{"id":"https://openalex.org/W4415270660","doi":"https://doi.org/10.1002/spy2.70114","title":"Real\u2010Time Risk\u2010Adaptive Access Control With <scp>DRCFM</scp> : A Scalable <scp>BERT</scp> \u2010 <scp>LSTM</scp> \u2010 <scp>GRU</scp> Framework for Secure Systems","display_name":"Real\u2010Time Risk\u2010Adaptive Access Control With <scp>DRCFM</scp> : A Scalable <scp>BERT</scp> \u2010 <scp>LSTM</scp> \u2010 <scp>GRU</scp> Framework for Secure Systems","publication_year":2025,"publication_date":"2025-10-16","ids":{"openalex":"https://openalex.org/W4415270660","doi":"https://doi.org/10.1002/spy2.70114"},"language":"en","primary_location":{"id":"doi:10.1002/spy2.70114","is_oa":true,"landing_page_url":"https://doi.org/10.1002/spy2.70114","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/spy2.70114","source":{"id":"https://openalex.org/S4210233143","display_name":"Security and Privacy","issn_l":"2475-6725","issn":["2475-6725"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SECURITY AND PRIVACY","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/spy2.70114","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5120031958","display_name":"Donya Piriaei","orcid":null},"institutions":[{"id":"https://openalex.org/I4210114866","display_name":"Islamic Azad University Boroujerd Branch","ror":"https://ror.org/0265k0q35","country_code":"IR","type":"education","lineage":["https://openalex.org/I110525433","https://openalex.org/I4210114866"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Donya Piriaei","raw_affiliation_strings":["Department of Computer Engineering Borujerd Branch, Islamic Azad University  Borujerd Iran","Department of Computer Engineering, Borujerd Branch, Islamic Azad University, Borujerd, Iran"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering Borujerd Branch, Islamic Azad University  Borujerd Iran","institution_ids":["https://openalex.org/I4210114866"]},{"raw_affiliation_string":"Department of Computer Engineering, Borujerd Branch, Islamic Azad University, Borujerd, Iran","institution_ids":["https://openalex.org/I4210114866"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084829866","display_name":"Afshin Rezakhani","orcid":"https://orcid.org/0000-0001-5820-9753"},"institutions":[{"id":"https://openalex.org/I4210129530","display_name":"Ayatollah Boroujerdi University","ror":"https://ror.org/0377qcz53","country_code":"IR","type":"education","lineage":["https://openalex.org/I4210129530"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Afshin Rezakhani","raw_affiliation_strings":["Department of Computer Engineering, Faculty of Engineering Ayatollah Boroujerdi University  Borujerd Iran","Department of Computer Engineering, Faculty of Engineering, Ayatollah Boroujerdi University, Borujerd, Iran"],"raw_orcid":"https://orcid.org/0000-0001-5820-9753","affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Faculty of Engineering Ayatollah Boroujerdi University  Borujerd Iran","institution_ids":["https://openalex.org/I4210129530"]},{"raw_affiliation_string":"Department of Computer Engineering, Faculty of Engineering, Ayatollah Boroujerdi University, Borujerd, Iran","institution_ids":["https://openalex.org/I4210129530"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078475385","display_name":"Hamid Haj Seyyed Javadi","orcid":"https://orcid.org/0000-0003-0082-036X"},"institutions":[{"id":"https://openalex.org/I119025939","display_name":"Shahed University","ror":"https://ror.org/01e8ff003","country_code":"IR","type":"education","lineage":["https://openalex.org/I119025939"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Hamid Haj Seyyed Javadi","raw_affiliation_strings":["Department of Computer Engineering Shahed University  Tehran Iran","Department of Computer Engineering, Shahed University, Tehran, Iran"],"raw_orcid":"https://orcid.org/0000-0003-0082-036X","affiliations":[{"raw_affiliation_string":"Department of Computer Engineering Shahed University  Tehran Iran","institution_ids":["https://openalex.org/I119025939"]},{"raw_affiliation_string":"Department of Computer Engineering, Shahed University, Tehran, Iran","institution_ids":["https://openalex.org/I119025939"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017959583","display_name":"Leila Rikhtechi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210114866","display_name":"Islamic Azad University Boroujerd