{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T16:25:23Z","timestamp":1648743923558},"reference-count":23,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"NSFC-Guangdong Joint Foundation","doi-asserted-by":"publisher","award":["U1501254"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61374081","61473331","61562008"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007162","name":"Science and Technology Planning Project of Guangdong Province, China","doi-asserted-by":"publisher","award":["2014A030307049","2015A030401101","2015B090922014","2016B030306002","201604010099","2017A040405063","2016B030308001"],"id":[{"id":"10.13039\/501100007162","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2017]]},"DOI":"10.1109\/access.2017.2746539","type":"journal-article","created":{"date-parts":[[2017,8,31]],"date-time":"2017-08-31T18:09:07Z","timestamp":1504202947000},"page":"20009-20019","source":"Crossref","is-referenced-by-count":3,"title":["Inferring Causal Direction From Multi-Dimensional Causal Networks for Assessing Harmful Factors in Security Analysis"],"prefix":"10.1109","volume":"5","author":[{"given":"Guizhen","family":"Mai","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-6322-6563","authenticated-orcid":false,"given":"Yinghan","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Shiguo","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Yuzhong","family":"Peng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.71"},{"key":"ref11","first-page":"157","article-title":"Distinguishing causes from effects using nonlinear acyclic causal models","volume":"6","author":"zhang","year":"2008","journal-title":"Proc Workshop Conf (NIPS Causality Workshop)"},{"key":"ref12","first-page":"143","article-title":"Inferring deterministic causal relations","author":"daniusis","year":"2010","journal-title":"Proc Conf UAI"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2012.01.002"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21852-6_18"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39678-6_1"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-015-1764-8"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2013.01.025"},{"key":"ref18","first-page":"208","article-title":"SADA: A general framework to support robust causation discovery","author":"cai","year":"2013","journal-title":"Proc Int Conf Mach Learn (ICML)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2016.2556724"},{"key":"ref4","first-page":"150","article-title":"Learning equivalence classes of Bayesian-network structures","volume":"2","author":"chickering","year":"2002","journal-title":"J Mach Learn Res"},{"key":"ref3","author":"cheng","year":"1998","journal-title":"Learning bayesian networks from data An efficient approach based on information theory"},{"key":"ref6","first-page":"1225","article-title":"DirectLiNGAM: A direct method for learning a linear non-Gaussian structural equation model","volume":"12","author":"shimizu","year":"2011","journal-title":"J Mach Learn Res"},{"key":"ref5","first-page":"2003","article-title":"A linear non-Gaussian acyclic model for causal discovery","volume":"7","author":"shimizu","year":"2006","journal-title":"J Mach Learn Res"},{"key":"ref8","first-page":"2009","article-title":"Causal discovery with continuous additive noise models","volume":"15","author":"peters","year":"2013","journal-title":"J Mach Learn Res"},{"key":"ref7","first-page":"689","article-title":"Nonlinear causal discovery with additive noise models","author":"hoyer","year":"2008","journal-title":"Proc Int Conf Neural Inf Process"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-2748-9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511803161"},{"key":"ref9","first-page":"597","article-title":"Identifying cause and effect on discrete data using additive noise models","author":"peters","year":"2010","journal-title":"Proc Int Conf Artif Intell Statist"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2010.10.023"},{"key":"ref22","first-page":"895","article-title":"Kernel-based conditional independence test and application in causal discovery","volume":"6","author":"zhang","year":"2012","journal-title":"Comput Sci"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553470"},{"key":"ref23","article-title":"The technology research of network security risk assessment based on attack graphs","author":"yan","year":"2014"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/7859429\/08023750.pdf?arnumber=8023750","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:29:57Z","timestamp":1642004997000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8023750\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/access.2017.2746539","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}