Survey of Technology in Network Security Situation Awareness
Network security situation awareness (NSSA) is an integral part of cybersecurity defense, and it is essential for cybersecurity managers to respond to increasingly sophisticated cyber threats. Different from traditional security measures, NSSA can identify the behavior of various activities in the n...
Saved in:
| Published in: | Sensors (Basel, Switzerland) Vol. 23; no. 5; p. 2608 |
|---|---|
| Main Authors: | , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Switzerland
MDPI AG
27.02.2023
MDPI |
| Subjects: | |
| ISSN: | 1424-8220, 1424-8220 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Network security situation awareness (NSSA) is an integral part of cybersecurity defense, and it is essential for cybersecurity managers to respond to increasingly sophisticated cyber threats. Different from traditional security measures, NSSA can identify the behavior of various activities in the network and conduct intent understanding and impact assessment from a macro perspective so as to provide reasonable decision support, predicting the development trend of network security. It is a means to analyze the network security quantitatively. Although NSSA has received extensive attention and exploration, there is a lack of comprehensive reviews of the related technologies. This paper presents a state-of-the-art study on NSSA that can help bridge the current research status and future large-scale application. First, the paper provides a concise introduction to NSSA, highlighting its development process. Then, the paper focuses on the research progress of key technologies in recent years. We further discuss the classic use cases of NSSA. Finally, the survey details various challenges and potential research directions related to NSSA. |
|---|---|
| AbstractList | Network security situation awareness (NSSA) is an integral part of cybersecurity defense, and it is essential for cybersecurity managers to respond to increasingly sophisticated cyber threats. Different from traditional security measures, NSSA can identify the behavior of various activities in the network and conduct intent understanding and impact assessment from a macro perspective so as to provide reasonable decision support, predicting the development trend of network security. It is a means to analyze the network security quantitatively. Although NSSA has received extensive attention and exploration, there is a lack of comprehensive reviews of the related technologies. This paper presents a state-of-the-art study on NSSA that can help bridge the current research status and future large-scale application. First, the paper provides a concise introduction to NSSA, highlighting its development process. Then, the paper focuses on the research progress of key technologies in recent years. We further discuss the classic use cases of NSSA. Finally, the survey details various challenges and potential research directions related to NSSA. Network security situation awareness (NSSA) is an integral part of cybersecurity defense, and it is essential for cybersecurity managers to respond to increasingly sophisticated cyber threats. Different from traditional security measures, NSSA can identify the behavior of various activities in the network and conduct intent understanding and impact assessment from a macro perspective so as to provide reasonable decision support, predicting the development trend of network security. It is a means to analyze the network security quantitatively. Although NSSA has received extensive attention and exploration, there is a lack of comprehensive reviews of the related technologies. This paper presents a state-of-the-art study on NSSA that can help bridge the current research status and future large-scale application. First, the paper provides a concise introduction to NSSA, highlighting its development process. Then, the paper focuses on the research progress of key technologies in recent years. We further discuss the classic use cases of NSSA. Finally, the survey details various challenges and potential research directions related to NSSA.Network security situation awareness (NSSA) is an integral part of cybersecurity defense, and it is essential for cybersecurity managers to respond to increasingly sophisticated cyber threats. Different from traditional security measures, NSSA can identify the behavior of various activities in the network and conduct intent understanding and impact assessment from a macro perspective so as to provide reasonable decision support, predicting the development trend of network security. It is a means to analyze the network security quantitatively. Although NSSA has received extensive attention and exploration, there is a lack of comprehensive reviews of the related technologies. This paper presents a state-of-the-art study on NSSA that can help bridge the current research status and future large-scale application. First, the paper provides a concise introduction to NSSA, highlighting its development process. Then, the paper focuses on the research progress of key technologies in recent years. We further discuss the classic use cases of NSSA. Finally, the survey details various challenges and potential research directions related to NSSA. |