Branch","ror":"https://ror.org/0265k0q35","country_code":"IR","type":"education","lineage":["https://openalex.org/I110525433","https://openalex.org/I4210114866"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Leila Rikhtechi","raw_affiliation_strings":["Department of Computer Engineering Borujerd Branch, Islamic Azad University  Borujerd Iran","Department of Computer Engineering, Borujerd Branch, Islamic Azad University, Borujerd, Iran"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering Borujerd Branch, Islamic Azad University  Borujerd Iran","institution_ids":["https://openalex.org/I4210114866"]},{"raw_affiliation_string":"Department of Computer Engineering, Borujerd Branch, Islamic Azad University, Borujerd, Iran","institution_ids":["https://openalex.org/I4210114866"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5084829866"],"corresponding_institution_ids":["https://openalex.org/I4210129530"],"apc_list":{"value":3140,"currency":"USD","value_usd":3140},"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.37779893,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":"6","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":1.0,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":1.0,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.746999979019165},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.6230000257492065},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5748000144958496},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5738000273704529},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5315999984741211},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5006999969482422},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.4117000102996826},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.37549999356269836}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7882000207901001},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.746999979019165},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.6230000257492065},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5748000144958496},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5738000273704529},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5315999984741211},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5023999810218811},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5006999969482422},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.46160000562667847},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.41190001368522644},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.4117000102996826},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.37549999356269836},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3513999879360199},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.3310000002384186},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.32580000162124634},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.2971999943256378},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.28870001435279846},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.28139999508857727},{"id":"https://openalex.org/C71611378","wikidata":"https://www.wikidata.org/wiki/Q5165191","display_name":"Contextual design","level":3,"score":0.27880001068115234},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.2728999853134155},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.26429998874664307},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.2621000111103058},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.26019999384880066},{"id":"https://openalex.org/C73301696","wikidata":"https://www.wikidata.org/wiki/Q5469984","display_name":"Formalism (music)","level":3,"score":0.25999999046325684},{"id":"https://openalex.org/C50897621","wikidata":"https://www.wikidata.org/wiki/Q2665508","display_name":"Hybrid system","level":2,"score":0.25929999351501465}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/spy2.70114","is_oa":true,"landing_page_url":"https://doi.org/10.1002/spy2.70114","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/spy2.70114","source":{"id":"https://openalex.org/S4210233143","display_name":"Security and Privacy","issn_l":"2475-6725","issn":["2475-6725"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SECURITY AND PRIVACY","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1002/spy2.70114","is_oa":true,"landing_page_url":"https://doi.org/10.1002/spy2.70114","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/spy2.70114","source":{"id":"https://openalex.org/S4210233143","display_name":"Security