{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,8]],"date-time":"2024-08-08T07:07:44Z","timestamp":1723100864281},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["No. 61363006"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"the Open Projects of State Key Laboratory of Integrated Service Networks (ISN) of Xidian University","award":["No. ISN19-13"]},{"name":"the National Natural Science Foundation of Guangxi","award":["No. 2016GXNSFAA380098"]},{"name":"the Science and Technology Program of Guangxi","award":["No. AB17195045"]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1186\/s13638-018-1309-9","type":"journal-article","created":{"date-parts":[[2018,12,22]],"date-time":"2018-12-22T01:04:00Z","timestamp":1545440640000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Graph database-based network security situation awareness data storage method"],"prefix":"10.1186","volume":"2018","author":[{"given":"Xiaoling","family":"Tao","sequence":"first","affiliation":[]},{"given":"Yang","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-5730-2208","authenticated-orcid":false,"given":"Feng","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Changsong","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,22]]},"reference":[{"key":"1309_CR1","doi-asserted-by":"crossref","unstructured":"Z. Cai, X. Zheng, in IEEE Transactions on Network Science and Engineering. A private and efficient mechanism for data uploading in smart cyber-physical systems (IEEE, 2018).","DOI":"10.1109\/TNSE.2018.2830307"},{"key":"1309_CR2","unstructured":"Z. Cai, Z. He, X. Guan, Li Y., in IEEE Transactions onDependable and Secure Computing. Collective data-sanitization for preventing sensitive information inference attacks in social networks (IEEE, 2018), pp. 577\u2013590."},{"key":"1309_CR3","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1518\/001872095779049543","volume":"37","author":"M.R. Endsley","year":"1995","unstructured":"M.R. Endsley, Toward a theory of situation awareness in dynamic systems. Hum. Factors. 37:, 32\u201364 (1995).","journal-title":"Hum. Factors"},{"key":"1309_CR4","doi-asserted-by":"publisher","first-page":"1029","DOI":"10.1016\/j.proenv.2011.09.165","volume":"10","author":"Y. Zhang","year":"2011","unstructured":"Y. Zhang, S. Huang, S. Guo, J. Zhu, Multi-sensor data fusion for cyber security situation awareness. Procedia Environ Sci. 10:, 1029\u20131034 (2011).","journal-title":"Procedia Environ Sci"},{"key":"1309_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2014.04.005","volume":"44","author":"J. Webb","year":"2014","unstructured":"J. Webb, A. Ahmad, S. B. Maynard, G. Shanks, A situation awareness model for information security risk management. Comput. Secur. 44:, 1\u201315 (2014).","journal-title":"Comput. Secur"},{"key":"1309_CR6","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.bdr.2015.11.002","volume":"3","author":"Z. Chen","year":"2016","unstructured":"Z. Chen, G. Xu, V. Mahalingam, L. Ge, J. Nguyen, W. Yu, C. Lu, A cloud computing based network monitoring and threat detection system for critical infrastructures. Big Data Res. 3:, 10\u201323 (2016).","journal-title":"Big Data Res"},{"key":"1309_CR7","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/ICON-SONICS.2017.8267823","volume-title":"International Conference on Smart Cities, Automation & Intelligent Computing Systems (ICON-SONICS)","author":"B.W. Masduki","year":"2017","unstructured":"B.W. Masduki, K. Ramli, M. Salman, in International Conference on Smart Cities, Automation & Intelligent Computing Systems (ICON-SONICS). Leverage intrusion detection system framework for cyber situational awareness system (IEEEYogyakarta, 2017), pp. 64\u201369."},{"key":"1309_CR8","first-page":"49","volume":"21","author":"F. Chen","year":"2010","unstructured":"F. Chen, Y. Zhang, S. U. Jin-Shu, W. B. Han, Two formal analyses of attack graphs. J. Softw. 21:, 49\u201363 (2010).","journal-title":"J. Softw"},{"key":"1309_CR9","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1109\/CarpathianCC.2016.7501078","volume-title":"17th International Carpathian Control Conference (ICCC)","author":"C. Constantinov","year":"2016","unstructured":"C. Constantinov, C.M. Poteras, M.L. Mocanu, in 17th International Carpathian Control Conference (ICCC). Performing real-time social recommendations on a highly-available graph database cluster (IEEETatranska Lomnica, 2016), pp. 116\u2013121."},{"key":"1309_CR10","first-page":"73","volume":"34","author":"H. Gu","year":"2017","unstructured":"H. Gu, Z. Han, J. Xu, Framework of parallel layout algorithm based on large-scale social networks. Comput. Appl. Softw. 34:, 73\u201378 (2017).","journal-title":"Comput. Appl. Softw"},{"key":"1309_CR11","first-page":"470","volume-title":"International Symposium on Telecommunications","author":"F. Zarrinkalam","year":"2015","unstructured":"F. Zarrinkalam, M. Kahani, Paydar S., in International Symposium on Telecommunications. Using graph database for file recommendation in pad social network (IEEETehran, 2015), pp. 470\u2013475."},{"key":"1309_CR12","first-page":"1","volume-title":"International Conference on ICT in Business Industry & Government (ICTBIG)","author":"A.A. Patel","year":"2016","unstructured":"A.A. Patel, J.N. Dharwa, in International Conference on ICT in Business Industry & Government (ICTBIG). An integrated hybrid recommendation model using graph database (IEEEIndore, 2016), pp. 1\u20135."},{"key":"1309_CR13","doi-asserted-by":"publisher","first-page":"2560","DOI":"10.1109\/TPWRS.2016.2631242","volume":"32","author":"G. Ravikumar","year":"2017","unstructured":"G. Ravikumar, S.A. Khaparde, A common information model oriented graph database framework for power systems. IEEE Trans. Power Syst. 32:, 2560\u20132569 (2017).","journal-title":"IEEE Trans. Power Syst"},{"key":"1309_CR14","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.2991\/ijcis.10.1.96","volume":"10","author":"B. Kan","year":"2017","unstructured":"B. Kan, W. Zhu, G. Liu, X. Chen, D. Shi, W. Yu, Topology modeling and analysis of a power grid network using a graph database. Int. J. Comput. Intell. Syst. 10:, 1355\u20131363 (2017).","journal-title":"Int. J. Comput. Intell. Syst"},{"key":"1309_CR15","first-page":"239","volume-title":"International Conference on Security in Computer Networks and Distributed Systems","author":"M.S. Barik","year":"2014","unstructured":"M.S. Barik, Mazumdar C., in International Conference on Security in Computer Networks and Distributed Systems. A graph data model for attack graph generation and analysis (SpringerBerlin, 2014), pp. 239\u2013250."},{"key":"1309_CR16","unstructured":"S. Noel, E. Harley, K.H. Tam, G. Gyor, Big-data architecture for cyber attack graphs representing security relationships in nosql graph databases (Citeseer, 2015)."},{"key":"1309_CR17","first-page":"263","volume-title":"International Conference on Information Systems Security. ICISS 2016. Lecture Notes in Computer Science, vol 10063.","author":"M.S. Barik","year":"2016","unstructured":"M.S. Barik, C. Mazumdar, A. Gupta, in International Conference on Information Systems Security. ICISS 2016. Lecture Notes in Computer Science, vol 10063., ed. by I. Ray, M. Gaur, M. Conti, D. Sanghi, and V. Kamakoti. Network vulnerability analysis using a constrained graph data model (SpringerCham, 2016), pp. 263\u2013282."},{"key":"1309_CR18","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.jpdc.2017.01.024","volume":"104","author":"A. K. TK","year":"2017","unstructured":"A. K. TK, J.P. Thomas, S. Parepally, An efficient and secure information retrieval framework for content centric networks. J. Parallel Distrib. Comput. 104:, 223\u2013233 (2017).","journal-title":"J. Parallel Distrib. Comput"},{"key":"1309_CR19","unstructured":"Z. Zhang, G. Pang, J. Hu, L. Su, Neo4j authoritative guide (Tsinghua University Press, 2017)."},{"key":"1309_CR20","first-page":"741","volume-title":"International Conference on Information Science and Control Engineering","author":"L. Zheng","year":"2017","unstructured":"L. Zheng, L. Zhou, X. Zhao, L. Liao, W. Liu, in International Conference on Information Science and Control Engineering. The spatio-temporal data modeling and application based on graph database (IEEEChangsha, 2017), pp. 741\u2013746."},{"key":"1309_CR21","unstructured":"I. Robinson, J. Webber, E. Eifrem, Graph databases (O\u2019Reilly Media, Inc., 2013)."},{"key":"1309_CR22","doi-asserted-by":"crossref","unstructured":"J. Webber, in Proceedings of the 3rd annual conference on Systems, programming, and applications: software for humanity. A programmatic introduction to Neo4j (ACM, 2012), pp. 217\u2013218.","DOI":"10.1145\/2384716.2384777"},{"key":"1309_CR23","first-page":"533","volume-title":"Communications and Networks, International Conference on Consumer Electronics","author":"H. Huang","year":"2013","unstructured":"H. Huang, Z. Dong, in Communications and Networks, International Conference on Consumer Electronics. Research on architecture and query performance based on distributed graph database neo4j (IEEEXianning, 2013), pp. 533\u2013536."},{"key":"1309_CR24","first-page":"41","volume-title":"Fifth International Conference on Advances in Computing and Communications","author":"A. Sharma","year":"2016","unstructured":"A. Sharma, S. Batra, in Fifth International Conference on Advances in Computing and Communications. Enhancing the accuracy of movie recommendation system based on probabilistic data structure and graph database (IEEEKochi, 2016), pp. 41\u201345."},{"key":"1309_CR25","doi-asserted-by":"crossref","unstructured":"C.I. Johnpaul, T. Mathew, in International Conference on Advanced Computing and Communication Systems. A Cypher query based NoSQL data mining on protein datasets using Neo4j graph database (IEEE, 2017), pp. 1\u20136.","DOI":"10.1109\/ICACCS.2017.8014558"},{"key":"1309_CR26","unstructured":"A. Vukotic, N. Watt, T. Abedrabbo, D. Fox, J. Partner, Neo4j in action (Manning Publications Co., 2014)."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-018-1309-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-018-1309-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-018-1309-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,22]],"date-time":"2019-12-22T00:27:34Z","timestamp":1576974454000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-018-1309-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["1309"],"URL":"https:\/\/doi.org\/10.1186\/s13638-018-1309-9","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12]]},"assertion":[{"value":"20 August 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 November 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Publisher\u2019s Note"}}],"article-number":"294"}}