{"id":"https://openalex.org/W4415376252","doi":"https://doi.org/10.1007/s13198-025-03013-x","title":"Mobile network intelligent recommendation based on data mining and network security application in college student employment recommendation system","display_name":"Mobile network intelligent recommendation based on data mining and network security application in college student employment recommendation system","publication_year":2025,"publication_date":"2025-10-21","ids":{"openalex":"https://openalex.org/W4415376252","doi":"https://doi.org/10.1007/s13198-025-03013-x"},"language":"en","primary_location":{"id":"doi:10.1007/s13198-025-03013-x","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s13198-025-03013-x","pdf_url":"https://link.springer.com/content/pdf/10.1007/s13198-025-03013-x.pdf","source":{"id":"https://openalex.org/S40280859","display_name":"International Journal of Systems Assurance Engineering and Management","issn_l":"0975-6809","issn":["0975-6809","0976-4348"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of System Assurance Engineering and Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://link.springer.com/content/pdf/10.1007/s13198-025-03013-x.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Qianhan Zhang","orcid":"https://orcid.org/0009-0000-7567-2344"},"institutions":[{"id":"https://openalex.org/I15823474","display_name":"Linyi University","ror":"https://ror.org/01knv0402","country_code":"CN","type":"education","lineage":["https://openalex.org/I15823474"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qianhan Zhang","raw_affiliation_strings":["Department of Commerce and Logistics, Linyi Vocational College, Linyi, 276017, Shandong, China"],"raw_orcid":"https://orcid.org/0009-0000-7567-2344","affiliations":[{"raw_affiliation_string":"Department of Commerce and Logistics, Linyi Vocational College, Linyi, 276017, Shandong, China","institution_ids":["https://openalex.org/I15823474"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I15823474"],"apc_list":{"value":2390,"currency":"EUR","value_usd":2990},"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.54165284,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"17","issue":"3","first_page":"842","last_page":"852"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T14139","display_name":"E-commerce and Technology Innovations","score":0.9467999935150146,"subfield":{"id":"https://openalex.org/subfields/1403","display_name":"Business and International Management"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T14139","display_name":"E-commerce and Technology Innovations","score":0.9467999935150146,"subfield":{"id":"https://openalex.org/subfields/1403","display_name":"Business and International Management"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T14413","display_name":"Advanced Technologies in Various Fields","score":0.9283999800682068,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/recommender-system","display_name":"Recommender system","score":0.6366000175476074},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5209000110626221},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.5062000155448914},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4968000054359436},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4641999900341034},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.45980000495910645},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.4383000135421753},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4359999895095825}],"concepts":[{"id":"https://openalex.org/C557471498","wikidata":"https://www.wikidata.org/wiki/Q554950","display_name":"Recommender system","level":2,"score":0.6366000175476074},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.631600022315979},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5209000110626221},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.5062000155448914},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4968000054359436},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4641999900341034},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46369999647140503},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.45980000495910645},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4408000111579895},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.4383000135421753},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4359999895095825},{"id":"https://openalex.org/C14982408","wikidata":"https://www.wikidata.org/wiki/Q11006334","display_name":"Network Access Control","level":4,"score":0.40709999203681946},{"id":"https://openalex.org/C193524817","wikidata":"https://www.wikidata.org/wiki/Q386780","display_name":"Association rule learning","level":2,"score":0.39149999618530273},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.3361999988555908},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.325300008058548},{"id":"https://openalex.org/C24756922","wikidata":"https://www.wikidata.org/wiki/Q1757694","display_name":"Data quality","level":3,"score":0.304500013589859},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.299699991941452},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.2784999907016754},{"id":"https://openalex.org/C90936777","wikidata":"https://www.wikidata.org/wiki/Q917189","display_name":"Host-based intrusion detection system","level":4,"score":0.2700999975204468},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.27000001072883606},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.25060001015663147}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s13198-025-03013-x","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s13198-025-03013-x","pdf_url":"https://link.springer.com/content/pdf/10.1007/s13198-025-03013-x.pdf","source":{"id":"https://openalex.org/S40280859","display_name":"International Journal of Systems Assurance Engineering and Management","issn_l":"0975-6809","issn":["0975-6809","0976-4348"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of System Assurance Engineering and Management","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1007/s13198-025-03013-x","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s13198-025-03013-x","pdf_url":"https://link.springer.com/content/pdf/10.1007/s13198-025-03013-x.pdf","source":{"id":"https://openalex.org/S40280859","display_name":"International Journal of Systems Assurance Engineering and Management","issn_l":"0975-6809","issn":["0975-6809","0976-4348"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of System Assurance Engineering and Management","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4415376252.pdf","grobid_xml":"https://content.openalex.org/works/W4415376252.grobid-xml"},"referenced_works_count":16,"referenced_works":["https://openalex.org/W2499407996","https://openalex.org/W2610495018","https://openalex.org/W2757360138","https://openalex.org/W2796830023","https://openalex.org/W2799657611","https://openalex.org/W2936422567","https://openalex.org/W2988729496","https://openalex.org/W2988868065","https://openalex.org/W2998261580","https://openalex.org/W3010567022","https://openalex.org/W3024836211","https://openalex.org/W3044853528","https://openalex.org/W3091797093","https://openalex.org/W3176055261","https://openalex.org/W4248220371","https://openalex.org/W4306654075"],"related_works":[],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2026-03-10T14:07:55.174380","created_date":"2025-10-21T00:00:00"}