and Privacy","issn_l":"2475-6725","issn":["2475-6725"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SECURITY AND PRIVACY","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4415270660.pdf","grobid_xml":"https://content.openalex.org/works/W4415270660.grobid-xml"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W2750779823","https://openalex.org/W2786372306","https://openalex.org/W2981186629","https://openalex.org/W3002823324","https://openalex.org/W4210668930","https://openalex.org/W4254300870","https://openalex.org/W4298153030","https://openalex.org/W4309777458","https://openalex.org/W4312891114","https://openalex.org/W4322769848","https://openalex.org/W4379046573","https://openalex.org/W4381094430","https://openalex.org/W4382786880","https://openalex.org/W4386388434","https://openalex.org/W4389299044","https://openalex.org/W4389903347","https://openalex.org/W4390227131","https://openalex.org/W4391558641","https://openalex.org/W4393276353","https://openalex.org/W4400428811","https://openalex.org/W4401701830","https://openalex.org/W4401896921","https://openalex.org/W4402279706","https://openalex.org/W4403586951","https://openalex.org/W4403664165","https://openalex.org/W4406298358","https://openalex.org/W4407097963","https://openalex.org/W4407597461","https://openalex.org/W4411962921"],"related_works":[],"abstract_inverted_index":{"ABSTRACT":[0],"This":[1],"study":[2,167],"introduces":[3],"a":[4,44,129,138,194],"BERT\u2010LSTM\u2010GRU":[5],"hybrid":[6],"model":[7,30,85,192],"for":[8,197],"dynamic":[9,198],"Risk\u2010Adaptive":[10],"Access":[11],"Control":[12],"(RAdAC),":[13],"designed":[14],"to":[15,59,62,106,148,215],"enhance":[16,217],"predictive":[17],"accuracy,":[18,88],"robustness,":[19],"and":[20,25,37,56,68,77,92,120,184,211,220],"scalability":[21],"in":[22,108,222],"real\u2010time":[23,163],"IoT":[24],"cloud":[26],"environments.":[27],"The":[28],"proposed":[29],"integrates":[31],"BERT's":[32],"contextual":[33],"embeddings":[34],"with":[35,153,174,201],"LSTM":[36,181],"GRU's":[38],"sequential":[39],"modeling":[40],"capabilities,":[41],"unified":[42],"by":[43,104,178,182,186],"novel":[45],"Dynamic":[46],"Risk\u2010Aware":[47],"Contextual":[48],"Fusion":[49],"Module":[50],"(DRCFM)":[51],"that":[52],"employs":[53],"risk\u2010aware":[54],"attention":[55],"reinforcement":[57],"learning":[58],"dynamically":[60],"adapt":[61],"varying":[63],"risk":[64],"levels.":[65],"Adversarial":[66],"training":[67],"explainable":[69],"AI":[70],"techniques":[71,214],"further":[72,216],"bolster":[73],"the":[74,84,96,125,169,191],"model's":[75],"resilience":[76],"transparency.":[78],"Evaluated":[79],"on":[80,95,124],"five":[81],"diverse":[82],"datasets,":[83],"achieves":[86],"96%":[87],"97%":[89],"F1":[90],"score,":[91],"0.99":[93],"AUC\u2010ROC":[94],"Human":[97],"Activity":[98],"Recognition":[99],"dataset,":[100,127],"outperforming":[101],"state\u2010of\u2010the\u2010art":[102],"baselines":[103],"up":[105],"5%":[107],"accuracy.":[109],"Under":[110],"adversarial":[111],"attacks":[112],"(FGSM,":[113],"PGD),":[114],"it":[115],"retains":[116],"92%":[117],"accuracy":[118,122,141,177],"(FGSM)":[119],"90%":[121],"(PGD)":[123],"same":[126],"demonstrating":[128],"14%":[130],"robustness":[131],"improvement":[132],"over":[133],"baselines.":[134],"Scalability":[135],"analysis":[136],"reveals":[137],"minimal":[139],"3%":[140],"drop":[142],"when":[143],"scaling":[144],"from":[145],"10":[146],"000":[147,150,151],"1":[149],"instances,":[152],"an":[154],"inference":[155],"time":[156],"of":[157,171],"14":[158],"ms":[159],"per":[160],"instance,":[161],"supporting":[162],"applications.":[164],"An":[165],"ablation":[166],"underscores":[168],"contributions":[170],"each":[172],"component,":[173],"BERT":[175],"improving":[176],"approximately":[179],"5%\u20136%,":[180],"5%,":[183],"GRU":[185],"4%.":[187],"These":[188],"results":[189],"position":[190],"as":[193],"comprehensive":[195],"solution":[196],"access":[199],"control,":[200],"future":[202],"research":[203],"directions":[204],"including":[205],"multi\u2010modal":[206],"data":[207],"integration,":[208],"edge":[209],"deployment,":[210],"advanced":[212],"explainability":[213],"its":[218],"applicability":[219],"trustworthiness":[221],"secure":[223],"systems.":[224]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-17T00:00:00"}
