{"id":"https://openalex.org/W4394856118","doi":"https://doi.org/10.1007/s11277-024-11015-4","title":"Design of Intelligent Software Security System Based on Spark Big Data Computing","display_name":"Design of Intelligent Software Security System Based on Spark Big Data Computing","publication_year":2024,"publication_date":"2024-04-16","ids":{"openalex":"https://openalex.org/W4394856118","doi":"https://doi.org/10.1007/s11277-024-11015-4"},"language":"en","primary_location":{"id":"doi:10.1007/s11277-024-11015-4","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11277-024-11015-4","pdf_url":null,"source":{"id":"https://openalex.org/S49967189","display_name":"Wireless Personal Communications","issn_l":"0929-6212","issn":["0929-6212","1572-834X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Personal Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111418589","display_name":"Chong Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I83714178","display_name":"Shenyang Jianzhu University","ror":"https://ror.org/01zr73v18","country_code":"CN","type":"education","lineage":["https://openalex.org/I83714178"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chong Xu","raw_affiliation_strings":["School of Computer Science and Engineering, Shenyang Jianzhu University, Liaoning Province Big Data Management and Analysis Laboratory of Urban Construction, Shenyang Branch of National Special Computer Engineering Technology Research Center, Shenyang, Liaoning, 110168, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Shenyang Jianzhu University, Liaoning Province Big Data Management and Analysis Laboratory of Urban Construction, Shenyang Branch of National Special Computer Engineering Technology Research Center, Shenyang, Liaoning, 110168, China","institution_ids":["https://openalex.org/I83714178"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100646613","display_name":"Jing Li","orcid":"https://orcid.org/0000-0003-3027-4355"},"institutions":[{"id":"https://openalex.org/I106079672","display_name":"Hebei University of Engineering","ror":"https://ror.org/036h65h05","country_code":"CN","type":"education","lineage":["https://openalex.org/I106079672"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jing Li","raw_affiliation_strings":["School of Mining and Geomatics Engineering, Hebei University of Engineering, Handan, Hebei, 056038, China"],"affiliations":[{"raw_affiliation_string":"School of Mining and Geomatics Engineering, Hebei University of Engineering, Handan, Hebei, 056038, China","institution_ids":["https://openalex.org/I106079672"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100646613"],"corresponding_institution_ids":["https://openalex.org/I106079672"],"apc_list":{"value":2490,"currency":"EUR","value_usd":3090},"apc_paid":null,"fwci":1.8119,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.84682447,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":"140","issue":"3-4","first_page":"785","last_page":"805"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9851999878883362,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9851999878883362,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9768000245094299,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9674999713897705,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8530322313308716},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.7933520078659058},{"id":"https://openalex.org/keywords/spark","display_name":"SPARK (programming language)","score":0.6868526935577393},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6237339377403259},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6143481135368347},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4941618740558624},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.4658219516277313},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4368634521961212},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.4367430806159973},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.43381866812705994},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4043450355529785},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.3527718782424927},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.2360909879207611},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.22347930073738098},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14811840653419495}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8530322313308716},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.7933520078659058},{"id":"https://openalex.org/C2781215313","wikidata":"https://www.wikidata.org/wiki/Q3493345","display_name":"SPARK (programming language)","level":2,"score":0.6868526935577393},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6237339377403259},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6143481135368347},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4941618740558624},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.4658219516277313},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4368634521961212},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.4367430806159973},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.43381866812705994},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4043450355529785},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.3527718782424927},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.2360909879207611},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.22347930073738098},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14811840653419495},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s11277-024-11015-4","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11277-024-11015-4","pdf_url":null,"source":{"id":"https://openalex.org/S49967189","display_name":"Wireless Personal Communications","issn_l":"0929-6212","issn":["0929-6212","1572-834X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Personal Communications","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W2784070037","https://openalex.org/W2789539257","https://openalex.org/W2793130752","https://openalex.org/W2963200950","https://openalex.org/W2981371851","https://openalex.org/W2992054303","https://openalex.org/W3007601811","https://openalex.org/W3049699209","https://openalex.org/W3090295042","https://openalex.org/W3092214674","https://openalex.org/W3137779858","https://openalex.org/W3140745842","https://openalex.org/W3154460849","https://openalex.org/W3165167681","https://openalex.org/W3181401814","https://openalex.org/W3204492588","https://openalex.org/W3214913126","https://openalex.org/W4205339139","https://openalex.org/W4206323677","https://openalex.org/W4206737400","https://openalex.org/W4225852903","https://openalex.org/W4246894870","https://openalex.org/W4252012359","https://openalex.org/W4281557948","https://openalex.org/W4309969856","https://openalex.org/W4310007340","https://openalex.org/W4365812972","https://openalex.org/W4378212927","https://openalex.org/W4382362058","https://openalex.org/W4387029058","https://openalex.org/W4387668529","https://openalex.org/W4389352573","https://openalex.org/W6996120058"],"related_works":["https://openalex.org/W2921504876","https://openalex.org/W2183730421","https://openalex.org/W1982580243","https://openalex.org/W2551868243","https://openalex.org/W2348153269","https://openalex.org/W4205613068","https://openalex.org/W3112956360","https://openalex.org/W4310934799","https://openalex.org/W2046589905","https://openalex.org/W2767454858"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":5}],"updated_date":"2026-01-21T23:30:37.877113","created_date":"2025-10-10T00:00:00"}
