{"id":"https://openalex.org/W3215197382","doi":"https://doi.org/10.1007/s10207-021-00571-6","title":"Anomalous behavior detection-based approach for authenticating smart home system users","display_name":"Anomalous behavior detection-based approach for authenticating smart home system users","publication_year":2021,"publication_date":"2021-11-20","ids":{"openalex":"https://openalex.org/W3215197382","doi":"https://doi.org/10.1007/s10207-021-00571-6","mag":"3215197382","pmid":"https://pubmed.ncbi.nlm.nih.gov/34840546"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-021-00571-6","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-021-00571-6","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-021-00571-6.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","pubmed"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://link.springer.com/content/pdf/10.1007/s10207-021-00571-6.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030091193","display_name":"Noureddine Amraoui","orcid":"https://orcid.org/0000-0002-5873-1899"},"institutions":[{"id":"https://openalex.org/I108714496","display_name":"Tunis University","ror":"https://ror.org/02q1spa57","country_code":"TN","type":"education","lineage":["https://openalex.org/I108714496"]},{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Noureddine Amraoui","raw_affiliation_strings":["Mediatron Research Laboratory, Higher School of Communications of Tunis, University of Carthage, Technology City of Communications, El Ghazala, 2083 Ariana Tunisia","Mediatron Research Laboratory, Higher School of Communications of Tunis, University of Carthage, Technology City of Communications, El Ghazala, 2083, Ariana, Tunisia"],"affiliations":[{"raw_affiliation_string":"Mediatron Research Laboratory, Higher School of Communications of Tunis, University of Carthage, Technology City of Communications, El Ghazala, 2083 Ariana Tunisia","institution_ids":["https://openalex.org/I179097149"]},{"raw_affiliation_string":"Mediatron Research Laboratory, Higher School of Communications of Tunis, University of Carthage, Technology City of Communications, El Ghazala, 2083, Ariana, Tunisia","institution_ids":["https://openalex.org/I108714496","https://openalex.org/I179097149"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019942759","display_name":"Belhassen Zouari","orcid":"https://orcid.org/0000-0002-9842-0032"},"institutions":[{"id":"https://openalex.org/I108714496","display_name":"Tunis University","ror":"https://ror.org/02q1spa57","country_code":"TN","type":"education","lineage":["https://openalex.org/I108714496"]},{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Belhassen Zouari","raw_affiliation_strings":["Mediatron Research Laboratory, Higher School of Communications of Tunis, University of Carthage, Technology City of Communications, El Ghazala, 2083 Ariana Tunisia","Mediatron Research Laboratory, Higher School of Communications of Tunis, University of Carthage, Technology City of Communications, El Ghazala, 2083, Ariana, Tunisia"],"affiliations":[{"raw_affiliation_string":"Mediatron Research Laboratory, Higher School of Communications of Tunis, University of Carthage, Technology City of Communications, El Ghazala, 2083 Ariana Tunisia","institution_ids":["https://openalex.org/I179097149"]},{"raw_affiliation_string":"Mediatron Research Laboratory, Higher School of Communications of Tunis, University of Carthage, Technology City of Communications, El Ghazala, 2083, Ariana, Tunisia","institution_ids":["https://openalex.org/I108714496","https://openalex.org/I179097149"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5030091193"],"corresponding_institution_ids":["https://openalex.org/I108714496","https://openalex.org/I179097149"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":null,"fwci":1.6008,"has_fulltext":true,"cited_by_count":16,"citation_normalized_percentile":{"value":0.84638807,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"21","issue":"3","first_page":"611","last_page":"636"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7980380654335022},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6622151732444763},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6522451043128967},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5789018273353577},{"id":"https://openalex.org/keywords/initialization","display_name":"Initialization","score":0.5664747953414917},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5092033743858337},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5055232048034668},{"id":"https://openalex.org/keywords/home-automation","display_name":"Home automation","score":0.4232429265975952},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4222884774208069},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.4160316288471222},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.35967817902565},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3042092025279999},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.19000935554504395},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.10311540961265564},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09833520650863647}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7980380654335022},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6622151732444763},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6522451043128967},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5789018273353577},{"id":"https://openalex.org/C114466953","wikidata":"https://www.wikidata.org/wiki/Q6034165","display_name":"Initialization","level":2,"score":0.5664747953414917},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5092033743858337},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5055232048034668},{"id":"https://openalex.org/C507571656","wikidata":"https://www.wikidata.org/wiki/Q848436","display_name":"Home automation","level":2,"score":0.4232429265975952},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4222884774208069},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.4160316288471222},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.35967817902565},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3042092025279999},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.19000935554504395},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.10311540961265564},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09833520650863647},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1007/s10207-021-00571-6","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-021-00571-6","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-021-00571-6.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},{"id":"pmid:34840546","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/34840546","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International journal of information security","raw_type":null},{"id":"pmh:oai:HAL:hal-04530617v1","is_oa":false,"landing_page_url":"https://hal.science/hal-04530617","pdf_url":null,"source":{"id":"https://openalex.org/S4406922466","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"International Journal of Information Security, 2021, 21 (3), pp.611 - 636. &#x27E8;10.1007/s10207-021-00571-6&#x27E9;","raw_type":"Journal articles"},{"id":"pmh:oai:pubmedcentral.nih.gov:8605774","is_oa":true,"landing_page_url":"https://www.ncbi.nlm.nih.gov/pmc/articles/8605774","pdf_url":null,"source":{"id":"https://openalex.org/S2764455111","display_name":"PubMed Central","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Int J Inf Secur","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.1007/s10207-021-00571-6","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-021-00571-6","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-021-00571-6.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5099999904632568}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3215197382.pdf","grobid_xml":"https://content.openalex.org/works/W3215197382.grobid-xml"},"referenced_works_count":50,"referenced_works":["https://openalex.org/W1481547447","https://openalex.org/W1526070463","https://openalex.org/W1562919578","https://openalex.org/W1592326734","https://openalex.org/W1599494361","https://openalex.org/W1642437656","https://openalex.org/W1966864883","https://openalex.org/W2038819732","https://openalex.org/W2117064875","https://openalex.org/W2132870739","https://openalex.org/W2187846933","https://openalex.org/W2218242280","https://openalex.org/W2337344967","https://openalex.org/W2443352794","https://openalex.org/W2590373591","https://openalex.org/W2614763420","https://openalex.org/W2619405973","https://openalex.org/W2766560686","https://openalex.org/W2770584452","https://openalex.org/W2770625904","https://openalex.org/W2773898581","https://openalex.org/W2775405389","https://openalex.org/W2789639974","https://openalex.org/W2789828921","https://openalex.org/W2804835380","https://openalex.org/W2887423636","https://openalex.org/W2889033824","https://openalex.org/W2899703161","https://openalex.org/W2907777850","https://openalex.org/W2918756560","https://openalex.org/W2927309034","https://openalex.org/W2945594226","https://openalex.org/W2948603704","https://openalex.org/W2966043835","https://openalex.org/W2973698827","https://openalex.org/W2975984032","https://openalex.org/W2986164614","https://openalex.org/W2990216812","https://openalex.org/W3010525006","https://openalex.org/W3012437309","https://openalex.org/W3015935172","https://openalex.org/W3025080732","https://openalex.org/W3035898289","https://openalex.org/W3036554922","https://openalex.org/W3036874829","https://openalex.org/W3132008952","https://openalex.org/W6600005967","https://openalex.org/W6600741150","https://openalex.org/W6602117066","https://openalex.org/W6633589541"],"related_works":["https://openalex.org/W3204184292","https://openalex.org/W3176564347","https://openalex.org/W1985458517","https://openalex.org/W2355833770","https://openalex.org/W3031039437","https://openalex.org/W3095877357","https://openalex.org/W183202219","https://openalex.org/W10861731","https://openalex.org/W2072565696","https://openalex.org/W2050451745"],"abstract_inverted_index":null,"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2}],"updated_date":"2026-04-15T08:11:43.952461","created_date":"2025-10-10T00:00:00"}
