page: 828
  year: 2019
  ident: ref_124
  article-title: One pixel attack for fooling deep neural networks
  publication-title: IEEE Trans. Evol. Comput.
  doi: 10.1109/TEVC.2019.2890858
– volume: 24
  start-page: 167
  year: 2007
  ident: ref_37
  article-title: Study of network security situation awareness system based on Netflow
  publication-title: Comput. Appl. Res.
– ident: ref_12
  doi: 10.1109/ICSESS47205.2019.9040716
– ident: ref_20
  doi: 10.1109/ACCESS.2022.3178195
– volume: 18
  start-page: 1
  year: 2019
  ident: ref_23
  article-title: Research status and development trend of network security situational awareness
  publication-title: J. Guangzhou Univ.
– ident: ref_66
– ident: ref_100
  doi: 10.23919/ChiCC.2017.8027994
– ident: ref_93
– volume: 17
  start-page: 885
  year: 2006
  ident: ref_63
  article-title: Quantitative Hierarchical Threat Evaluation Model for Network Security
  publication-title: J. Softw.
  doi: 10.1360/jos170885
– volume: 8
  start-page: 16
  year: 2021
  ident: ref_123
  article-title: Research on Power Information Network Security Situation Awareness Based on LDA-RBF
  publication-title: Low Volt. Appar.
– volume: Volume 8019
  start-page: 18
  year: 2011
  ident: ref_129
  article-title: Visualization techniques for computer network defense
  publication-title: Proceedings of the Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense X
– ident: ref_6
  doi: 10.1109/SmartNets50376.2021.9555418
– volume: 28
  start-page: 121
  year: 2021
  ident: ref_5
  article-title: Information-Centric Networking in Wireless Environments: Security Risks and Challenges
  publication-title: IEEE Wirel. Commun.
  doi: 10.1109/MWC.001.2000245
– ident: ref_34
– ident: ref_51
  doi: 10.1109/MINES.2012.38
– volume: 24
  start-page: 16499
  year: 2020
  ident: ref_9
  article-title: An efficient soft computing approach for securing information over GAMEOVER Zeus Botnets with modified CPA algorithm
  publication-title: Soft Comput.
  doi: 10.1007/s00500-020-04956-y
– volume: 28
  start-page: 17
  year: 2017
  ident: ref_22
  article-title: Overview of Network security Situational Awareness
  publication-title: J. Softw.
– volume: 2018
  start-page: 5380481
  year: 2018
  ident: ref_91
  article-title: A security situation prediction algorithm based on HMM in mobile network
  publication-title: Wirel. Commun. Mob. Comput.
  doi: 10.1155/2018/5380481
– volume: 45
  start-page: 335
  year: 2018
  ident: ref_28
  article-title: Research on cyberspace situation awareness security assessment based on improved BP neural network
  publication-title: Comput. Sci.
– ident: ref_40
– ident: ref_133
  doi: 10.3390/s22072508
– volume: 13
  start-page: 149
  year: 2019
  ident: ref_30
  article-title: Framework for risk assessment in cyber situational awareness
  publication-title: IET Inf. Secur.
  doi: 10.1049/iet-ifs.2018.5189
– ident: ref_41
  doi: 10.1109/CyberSA.2017.8073386
– volume: 92
  start-page: 705
  year: 2019
  ident: ref_2
  article-title: In-band full duplex wireless communications and networking for iot devices: Progress, challenges and opportunities
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2017.10.018
– ident: ref_85
  doi: 10.1145/2896387.2896420
– volume: 7
  start-page: 130937
  year: 2019
  ident: ref_102
  article-title: Network security situation prediction based on MR-SVM
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2939490
– ident: ref_44
  doi: 10.1145/1314257.1314273
– ident: ref_39
  doi: 10.1007/978-3-319-49568-2_33
– ident: ref_46
– volume: 42
  start-page: 4
  year: 2006
  ident: ref_99
  article-title: Network security situation prediction method based on RBF neural network
  publication-title: Comput. Eng. Appl.
– volume: 15
  start-page: 3313
  year: 2011
  ident: ref_95
  article-title: Security situation prediction based on dynamic BP neural with covariance
  publication-title: Procedia Eng.
  doi: 10.1016/j.proeng.2011.08.621
– volume: Volume 32
  start-page: 97
  year: 1988
  ident: ref_26
  article-title: Design and evaluation for situation awareness enhancement
  publication-title: Proceedings of the Human Factors Society Annual Meeting
  doi: 10.1177/154193128803200221
– ident: ref_67
  doi: 10.1109/CyberC.2015.47
– volume: 29
  start-page: 5
  year: 2019
  ident: ref_121
  article-title: The theoretical basis and technical path of cyberspace geography
  publication-title: J. Geogr. Sci.
  doi: 10.1007/s11442-019-1698-7
– volume: 7
  start-page: 274
  year: 2004
  ident: ref_45
  article-title: Techniques and tools for analyzing intrusion alerts
  publication-title: ACM Trans. Inf. Syst. Secur. (TISSEC)
  doi: 10.1145/996943.996947
– ident: ref_43
– volume: 7
  start-page: 39305
  year: 2019
  ident: ref_84
  article-title: A Markov multi-phase transferable belief model for cyber situational awareness
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2897923
SSID ssj0023338
Score 2.5026705
SecondaryResourceType review_article
Snippet Network security situation awareness (NSSA) is an integral part of cybersecurity defense, and it is essential for cybersecurity managers to respond to...
SourceID doaj
pubmedcentral
proquest
gale
pubmed
crossref
SourceType Open Website
Open Access Repository
Aggregation Database
Index Database
Enrichment Source
StartPage 2608
SubjectTerms Algorithms
Armed forces
artificial intelligence
Data security
Decision making
Forecasts and trends
Internet of Things
Neural networks
NSSA visualization
Ransomware
Review
Security management
situation assessment
situation awareness
situation prediction
Surveys
Systems design
Taxonomy
Trends
SummonAdditionalLinks – databaseName: ProQuest Central
  dbid: BENPR
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Lb9QwEB7BlgMceD8CBRmEBJeoSeysbQkJbVErTquKBak3y09YCSVlH0X8e8aJN90IxIVrPIdxZsbzjR_fALx26CfaM5ZHLJGzEEKuQ6Fzw40vuA8y6L7ZBJ_Pxfm5PEsbbut0rXK3JnYLtWtt3CM_qrioMfvUNX1_8SOPXaPi6WpqoXEdDiJTGZvAwfHJ_OzTUHJRrMB6PiGKxf3RGgF3jQhejLJQR9b_55K8l5PG9yX3EtDpnf9V_S7cTtCTzHpfuQfXfHMfbu0REj6Ad4vt6tL_Im0gV3vuZNmQeX9bnCxSuzuyWG56knAy-xnfk-GC-RC-nJ58_vAxT_0VcoswYZN7zeMhn8UkbWktjPRaU-6wBDOF0M6WQRvjZGBCFqGmxgdhmRZhaovKFJ7RRzBp2sY_AVJWQRguSxkqyaSm2gjHHTcidgA01mbwdve_lU3k47EHxneFRUg0jRpMk8GrQfSiZ9z4m9BxNNogEEmyuw_t6qtKMacQ3DLnjGDUBVZ6qtEKrggleqGuS80yeBNNrmIoozJWpxcJOKVIiqVmkdmHUc5Q8nBnWZVifK2uzJrBy2EYozMeuejGt9tOBvEpFqF1Bo97Jxp0plMZyXqqDMTIvUaTGo80y28dA3jZQb_p9Om_9XoGNyuMge4FPj-EyWa19c_hhr3cLNerFylWfgMf1SCo
  priority: 102
  providerName: ProQuest
Title Survey of Technology in Network Security Situation Awareness
URI https://www.ncbi.nlm.nih.gov/pubmed/36904812
https://www.proquest.com/docview/2785240553
https://www.proquest.com/docview/2786104955
https://pubmed.ncbi.nlm.nih.gov/PMC10007466
https://doaj.org/article/1394ddb843df41e3a524d0f1be0a51a4
Volume 23
WOSCitedRecordID wos000948147600001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: DOA
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources (ISSN International Center)
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: M~E
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVPQU
  databaseName: Health & Medical Collection
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: 7X7
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/healthcomplete
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: BENPR
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Publicly Available Content Database
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: PIMPY
