{“status”:“ok”,“message type”:“work”,“message version”:“1.0.0”,“message”:{“indexed”:{“date parts”:[[2023,11,28],“date time”:“2023-11-28T00:41:55Z”,“timestamp”:1701132115789},“reference count”:44,“publisher”:“Institute of Electrical and Electronics Engineers(IEEE)”,“license”:[{“start”:{“date parts”:[[2023,1,1]],“date time”:“2023-01-01T00:00:00Z”,“timestamp”:1672531200000},“content-version”:“vor”,“delay-in-days”:0,“URL”:“https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/”}],“content-domain”:{“domain”:[],“crossmark-restriction”:false},”short-container-title“:[”IEEE Access“],”published-print“:{”date-parts“:[2023]]}”,“DOI”:“10.1109\/Access.2023.33 328194“,”类型“:”期刊文章“,“created”:{“date-parts”:[[2023,10,27]],“date-time”:“2023-10-27T18:00:16Z”,“timestamp”:1698429616000},“page”:“119693-19710”,“source”:”Crossref“,“is-referenced-by-count”:0,“title”:[“An Optimized Approach for Assisted Firewall Anomaly Resolution”],“prefix”:“10.1109”,“volume”:“11”,“author”:[{“ORCID”::“http://\/ORCID.org\/00000-0002-308 6-7364英寸,“authenticated-orcid”:false,“given”:“Daniele”,“family”:“Bringhenti”,“sequence”:“first”,“affiliation”:[{“name”:“Dipartimento di Automatica e Informatica,Politecnico di Torino,Turin,Italy”}]},{“orcid”:”http://\/orcid.org\/00000-0002-4326-7536“,”authentimated-orcid“:false”,“give”:“Lucia”,”family“Seno”,“序列”:“additional”,“从属关系”:[{“name”:“CNR Istituto di Elettronica e di Ingegneria dell'Informazione e delle Telecomunicazioni(CNR-IEIIT),意大利帕多瓦”}]},{“ORCID”:“http://\/ORCID.org\/00000-0002-8471-3029”,“authenticated-ORCID”:false,“given”::“Dipartimento di Automatica e Informatica,Politecnico di Torino,Turin,Italy”}]}],“member”:“263”,“reference”:[{“key”:“ref13”,“doi-asserted-by”:“publisher”,“doi”:“10.1109”,TDSC.2022.3160293 ted-by“:”publisher“,”doi“:”10.1109\/MSEC.2021.3117471“},{“key”:“ref34”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/ACCESS.2021.3100141”}y“:”crossref“,”first page“:”3“,”doi“:”10.1016\/j.entcs.2007.01.064“,“article-title”:“高级访问控制模型中的高级冲突管理策略”,“volume”:“186”,“author”:“cuppen”,“year”:“2006”,“journal-title“:”理论计算机科学中的电子笔记“},{“key”:”ref36“,”first page“:”154“,”article-title“:”检测和删除防火墙错误配置“,”author“:”cuppen“,”year“:”2005“”,“journal-title”:“Proc Int Conf Commun Netw Inf Secur”},{“key”:“ref31”,“doi-asserted-by”:“publisher”,“doi”:“10.1007\/s11042-013-1673-8”}软件定义网络”,“volume”:“76”,“author”:“schnepf”,“year”:“2018”,“journal-title”:“Electronic Comm the European Assoc Software Science and Technology”},{“key”:”ref33“,”doi-asserted-by“:”publisher“,”doi“:”10.1109\/ACCESP.2021.3077146“},”{“密钥”:”ref10“,”doi-asserted-by“,”“doi”:“10.1109\/TPDS.2016.2585108”}“,{”key“:”ref32“,“doi-asserted-by”:“publisher”,“doi”:“10.1109”\/VIZSEC.2017.8062196“},{“key”:“ref2”,“year”:“2022”,”journal-title“:“Data Breach Investigations Report”},6-“key“:”ref1“,”doi-asserted-by“:”publisher“,”doi“:”10.33564 \/IJEAST.2020.v05i01.059“},{“key”:“ref39”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/ICC.2007.220”},{“key”:“ref16”,“doi断言者”:“publisher”,“doi”:“10.1007\/978-3-031-02067-4_9”},{“key”:“ref38”,“doi断言者”:“publisher”,“doi”:“10.1109\/TDSC.2012.20”},{“key”:“ref19”,“doi断言者”:“publisher”,“doi”:“10.1109\/JSAC.2005.854119”},{“key”:“ref18”,“doi由“:”publisher“断言,”doi“:”10.1109\/INM.2003.1194157“},{“key”:“ref24”,“doi-asserted-by”:“publisher”,“doi”:“10.3390\/sym14122668”},{“key”:”ref23“,”doi-assert-by“:”publisher“,”doi“:”10.1109\/TR.2021.3089511“},”key“:”ref26“,”doi-asserted-by“”:“publisher”,“doi”:”10.1007\/s1127-023-05417-7“}:“publisher”,“doi”:“10.1109\/ConTEL58387.2023.10198912”},{“key”:“ref20”,“first page”:“199”,“article-title”:“FIREMAN:防火墙建模与分析工具包”,“author”:“yuan”,“year”:“2006”,“journal-title“:”Proc IEEE Symp-Secur Privacy“},{“key”:”ref42“,“doi-asserted-by”:“publisher”,”doi“:”10.1145\/1066100.1066102“}”,{”key“:”ref41“,“first-page”:“6”,“article-titel”:“通过重写和关联检测网络安全组件错误配置”,“author”:“cuppens”,“year”:“2006”,“journal-title”:“Proc 11st Joint Conf Secur Netw Architectures(SAR)Secur Inf Syst(SSI)”},{“key”:“ref22”,“doi-asserted-by”:“publisher”,《doi》:“10.1145\/1363686.1364197”}:“10.1007\/978-3642-22110-1_14”},{“key”:“ref21”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/NOMS.2006.1687561”}6077012“},{“key”:“ref27”,“first-page”:“1”,“article-title”:“PolicyVis:防火墙安全策略可视化和检查”,“author”:“tran”,“year”:“2007”,“journal-title”:“Proc 21st Large Installation System Admin Conf”},{“key”:“ref29”,“doi-asserted-by”:“publisher”,”doi“:”10.1109\/TVCG.2007.70522“},”{“key”:”ref8“,”doi-assert-by“:”publisher“,”doi:“10.1109\/ACCES.2020.2979894”}“,{”key“:”ref 7英寸,“doi-asserted-by”:“publisher”,“doi”:“10.1016\/j.jnca.2019.102419”},{“key”:“ref9”,“doo-asserted-by”:”publisher“,”doi“:”10.1109\/TNSM.2020.3045781“doi”:“10.1007\/978-3-319-96142-2_18”},{“key”:“ref6”,“首页”:“699”,“文章标题”:“在具有可变数据路径的网络中验证可达性”,“author”:“panda”,“year”:“2017”,“journal-title”:“Proc 14th USENIX Symp Networked Syst Design Implement”},{“key”:“ref5”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/3295749”}“IEEE接入”],“original-title”:[],“link”:[{“URL”:“http://\/xplorestaging.ieee.org\/ielx7\/6287639\/1005208\/10298107.pdf?arnumber=10298107”,“内容类型”:“未指定”,“content-version”:“vor”,“intended-application”:“similarity-checking”}],“存放”:{“日期部分”:[2023,11,27]],“日期时间”:“2023-11-27T20:08:38Z”,“时间戳”“:1701115718000},”分数“:1,”资源“用法:{“primary”:{“URL”:“https:\/\/ieeexplore.iee.org\/document\/10298107\/”}},“subtitle”:[],“shorttitle”:[],“issued”:{”date-parts“:[[2023]]},”references-count“:44,”URL“:”http://\/dx.doi.org\/101109\/access.2023.3328194“,”relation“:{},‘ISSN’:[”2169-3536“],”ISSN-type“:[{“值”:“2169-3536”,“类型”:“电子”}],“主题”:[],“发布”:{“日期部分”:[[2023]]}}}