| Audience | Academic |
| Author | Zhang, Junwei Feng, Huamin Zhao, Dongmei Liu, Biao |
| AuthorAffiliation | 1 School of Cyber Engineering, Xidian University, Xi’an 710126, China 2 School of Cyber Engineering, Beijing Electronic Science and Technology Institute, Beijing 100070, China 3 College of Computer and Cyber Security, Hebei Normal University, Shijiazhuang 050025, China |
| AuthorAffiliation_xml | – name: 2 School of Cyber Engineering, Beijing Electronic Science and Technology Institute, Beijing 100070, China – name: 1 School of Cyber Engineering, Xidian University, Xi’an 710126, China – name: 3 College of Computer and Cyber Security, Hebei Normal University, Shijiazhuang 050025, China |
| Author_xml | – sequence: 1 givenname: Junwei orcidid: 0000-0002-6705-5511 surname: Zhang fullname: Zhang, Junwei – sequence: 2 givenname: Huamin surname: Feng fullname: Feng, Huamin – sequence: 3 givenname: Biao surname: Liu fullname: Liu, Biao – sequence: 4 givenname: Dongmei surname: Zhao fullname: Zhao, Dongmei |
| BackLink | https://www.ncbi.nlm.nih.gov/pubmed/36904812$$D View this record in MEDLINE/PubMed |
| BookMark | eNplkk1r3DAQhkVJaT7aQ_9AMfTSHjYZfdiWoBCW0I9AaA-bnoUsjzbaeqVUshP231ebTUKSooPE6JlX82rmkOyFGJCQ9xSOOVdwkhmHmjUgX5EDKpiYScZg78l5nxzmvAJgnHP5huzzRoGQlB2QL4sp3eCmiq66RHsV4hCXm8qH6ieOtzH9qRZop-THTbXw42RGH0M1vzUJA-b8lrx2Zsj47n4_Ir-_fb08-zG7-PX9_Gx-MbM1qHGGplW1UFawxvJadgqN4W3PpOpAmt5SZ7quV05IBa7mHTpphZGuscA6QMGPyPlOt49mpa-TX5u00dF4fReIaalNGr0dUFOuRN93UvDeCYrc1Ez04GiHYGpqtlqnO63rqVtjbzGMyQzPRJ_fBH-ll_FGUwBoRdMUhU_3Cin-nTCPeu2zxWEwAeOUNWtlQ0Goui7oxxfoKk4plL_aUqU0KFChjnfU0hQHPrhYHrZl9bj2trTa-RKft4IWW63Yevjw1MNj8Q9tLcDJDrAp5pzQaevHu-YVZT8UL3o7OPpxcErG5xcZD6L_s_8AK5TBew |
| CitedBy_id | crossref_primary_10_3390_app14188408 crossref_primary_10_3390_app14146348 crossref_primary_10_3390_sym16091183 crossref_primary_10_4018_IJICTE_337611 crossref_primary_10_60097_ACIG_190345 crossref_primary_10_3390_electronics12163458 crossref_primary_10_3390_app14083195 crossref_primary_10_3390_sym17030385 crossref_primary_10_1016_j_compeleceng_2024_109393 crossref_primary_10_3390_app14156652 crossref_primary_10_4018_IJeC_357637 crossref_primary_10_3390_electronics14081533 crossref_primary_10_1016_j_knosys_2024_112037 |
| Cites_doi | 10.1166/asl.2012.1852 10.1007/978-3-030-95903-6_3 10.1109/ICICTA.2010.575 10.1088/1742-6596/1856/1/012056 10.1145/310889.310919 10.1007/s10462-021-09976-0 10.1109/ICICIC.2008.436 10.1145/3407023.3407062 10.1186/s13638-019-1506-1 10.1109/MILCOM.2014.53 10.1016/j.ins.2020.05.012 10.1007/s12530-018-9234-z 10.3390/s21144788 10.1002/spy2.183 10.1145/2671491.2671495 10.1201/b12461 10.1109/ICETCI53161.2021.9563590 10.23919/EUSIPCO.2018.8553214 10.1088/1742-6596/1883/1/012108 10.1109/TBDATA.2016.2616146 10.23940/ijpe.20.08.p4.11711182 10.1007/s11277-020-07421-z 10.1145/3394963 10.1109/ICEIEC.2016.7589715 10.1016/j.cose.2017.09.011 10.1145/3241056 10.1002/jcc.24300 10.1109/IMCEC51613.2021.9482334 10.1016/j.dcan.2016.06.003 10.1109/DASC.2013.30 10.1109/COMST.2019.2933899 10.1145/3444370.3444607 10.1007/s11277-017-5202-3 10.1109/IWCMC48107.2020.9148549 10.1109/AICCSA53542.2021.9686823 10.1109/ICC45855.2022.9839016 10.1007/978-3-030-69717-4_81 10.1016/j.cose.2014.06.008 10.1155/2022/2794889 10.1145/3264947 10.1007/978-3-030-24268-8_10 10.1007/978-3-642-00219-9_2 10.3390/sym13010132 10.3390/electronics9122102 10.1109/ICCIAS.2006.295320 10.1016/j.dcan.2022.05.012 10.1002/spy2.152 10.1007/978-3-662-46742-8_39 10.1109/JIOT.2017.2668061 10.1109/CSCITA.2014.6839299 10.1145/3199668 10.1007/978-3-030-22263-5_16 10.1016/j.asoc.2021.107096 10.1109/CompComm.2017.8322583 10.1109/TIE.2018.2798605 10.1109/CSCI51800.2020.00066 10.14704/WEB/V17I2/WEB17038 10.1109/INFOCOMWKSHPS51825.2021.9484500 10.1145/332051.332079 10.1016/S1353-4858(20)30106-9 10.3390/info11040194 10.1109/TII.2022.3215192 10.1016/j.cie.2018.01.006 10.1109/IMSNA.2013.6743245 10.1109/TEVC.2019.2890858 10.1109/ICSESS47205.2019.9040716 10.1109/ACCESS.2022.3178195 10.23919/ChiCC.2017.8027994 10.1360/jos170885 10.1109/SmartNets50376.2021.9555418 10.1109/MWC.001.2000245 10.1109/MINES.2012.38 10.1007/s00500-020-04956-y 10.1155/2018/5380481 10.3390/s22072508 10.1049/iet-ifs.2018.5189 10.1109/CyberSA.2017.8073386 10.1016/j.future.2017.10.018 10.1145/2896387.2896420 10.1109/ACCESS.2019.2939490 10.1145/1314257.1314273 10.1007/978-3-319-49568-2_33 10.1016/j.proeng.2011.08.621 10.1177/154193128803200221 10.1109/CyberC.2015.47 10.1007/s11442-019-1698-7 10.1145/996943.996947 10.1109/ACCESS.2019.2897923 |
| ContentType | Journal Article |
| Copyright | COPYRIGHT 2023 MDPI AG 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. 2023 by the authors. 2023 |
| Copyright_xml | – notice: COPYRIGHT 2023 MDPI AG – notice: 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. – notice: 2023 by the authors. 2023 |
| DBID | AAYXX CITATION NPM 3V. 7X7 7XB 88E 8FI 8FJ 8FK ABUWG AFKRA AZQEC BENPR CCPQU DWQXO FYUFA GHDGH K9. M0S M1P PHGZM PHGZT PIMPY PJZUB PKEHL PPXIY PQEST PQQKQ PQUKI PRINS 7X8 5PM DOA |
| DOI | 10.3390/s23052608 |
| DatabaseName | CrossRef PubMed ProQuest Central (Corporate) Health & Medical Collection (ProQuest) ProQuest Central (purchase pre-March 2016) Medical Database (Alumni Edition) Hospital Premium Collection Hospital Premium Collection (Alumni Edition) ProQuest Central (Alumni) (purchase pre-March 2016) ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Central Essentials ProQuest Central ProQuest One Community College ProQuest Central Korea Proquest Health Research Premium Collection Health Research Premium Collection (Alumni) ProQuest Health & Medical Complete (Alumni) Health & Medical Collection (Alumni Edition) Medical Database ProQuest One Academic ProQuest One Academic (New) ProQuest - Publicly Available Content Database ProQuest Health & Medical Research Collection ProQuest One Academic Middle East (New) ProQuest One Health & Nursing ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central China MEDLINE - Academic PubMed Central (Full Participant titles) DOAJ: Directory of Open Access Journal (DOAJ) |
| DatabaseTitle | CrossRef PubMed Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest Central Essentials ProQuest Health & Medical Complete (Alumni) ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest One Health & Nursing ProQuest Central China ProQuest Central ProQuest Health & Medical Research Collection Health Research Premium Collection Health and Medicine Complete (Alumni Edition) ProQuest Central Korea Health & Medical Research Collection ProQuest Central (New) ProQuest Medical Library (Alumni) ProQuest One Academic Eastern Edition ProQuest Hospital Collection Health Research Premium Collection (Alumni) ProQuest Hospital Collection (Alumni) ProQuest Health & Medical Complete ProQuest Medical Library ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) MEDLINE - Academic |
| DatabaseTitleList | PubMed Publicly Available Content Database CrossRef MEDLINE - Academic |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: NPM name: PubMed url: http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database – sequence: 3 dbid: PIMPY name: Publicly Available Content Database url: http://search.proquest.com/publiccontent sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1424-8220 |
| ExternalDocumentID | oai_doaj_org_article_1394ddb843df41e3a524d0f1be0a51a4 PMC10007466 A741843744 36904812 10_3390_s23052608 |
| Genre | Journal Article Review |
| GeographicLocations | United States China Germany |
| GeographicLocations_xml | – name: China – name: Germany – name: United States |
| GrantInformation_xml | – fundername: “High-precision” Discipline Construction Project of Beijing Universities grantid: 20210071Z0403 – fundername: Hebei Science Supported Planning Projects grantid: 20310701D |
| GroupedDBID | --- 123 2WC 53G 5VS 7X7 88E 8FE 8FG 8FI 8FJ AADQD AAHBH AAYXX ABDBF ABUWG ACUHS ADBBV ADMLS AENEX AFFHD AFKRA AFZYC ALMA_UNASSIGNED_HOLDINGS BENPR BPHCQ BVXVI CCPQU CITATION CS3 D1I DU5 E3Z EBD ESX F5P FYUFA GROUPED_DOAJ GX1 HH5 HMCUK HYE IAO ITC KQ8 L6V M1P M48 MODMG M~E OK1 OVT P2P P62 PHGZM PHGZT PIMPY PJZUB PPXIY PQQKQ PROAC PSQYO RNS RPM TUS UKHRP XSB ~8M 3V. ABJCF ALIPV ARAPS HCIFZ KB. M7S NPM PDBOC 7XB 8FK AZQEC DWQXO K9. PKEHL PQEST PQUKI PRINS 7X8 PUEGO 5PM |
| ID | FETCH-LOGICAL-c509t-ea79549c426c358b9eaa37d289b08adc1fabbd9f4890f53bef8c4a8f6c02b0e43 |
| IEDL.DBID | DOA |
| ISICitedReferencesCount | 19 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000948147600001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1424-8220 |
| IngestDate | Mon Nov 10 04:30:56 EST 2025 Tue Nov 04 02:07:36 EST 2025 Thu Sep 04 20:03:31 EDT 2025 Tue Oct 07 08:03:53 EDT 2025 Tue Nov 04 18:13:57 EST 2025 Wed Feb 19 02:24:57 EST 2025 Sat Nov 29 07:14:35 EST 2025 Tue Nov 18 21:44:36 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 5 |
| Keywords | NSSA visualization situation prediction situation assessment situation awareness artificial intelligence |
| Language | English |
| License | Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c509t-ea79549c426c358b9eaa37d289b08adc1fabbd9f4890f53bef8c4a8f6c02b0e43 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 ObjectType-Review-3 content type line 23 |
| ORCID | 0000-0002-6705-5511 |
| OpenAccessLink | https://doaj.org/article/1394ddb843df41e3a524d0f1be0a51a4 |
| PMID | 36904812 |
| PQID | 2785240553 |
| PQPubID | 2032333 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_1394ddb843df41e3a524d0f1be0a51a4 pubmedcentral_primary_oai_pubmedcentral_nih_gov_10007466 proquest_miscellaneous_2786104955 proquest_journals_2785240553 gale_infotracacademiconefile_A741843744 pubmed_primary_36904812 crossref_citationtrail_10_3390_s23052608 crossref_primary_10_3390_s23052608 |
| PublicationCentury | 2000 |
| PublicationDate | 20230227 |
| PublicationDateYYYYMMDD | 2023-02-27 |
| PublicationDate_xml | – month: 2 year: 2023 text: 20230227 day: 27 |
| PublicationDecade | 2020 |
| PublicationPlace | Switzerland |
| PublicationPlace_xml | – name: Switzerland – name: Basel |
| PublicationTitle | Sensors (Basel, Switzerland) |
| PublicationTitleAlternate | Sensors (Basel) |
| PublicationYear | 2023 |
| Publisher | MDPI AG MDPI |
| Publisher_xml | – name: MDPI AG – name: MDPI |
| References | Yang (ref_74) 2021; 102 ref_94 Ebazadeh (ref_81) 2022; 5 ref_93 ref_92 ref_90 Rongrong (ref_30) 2019; 13 ref_14 ref_13 ref_12 ref_11 ref_130 ref_133 ref_97 Wang (ref_7) 2022; 8 Jibao (ref_37) 2007; 24 ref_134 Chen (ref_28) 2018; 45 Feng (ref_101) 2018; 13 ref_18 ref_17 Zhang (ref_98) 2016; 2 ref_15 ref_126 ref_125 ref_128 ref_127 ref_25 Liu (ref_50) 2012; 5 Maintz (ref_113) 2016; 37 Li (ref_21) 2019; 2019 Chang (ref_54) 2020; 11 ref_120 Ren (ref_99) 2006; 42 Prvan (ref_4) 2020; 20 Mondal (ref_10) 2020; 17 ref_20 Xiaofei (ref_123) 2021; 8 Yan (ref_38) 2011; 38 Hu (ref_102) 2019; 7 Wu (ref_2) 2019; 92 Juan (ref_48) 2007; 27 Zarei (ref_1) 2021; 4 ref_72 Khan (ref_132) 2020; 22 ref_79 Nour (ref_5) 2021; 28 Xiuzhen (ref_63) 2006; 17 ref_73 Alali (ref_69) 2018; 74 Hossain (ref_75) 2019; 15 Su (ref_124) 2019; 23 ref_83 ref_82 Ioannou (ref_84) 2019; 7 Tian (ref_77) 2018; 2 Gong (ref_22) 2017; 28 Li (ref_55) 2020; 534 Zhang (ref_122) 2021; 55 Zhang (ref_78) 2018; 3 Chen (ref_111) 2022; 2022 Azhagiri (ref_16) 2017; 5 ref_87 ref_86 ref_85 Zaminkar (ref_131) 2020; 114 Zhang (ref_96) 2020; 16 Bass (ref_35) 2000; 43 Ahmad (ref_76) 2018; 14 ref_57 ref_56 ref_52 ref_51 Ning (ref_45) 2004; 7 ref_59 Zhao (ref_29) 2018; 125 Deng (ref_110) 2015; 29 ref_61 ref_60 ref_67 ref_66 ref_65 ref_64 (ref_24) 2018; 21 ref_62 Lai (ref_53) 2010; 37 Chen (ref_119) 2017; 39 Giacobe (ref_33) 2010; Volume 7710 Dong (ref_104) 2021; 1856 ref_114 Polatidis (ref_88) 2018; 11 ref_117 ref_118 Franke (ref_19) 2014; 46 Jia (ref_23) 2019; 18 ref_34 Zhao (ref_70) 2006; 27 Aanjankumar (ref_9) 2020; 24 ref_32 ref_31 Wu (ref_80) 2017; 4 ref_39 Beaver (ref_129) 2011; Volume 8019 Chen (ref_112) 2022; 1 Wu (ref_116) 2018; 4 Liang (ref_91) 2018; 2018 ref_103 Bass (ref_27) 1999; 24 ref_106 ref_108 ref_109 ref_47 ref_46 Wang (ref_58) 2018; 102 Lin (ref_107) 2021; 15 Gao (ref_121) 2019; 29 ref_44 ref_43 ref_100 ref_42 ref_41 ref_40 Barak (ref_8) 2020; 2020 Xue (ref_105) 2022; 2022 ref_3 Tang (ref_95) 2011; 15 ref_49 Huang (ref_89) 2018; 65 Zhuo (ref_71) 2012; 34 Zhu (ref_115) 2019; 21 Kong (ref_68) 2021; 1883 Huiqiang (ref_36) 2006; 33 Endsley (ref_26) 1988; Volume 32 ref_6 |
| References_xml | – volume: 5 start-page: 775 year: 2012 ident: ref_50 article-title: Network security situation awareness model based on multi-source fusion publication-title: Adv. Sci. Lett. doi: 10.1166/asl.2012.1852 – ident: ref_106 doi: 10.1007/978-3-030-95903-6_3 – volume: 2022 start-page: 6314262 year: 2022 ident: ref_111 article-title: Multimedia Security Situation Prediction Based on Optimization of Radial Basis Function Neural Network Algorithm publication-title: Comput. Intell. Neurosci. – ident: ref_49 doi: 10.1109/ICICTA.2010.575 – volume: 1856 start-page: 012056 year: 2021 ident: ref_104 article-title: Network security situation prediction method based on strengthened LSTM neural network publication-title: J. Phys. Conf. Ser. IOP Publ. doi: 10.1088/1742-6596/1856/1/012056 – ident: ref_87 doi: 10.1145/310889.310919 – volume: 55 start-page: 1029 year: 2021 ident: ref_122 article-title: Artificial intelligence in cyber security: Research advances, challenges, and opportunities publication-title: Artif. Intell. Rev. doi: 10.1007/s10462-021-09976-0 – ident: ref_65 – ident: ref_94 doi: 10.1109/ICICIC.2008.436 – ident: ref_18 doi: 10.1145/3407023.3407062 – volume: 2019 start-page: 205 year: 2019 ident: ref_21 article-title: Analysis framework of network security situational awareness and comparison of implementation methods publication-title: EURASIP J. Wirel. Commun. Netw. doi: 10.1186/s13638-019-1506-1 – ident: ref_42 doi: 10.1109/MILCOM.2014.53 – volume: 534 start-page: 53 year: 2020 ident: ref_55 article-title: Multi-source information fusion based heterogeneous network embedding publication-title: Inf. Sci. doi: 10.1016/j.ins.2020.05.012 – volume: 11 start-page: 479 year: 2018 ident: ref_88 article-title: From product recommendation to cyber-attack prediction: Generating attack graphs and predicting future attacks publication-title: Evol. Syst. doi: 10.1007/s12530-018-9234-z – ident: ref_60 doi: 10.3390/s21144788 – volume: 5 start-page: e183 year: 2022 ident: ref_81 article-title: A reliable and secure method for network-layer attack discovery and elimination in mobile ad-hoc networks based on a probabilistic threshold publication-title: Secur. Priv. doi: 10.1002/spy2.183 – ident: ref_118 doi: 10.1145/2671491.2671495 – volume: 3 start-page: 1 year: 2018 ident: ref_78 article-title: Dependable deep computation model for feature learning on big data in cyber-physical systems publication-title: ACM Trans. Cyber-Phys. Syst. – ident: ref_25 doi: 10.1201/b12461 – ident: ref_97 doi: 10.1109/ICETCI53161.2021.9563590 – ident: ref_125 doi: 10.23919/EUSIPCO.2018.8553214 – volume: 13 start-page: 25 year: 2018 ident: ref_101 article-title: A new method for the prediction of network security situations based on recurrent neural network with gated recurrent unit publication-title: Int. J. Intell. Comput. Cybern. – volume: 1883 start-page: 012108 year: 2021 ident: ref_68 article-title: Research on Network Security Situation Assessment Technology Based on Fuzzy Evaluation Method publication-title: J. Phys. Conf. Ser. IOP doi: 10.1088/1742-6596/1883/1/012108 – ident: ref_56 – volume: 4 start-page: 408 year: 2018 ident: ref_116 article-title: Big Data Analysis-Based Security Situational Awareness for Smart Grid publication-title: IEEE Trans. Big Data doi: 10.1109/TBDATA.2016.2616146 – volume: 16 start-page: 1171 year: 2020 ident: ref_96 article-title: Prediction Algorithm for Network Security Situation based on BP Neural Network Optimized by SA-SOA publication-title: Int. J. Perform. Eng. doi: 10.23940/ijpe.20.08.p4.11711182 – volume: 29 start-page: 5 year: 2015 ident: ref_110 article-title: Network Security Situation Prediction Method Based on Grey Theory publication-title: J. Hunan Univ. Technol. – volume: 114 start-page: 1287 year: 2020 ident: ref_131 article-title: SoS-RPL: Securing internet of things against sinkhole attack using RPL protocol-based node rating and ranking mechanism publication-title: Wirel. Pers. Commun. doi: 10.1007/s11277-020-07421-z – volume: 20 start-page: 1 year: 2020 ident: ref_4 article-title: Methods in Teaching Computer Networks: A Literature Review publication-title: ACM Trans. Comput. Educ. doi: 10.1145/3394963 – ident: ref_72 doi: 10.1109/ICEIEC.2016.7589715 – volume: 74 start-page: 323 year: 2018 ident: ref_69 article-title: Improving risk assessment model of cyber security using fuzzy logic inference system publication-title: Comput. Secur. doi: 10.1016/j.cose.2017.09.011 – volume: 15 start-page: 1 year: 2019 ident: ref_75 article-title: Applying deep learning for epilepsy seizure detection and brain mapping visualization publication-title: ACM Trans. Multimed. Comput. Commun. Appl. (TOMM) doi: 10.1145/3241056 – volume: 37 start-page: 1030 year: 2016 ident: ref_113 article-title: LOBSTER: A tool to extract chemical bonding from plane-wave based DFT publication-title: J. Comput. Chem. doi: 10.1002/jcc.24300 – volume: 39 start-page: 112 year: 2017 ident: ref_119 article-title: Big data analytics for network security and intelligence publication-title: Adv. Eng. Sci. – ident: ref_62 – ident: ref_90 doi: 10.1109/IMCEC51613.2021.9482334 – volume: 2 start-page: 139 year: 2016 ident: ref_98 article-title: A network security situation prediction model based on wavelet neural network with optimized parameters publication-title: Digit. Commun. Netw. doi: 10.1016/j.dcan.2016.06.003 – ident: ref_57 doi: 10.1109/DASC.2013.30 – volume: 22 start-page: 196 year: 2020 ident: ref_132 article-title: A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions publication-title: IEEE Commun. Surv. Tutor. doi: 10.1109/COMST.2019.2933899 – ident: ref_59 – ident: ref_15 doi: 10.1145/3444370.3444607 – volume: 102 start-page: 1401 year: 2018 ident: ref_58 article-title: Research on network security situation assessment and quantification method based on analytic hierarchy process publication-title: Wirel. Pers. Commun. doi: 10.1007/s11277-017-5202-3 – volume: 27 start-page: 4 year: 2006 ident: ref_70 article-title: Research on survivability situation assessment of network based on grey relational analysis publication-title: Small Microcomput. Syst. – ident: ref_17 doi: 10.1109/IWCMC48107.2020.9148549 – ident: ref_120 doi: 10.1109/AICCSA53542.2021.9686823 – ident: ref_126 doi: 10.1109/ICC45855.2022.9839016 – ident: ref_47 – volume: 24 start-page: 40 year: 1999 ident: ref_27 article-title: A glimpse into the future of id publication-title: Mag. Usenix Sage – volume: 15 start-page: 386 year: 2021 ident: ref_107 article-title: The prediction of network security situation based on deep learning method publication-title: Int. J. Inf. Comput. Secur. – ident: ref_114 doi: 10.1007/978-3-030-69717-4_81 – ident: ref_11 – ident: ref_86 – volume: 21 start-page: 115 year: 2019 ident: ref_115 article-title: Three Kinds of Network Security Situation Awareness Model Based on Big Data publication-title: Int. J. Netw. Secur. – volume: 46 start-page: 18 year: 2014 ident: ref_19 article-title: Cyber situational awareness–a systematic review of the literature publication-title: Comput. Secur. doi: 10.1016/j.cose.2014.06.008 – volume: 1 start-page: 103 year: 2022 ident: ref_112 article-title: Research on Internet Security Situation Awareness Prediction Technology based on Improved RBF Neural Network Algorithm publication-title: J. Comput. Cogn. Eng. – volume: 38 start-page: 4 year: 2011 ident: ref_38 article-title: YHSSAS: Large-scale Network Oriented Security Situational Awareness System publication-title: Comput. Sci. – ident: ref_14 – volume: 2022 start-page: 2794889 year: 2022 ident: ref_105 article-title: Prediction of Computer Network Security Situation Based on Association Rules Mining publication-title: Wirel. Commun. Mob. Comput. doi: 10.1155/2022/2794889 – volume: 11 start-page: 6 year: 2020 ident: ref_54 article-title: Security situation element extraction based on probabilistic neural network publication-title: Cyberspace Secur. – volume: 37 start-page: 64 year: 2010 ident: ref_53 article-title: Network Security Situation Element Extraction Method based on DsimC and EWDS publication-title: Comput. Sci. – volume: 2 start-page: 1 year: 2018 ident: ref_77 article-title: RF-based fall monitoring using convolutional neural networks publication-title: Proc. ACM Interactive Mobile Wearable Ubiquitous Technol. doi: 10.1145/3264947 – ident: ref_13 doi: 10.1007/978-3-030-24268-8_10 – ident: ref_128 doi: 10.1007/978-3-642-00219-9_2 – volume: 33 start-page: 5 year: 2006 ident: ref_36 article-title: Survey of Network Situation Awareness System publication-title: Comput. Sci. – ident: ref_92 doi: 10.3390/sym13010132 – ident: ref_134 doi: 10.3390/electronics9122102 – ident: ref_108 doi: 10.1109/ICCIAS.2006.295320 – volume: 21 start-page: 640 year: 2018 ident: ref_24 article-title: Survey of attack projection, prediction, and forecasting in cyber security publication-title: IEEE Commun. Surv. Tutor. – volume: 8 start-page: 644 year: 2022 ident: ref_7 article-title: Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT publication-title: Digit. Commun. Netw. doi: 10.1016/j.dcan.2022.05.012 – volume: Volume 7710 start-page: 77100R year: 2010 ident: ref_33 article-title: Application of the JDL data fusion process model for cyber security publication-title: Proceedings of the Multisensor, Multisource Information Fusion: Architectures, Algorithms, and Applications – volume: 27 start-page: 1907 year: 2007 ident: ref_48 article-title: Study on index system in network situation awareness publication-title: Comput. Appl. – ident: ref_64 – volume: 4 start-page: e152 year: 2021 ident: ref_1 article-title: Defense against flooding attacks using probabilistic thresholds in the internet of things ecosystem publication-title: Secur. Priv. doi: 10.1002/spy2.152 – ident: ref_83 doi: 10.1007/978-3-662-46742-8_39 – volume: 4 start-page: 636 year: 2017 ident: ref_80 article-title: Survey on prediction algorithms in smart homes publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2017.2668061 – ident: ref_117 doi: 10.1109/CSCITA.2014.6839299 – volume: 14 start-page: 1 year: 2018 ident: ref_76 article-title: Ensemble of deep models for event recognition publication-title: ACM Trans. Multimed. Comput. Commun. Appl. (TOMM) doi: 10.1145/3199668 – ident: ref_109 – ident: ref_103 doi: 10.1007/978-3-030-22263-5_16 – volume: 102 start-page: 107096 year: 2021 ident: ref_74 article-title: A network security situation assessment method based on adversarial deep learning publication-title: Appl. Soft Comput. doi: 10.1016/j.asoc.2021.107096 – ident: ref_79 doi: 10.1109/CompComm.2017.8322583 – ident: ref_32 – volume: 65 start-page: 8153 year: 2018 ident: ref_89 article-title: Assessing the physical impact of cyberattacks on industrial cyber-physical systems publication-title: IEEE Trans. Ind. Electron. doi: 10.1109/TIE.2018.2798605 – ident: ref_127 – volume: 5 start-page: 71 year: 2017 ident: ref_16 article-title: A multi-perspective and multi-level analysis framework in network security situational awareness publication-title: Int. J. Comput. Netw. Commun. Secur. – volume: 34 start-page: 1 year: 2012 ident: ref_71 article-title: Rough set analysis model for network situation assessment publication-title: Comput. Eng. Sci. – ident: ref_61 – ident: ref_130 doi: 10.1109/CSCI51800.2020.00066 – volume: 17 start-page: 363 year: 2020 ident: ref_10 article-title: Review Study on Different Attack Strategies of Worm in a Network publication-title: Webology doi: 10.14704/WEB/V17I2/WEB17038 – ident: ref_31 doi: 10.1109/INFOCOMWKSHPS51825.2021.9484500 – volume: 43 start-page: 99 year: 2000 ident: ref_35 article-title: Intrusion detection systems and multisensor data fusion publication-title: Commun. ACM doi: 10.1145/332051.332079 – volume: 2020 start-page: 16 year: 2020 ident: ref_8 article-title: Critical infrastructure under attack: Lessons from a honeypot publication-title: Netw. Secur. doi: 10.1016/S1353-4858(20)30106-9 – ident: ref_73 doi: 10.3390/info11040194 – ident: ref_52 – ident: ref_3 doi: 10.1109/TII.2022.3215192 – volume: 125 start-page: 764 year: 2018 ident: ref_29 article-title: Study on network security situation awareness based on particle swarm optimization algorithm publication-title: Comput. Ind. Eng. doi: 10.1016/j.cie.2018.01.006 – ident: ref_82 doi: 10.1109/IMSNA.2013.6743245 – volume: 23 start-page: 828 year: 2019 ident: ref_124 article-title: One pixel attack for fooling deep neural networks publication-title: IEEE Trans. Evol. Comput. doi: 10.1109/TEVC.2019.2890858 – volume: 24 start-page: 167 year: 2007 ident: ref_37 article-title: Study of network security situation awareness system based on Netflow publication-title: Comput. Appl. Res. – ident: ref_12 doi: 10.1109/ICSESS47205.2019.9040716 – ident: ref_20 doi: 10.1109/ACCESS.2022.3178195 – volume: 18 start-page: 1 year: 2019 ident: ref_23 article-title: Research status and development trend of network security situational awareness publication-title: J. Guangzhou Univ. – ident: ref_66 – ident: ref_100 doi: 10.23919/ChiCC.2017.8027994 – ident: ref_93 – volume: 17 start-page: 885 year: 2006 ident: ref_63 article-title: Quantitative Hierarchical Threat Evaluation Model for Network Security publication-title: J. Softw. doi: 10.1360/jos170885 – volume: 8 start-page: 16 year: 2021 ident: ref_123 article-title: Research on Power Information Network Security Situation Awareness Based on LDA-RBF publication-title: Low Volt. Appar. – volume: Volume 8019 start-page: 18 year: 2011 ident: ref_129 article-title: Visualization techniques for computer network defense publication-title: Proceedings of the Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense X – ident: ref_6 doi: 10.1109/SmartNets50376.2021.9555418 – volume: 28 start-page: 121 year: 2021 ident: ref_5 article-title: Information-Centric Networking in Wireless Environments: Security Risks and Challenges publication-title: IEEE Wirel. Commun. doi: 10.1109/MWC.001.2000245 – ident: ref_34 – ident: ref_51 doi: 10.1109/MINES.2012.38 – volume: 24 start-page: 16499 year: 2020 ident: ref_9 article-title: An efficient soft computing approach for securing information over GAMEOVER Zeus Botnets with modified CPA algorithm publication-title: Soft Comput. doi: 10.1007/s00500-020-04956-y – volume: 28 start-page: 17 year: 2017 ident: ref_22 article-title: Overview of Network security Situational Awareness publication-title: J. Softw. – volume: 2018 start-page: 5380481 year: 2018 ident: ref_91 article-title: A security situation prediction algorithm based on HMM in mobile network publication-title: Wirel. Commun. Mob. Comput. doi: 10.1155/2018/5380481 – volume: 45 start-page: 335 year: 2018 ident: ref_28 article-title: Research on cyberspace situation awareness security assessment based on improved BP neural network publication-title: Comput. Sci. – ident: ref_40 – ident: ref_133 doi: 10.3390/s22072508 – volume: 13 start-page: 149 year: 2019 ident: ref_30 article-title: Framework for risk assessment in cyber situational awareness publication-title: IET Inf. Secur. doi: 10.1049/iet-ifs.2018.5189 – ident: ref_41 doi: 10.1109/CyberSA.2017.8073386 – volume: 92 start-page: 705 year: 2019 ident: ref_2 article-title: In-band full duplex wireless communications and networking for iot devices: Progress, challenges and opportunities publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2017.10.018 – ident: ref_85 doi: 10.1145/2896387.2896420 – volume: 7 start-page: 130937 year: 2019 ident: ref_102 article-title: Network security situation prediction based on MR-SVM publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2939490 – ident: ref_44 doi: 10.1145/1314257.1314273 – ident: ref_39 doi: 10.1007/978-3-319-49568-2_33 – ident: ref_46 – volume: 42 start-page: 4 year: 2006 ident: ref_99 article-title: Network security situation prediction method based on RBF neural network publication-title: Comput. Eng. Appl. – volume: 15 start-page: 3313 year: 2011 ident: ref_95 article-title: Security situation prediction based on dynamic BP neural with covariance publication-title: Procedia Eng. doi: 10.1016/j.proeng.2011.08.621 – volume: Volume 32 start-page: 97 year: 1988 ident: ref_26 article-title: Design and evaluation for situation awareness enhancement publication-title: Proceedings of the Human Factors Society Annual Meeting doi: 10.1177/154193128803200221 – ident: ref_67 doi: 10.1109/CyberC.2015.47 – volume: 29 start-page: 5 year: 2019 ident: ref_121 article-title: The theoretical basis and technical path of cyberspace geography publication-title: J. Geogr. Sci. doi: 10.1007/s11442-019-1698-7 – volume: 7 start-page: 274 year: 2004 ident: ref_45 article-title: Techniques and tools for analyzing intrusion alerts publication-title: ACM Trans. Inf. Syst. Secur. (TISSEC) doi: 10.1145/996943.996947 – ident: ref_43 – volume: 7 start-page: 39305 year: 2019 ident: ref_84 article-title: A Markov multi-phase transferable belief model for cyber situational awareness publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2897923 |
| SSID | ssj0023338 |
| Score | 2.5026705 |
| SecondaryResourceType | review_article |
| Snippet | Network security situation awareness (NSSA) is an integral part of cybersecurity defense, and it is essential for cybersecurity managers to respond to... |
| SourceID | doaj pubmedcentral proquest gale pubmed crossref |
| SourceType | Open Website Open Access Repository Aggregation Database Index Database Enrichment Source |
| StartPage | 2608 |
| SubjectTerms | Algorithms Armed forces artificial intelligence Data security Decision making Forecasts and trends Internet of Things Neural networks NSSA visualization Ransomware Review Security management situation assessment situation awareness situation prediction Surveys Systems design Taxonomy Trends |