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/publiccontent
  providerName: ProQuest
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9QwEB5B4UAPiDeBdmUQElyiJrGztiUu22orOHS1YkFaTpGf6kooi_bRigu_nbGTTTcCqRcuPjgjy56HZya2vwF4Z1FPlGMsDbFEyrz3qfKZSjXXLuPOS6-aYhN8MhHzuZzulfoKd8IaeOCGcScYoTBrtWDUepY7qsqC2cznOJQqcxWRQDHq2SVTbapFMfNqcIQoJvUnawy0S4zcRc_7RJD-v7fiPV_Uvye553jOH8HDNmIko2amj-GOq5_A4R6O4FP4ONuurtwvsvTk5lc5WdRk0lzyJrO2Sh2ZLTYNtjcZXYdnYLjPPYNv5-OvZ5_StixCatC7b1KneDibM-hbDS2Flk4pyi1mTjoTyprcK62t9EzIzJdUOy8MU8IPTVbozDH6HA7qZe1eAskLLzSXufSFZFJRpYXllmsRCvdpYxL4sGNXZVrM8FC64keFuUPgbNVxNoG3HenPBijjX0SngecdQcC2jh0o8aqVeHWbxBN4HyRWBQvEyRjVPiTAJQUsq2oUAHkY5Qwpj3ZCrVrTXFcFFzhgVpY0gTfdZzSqcFKiarfcRhoMKzF3LBN40ehAN2c6lAFjp0hA9LSjt6j-l3pxGYG78xixDYev_gcbXsODAhU9Pq_nR3CwWW3dMdw3V5vFejWAu3zOYysGcO90PJl-GUQTwfbi9xj7pp8vpt__AHZnF9k
linkProvider Directory of Open Access Journals
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Jb9QwFH4qUyTgwL4ECgQEgkvUJHbGtgRCw1J11HY00hSpnIJXGAklZZZW_VP8Rp6zdUYgbj1wjZ8iO_7elmd_D-CFQZxIS2nkY4mIOuci6WIZKaZszKwTTtbNJthoxI-OxHgDfrV3YfyxytYmVobalNr_I99OGc_Q-2QZeXf8M_Jdo3x1tW2hUcNiz56dYso2fzv8iPv7Mk13Ph1-2I2argKRRue4iKxkvrSl0TVpknElrJSEGUw8VMyl0YmTShnhKBexy4iyjmsquevrOFWxpQTfewk2KYKd92BzPDwYf-lSPIIZX81fRIiIt-cY4GeYMfA1r1c1B_jTBaz4wPXzmSsOb-fG__apbsL1JrQOB7Uu3IINW9yGayuEi3fgzWQ5O7FnYenC85pCOC3CUX0aPpw07fzCyXRRk6CHg1N_Xw4dwl34fCHTvwe9oizsAwiT1HHFRCJcKqiQRCpumGGK-w6HSusAXrf7m-uGXN33-PiRY5LloZB3UAjgeSd6XDOK_E3ovQdJJ-BJwKsH5exb3tiUHIN3aozilBhHE0sk7rqJXYJaJrNE0gBeeYjl3lThZLRsblzgkjzpVz7wzEWUMIqSWy2S8saGzfNzGAXwrBtG6-NLSrKw5bKSwfgbk-wsgPs1aLs5k77wZERpAHwNzmuLWh8ppt8rhvOkCm37_Yf_ntdTuLJ7eLCf7w9He4_gaor6V7ENsC3oLWZL-xgu65PFdD570uhpCF8vGu-_AfmcgHQ
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Jb9QwFH4qLUJwYF8CBQICwSWaJHbGtgRCA2XEqDAaaahUTsErjISSMkur_jV-Hc_ZOiMQtx64xk-RHX9vy7O_B_DMIE6kpTTysUREnXORdLGMFFM2ZtYJJ-tmE2w85oeHYrIFv9q7MP5YZWsTK0NtSu3_kfdSxjP0PllGeq45FjHZG745-hn5DlK-0tq206ghsm9PTzB9W7we7eFeP0_T4fvP7z5ETYeBSKOjXEZWMl_m0uimNMm4ElZKwgwmISrm0ujESaWMcJSL2GVEWcc1ldz1dZyq2FKC770AOxiSU9Sxncno0-RLl-4RzP5qLiNCRNxbYLCfYfbANzxg1SjgT3ew5g83z2quOb_htf_5s12Hq03IHQ5qHbkBW7a4CVfWiBhvwavpan5sT8PShWe1hnBWhOP6lHw4bdr8hdPZsiZHDwcn_h4dOorbcHAu078D20VZ2HsQJqnjiolEuFRQIYlU3DDDFPedD5XWAbxs9zrXDem67_3xI8fky8Mi72ARwNNO9KhmGvmb0FsPmE7Ak4NXD8r5t7yxNTkG9dQYxSkxjiaWSESAiV2C2iezRNIAXni45d6E4WS0bG5i4JI8GVg-8IxGlDCKkrstqvLGti3yM0gF8KQbRqvkS02ysOWqksG4HJPvLIC7NYC7OZO-8CRFaQB8A9obi9ocKWbfK-bzpAp5-_37_57XY7iEIM8_jsb7D-ByiqpYkRCwXdhezlf2IVzUx8vZYv6oUdkQvp433H8DNhOJNA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Survey+of+Technology+in+Network+Security+Situation+Awareness&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=Junwei+Zhang&rft.au=Huamin+Feng&rft.au=Biao+Liu&rft.au=Dongmei+Zhao&rft.date=2023-02-27&rft.pub=MDPI+AG&rft.eissn=1424-8220&rft.volume=23&rft.issue=5&rft.spage=2608&rft_id=info:doi/10.3390%2Fs23052608&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_1394ddb843df41e3a524d0f1be0a51a4
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon