{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T07:29:45Z","timestamp":1725434985028},"reference-count":7,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,8]]},"DOI":"10.1109\/ias.2009.251","type":"proceedings-article","created":{"date-parts":[[2009,10,12]],"date-time":"2009-10-12T19:50:33Z","timestamp":1255377033000},"page":"145-148","source":"Crossref","is-referenced-by-count":1,"title":["The Research of Simulation for Network Security Based on System Dynamics"],"prefix":"10.1109","author":[{"given":"Hong-shan","family":"Kong","sequence":"first","affiliation":[]},{"given":"Ming-qing","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Chang-yuan","family":"Luo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","article-title":"MAADNET NetBuilder: A Service\/Demand Focused Network Simulator","author":"hill","year":"2003","journal-title":"SCS Communication Networks and Distributed Systems Modeling and Simulation Conference"},{"journal-title":"at West Point","year":"0","key":"2"},{"key":"1","article-title":"Simulation Approaches in Information Security Education","author":"saunders","year":"2002","journal-title":"Proc 6th National Colloquium for Information System Security Education"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586130"},{"journal-title":"Worm Propagation Characteristic Research and Simulation Information Engineering University","year":"2008","author":"jie","key":"6"},{"year":"0","key":"5"},{"year":"0","author":"easel","key":"4"}],"event":{"name":"2009 Fifth International Conference on Information Assurance and Security (IAS)","start":{"date-parts":[[2009,8,18]]},"location":"Xi'an, China","end":{"date-parts":[[2009,8,20]]}},"container-title":["2009 Fifth International Conference on Information Assurance and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5282963\/5282971\/05283155.pdf?arnumber=5283155","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,13]],"date-time":"2021-02-13T02:32:58Z","timestamp":1613183578000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/5283155\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,8]]},"references-count":7,"URL":"https:\/\/doi.org\/10.1109\/ias.2009.251","relation":{},"subject":[],"published":{"date-parts":[[2009,8]]}}}