| SummonAdditionalLinks | – databaseName: ProQuest Central dbid: BENPR link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Lb9QwEB7BlgMceD8CBRmEBJeoSeysbQkJbVErTquKBak3y09YCSVlH0X8e8aJN90IxIVrPIdxZsbzjR_fALx26CfaM5ZHLJGzEEKuQ6Fzw40vuA8y6L7ZBJ_Pxfm5PEsbbut0rXK3JnYLtWtt3CM_qrioMfvUNX1_8SOPXaPi6WpqoXEdDiJTGZvAwfHJ_OzTUHJRrMB6PiGKxf3RGgF3jQhejLJQR9b_55K8l5PG9yX3EtDpnf9V_S7cTtCTzHpfuQfXfHMfbu0REj6Ad4vt6tL_Im0gV3vuZNmQeX9bnCxSuzuyWG56knAy-xnfk-GC-RC-nJ58_vAxT_0VcoswYZN7zeMhn8UkbWktjPRaU-6wBDOF0M6WQRvjZGBCFqGmxgdhmRZhaovKFJ7RRzBp2sY_AVJWQRguSxkqyaSm2gjHHTcidgA01mbwdve_lU3k47EHxneFRUg0jRpMk8GrQfSiZ9z4m9BxNNogEEmyuw_t6qtKMacQ3DLnjGDUBVZ6qtEKrggleqGuS80yeBNNrmIoozJWpxcJOKVIiqVmkdmHUc5Q8nBnWZVifK2uzJrBy2EYozMeuejGt9tOBvEpFqF1Bo97Jxp0plMZyXqqDMTIvUaTGo80y28dA3jZQb_p9Om_9XoGNyuMge4FPj-EyWa19c_hhr3cLNerFylWfgMf1SCo priority: 102 providerName: ProQuest |
| Title | Survey of Technology in Network Security Situation Awareness |
| URI | https://www.ncbi.nlm.nih.gov/pubmed/36904812 https://www.proquest.com/docview/2785240553 https://www.proquest.com/docview/2786104955 https://pubmed.ncbi.nlm.nih.gov/PMC10007466 https://doaj.org/article/1394ddb843df41e3a524d0f1be0a51a4 |
| Volume | 23 |
| WOSCitedRecordID | wos000948147600001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: DOA dateStart: 20010101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources (ISSN International Center) customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: M~E dateStart: 20010101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVPQU databaseName: Health & Medical Collection customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: 7X7 dateStart: 20010101 isFulltext: true titleUrlDefault: https://search.proquest.com/healthcomplete providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: BENPR dateStart: 20010101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: Publicly Available Content Database customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: PIMPY dateStart: 20010101 isFulltext: true titleUrlDefault: http://search.proquest.com/publiccontent providerName: ProQuest |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9QwEB5B4UAPiDeBdmUQElyiJrGztiUu22orOHS1YkFaTpGf6kooi_bRigu_nbGTTTcCqRcuPjgjy56HZya2vwF4Z1FPlGMsDbFEyrz3qfKZSjXXLuPOS6-aYhN8MhHzuZzulfoKd8IaeOCGcScYoTBrtWDUepY7qsqC2cznOJQqcxWRQDHq2SVTbapFMfNqcIQoJvUnawy0S4zcRc_7RJD-v7fiPV_Uvye553jOH8HDNmIko2amj-GOq5_A4R6O4FP4ONuurtwvsvTk5lc5WdRk0lzyJrO2Sh2ZLTYNtjcZXYdnYLjPPYNv5-OvZ5_StixCatC7b1KneDibM-hbDS2Flk4pyi1mTjoTyprcK62t9EzIzJdUOy8MU8IPTVbozDH6HA7qZe1eAskLLzSXufSFZFJRpYXllmsRCvdpYxL4sGNXZVrM8FC64keFuUPgbNVxNoG3HenPBijjX0SngecdQcC2jh0o8aqVeHWbxBN4HyRWBQvEyRjVPiTAJQUsq2oUAHkY5Qwpj3ZCrVrTXFcFFzhgVpY0gTfdZzSqcFKiarfcRhoMKzF3LBN40ehAN2c6lAFjp0hA9LSjt6j-l3pxGYG78xixDYev_gcbXsODAhU9Pq_nR3CwWW3dMdw3V5vFejWAu3zOYysGcO90PJl-GUQTwfbi9xj7pp8vpt__AHZnF9k |
| linkProvider | Directory of Open Access Journals |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Jb9QwFH4qUyTgwL4ECgQEgkvUJHbGtgRCw1J11HY00hSpnIJXGAklZZZW_VP8Rp6zdUYgbj1wjZ8iO_7elmd_D-CFQZxIS2nkY4mIOuci6WIZKaZszKwTTtbNJthoxI-OxHgDfrV3YfyxytYmVobalNr_I99OGc_Q-2QZeXf8M_Jdo3x1tW2hUcNiz56dYso2fzv8iPv7Mk13Ph1-2I2argKRRue4iKxkvrSl0TVpknElrJSEGUw8VMyl0YmTShnhKBexy4iyjmsquevrOFWxpQTfewk2KYKd92BzPDwYf-lSPIIZX81fRIiIt-cY4GeYMfA1r1c1B_jTBaz4wPXzmSsOb-fG__apbsL1JrQOB7Uu3IINW9yGayuEi3fgzWQ5O7FnYenC85pCOC3CUX0aPpw07fzCyXRRk6CHg1N_Xw4dwl34fCHTvwe9oizsAwiT1HHFRCJcKqiQRCpumGGK-w6HSusAXrf7m-uGXN33-PiRY5LloZB3UAjgeSd6XDOK_E3ovQdJJ-BJwKsH5exb3tiUHIN3aozilBhHE0sk7rqJXYJaJrNE0gBeeYjl3lThZLRsblzgkjzpVz7wzEWUMIqSWy2S8saGzfNzGAXwrBtG6-NLSrKw5bKSwfgbk-wsgPs1aLs5k77wZERpAHwNzmuLWh8ppt8rhvOkCm37_Yf_ntdTuLJ7eLCf7w9He4_gaor6V7ENsC3oLWZL-xgu65PFdD570uhpCF8vGu-_AfmcgHQ |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Jb9QwFH4qLUJwYF8CBQICwSWaJHbGtgRCA2XEqDAaaahUTsErjISSMkur_jV-Hc_ZOiMQtx64xk-RHX9vy7O_B_DMIE6kpTTysUREnXORdLGMFFM2ZtYJJ-tmE2w85oeHYrIFv9q7MP5YZWsTK0NtSu3_kfdSxjP0PllGeq45FjHZG745-hn5DlK-0tq206ghsm9PTzB9W7we7eFeP0_T4fvP7z5ETYeBSKOjXEZWMl_m0uimNMm4ElZKwgwmISrm0ujESaWMcJSL2GVEWcc1ldz1dZyq2FKC770AOxiSU9Sxncno0-RLl-4RzP5qLiNCRNxbYLCfYfbANzxg1SjgT3ew5g83z2quOb_htf_5s12Hq03IHQ5qHbkBW7a4CVfWiBhvwavpan5sT8PShWe1hnBWhOP6lHw4bdr8hdPZsiZHDwcn_h4dOorbcHAu078D20VZ2HsQJqnjiolEuFRQIYlU3DDDFPedD5XWAbxs9zrXDem67_3xI8fky8Mi72ARwNNO9KhmGvmb0FsPmE7Ak4NXD8r5t7yxNTkG9dQYxSkxjiaWSESAiV2C2iezRNIAXni45d6E4WS0bG5i4JI8GVg-8IxGlDCKkrstqvLGti3yM0gF8KQbRqvkS02ysOWqksG4HJPvLIC7NYC7OZO-8CRFaQB8A9obi9ocKWbfK-bzpAp5-_37_57XY7iEIM8_jsb7D-ByiqpYkRCwXdhezlf2IVzUx8vZYv6oUdkQvp433H8DNhOJNA |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Survey+of+Technology+in+Network+Security+Situation+Awareness&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=Junwei+Zhang&rft.au=Huamin+Feng&rft.au=Biao+Liu&rft.au=Dongmei+Zhao&rft.date=2023-02-27&rft.pub=MDPI+AG&rft.eissn=1424-8220&rft.volume=23&rft.issue=5&rft.spage=2608&rft_id=info:doi/10.3390%2Fs23052608&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_1394ddb843df41e3a524d0f1be0a51a4 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon |