{"id":"https://openalex.org/W4312903356","doi":"https://doi.org/10.1109/dsit55514.2022.9943899","title":"Security situation awareness method of power mobile application based on big data architecture","display_name":"Security situation awareness method of power mobile application based on big data architecture","publication_year":2022,"publication_date":"2022-07-22","ids":{"openalex":"https://openalex.org/W4312903356","doi":"https://doi.org/10.1109/dsit55514.2022.9943899"},"language":"en","primary_location":{"id":"doi:10.1109/dsit55514.2022.9943899","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsit55514.2022.9943899","pdf_url":null,"source":{"id":"https://openalex.org/S4363608293","display_name":"2022 5th International Conference on Data Science and Information Technology (DSIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 5th International Conference on Data Science and Information Technology (DSIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100355277","display_name":"Yong Li","orcid":"https://orcid.org/0000-0001-5617-1659"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Li Yong","raw_affiliation_strings":["State Grid Key Laboratory of Information &#x0026; Network Security State Grid Smart Grid Research Enstitute Co., Ltd,Nanjing,China,210003"],"affiliations":[{"raw_affiliation_string":"State Grid Key Laboratory of Information &#x0026; Network Security State Grid Smart Grid Research Enstitute Co., Ltd,Nanjing,China,210003","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101482299","display_name":"Mu Chen","orcid":"https://orcid.org/0000-0003-3155-6960"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chen Mu","raw_affiliation_strings":["State Grid Key Laboratory of Information &#x0026; Network Security State Grid Smart Grid Research Enstitute Co., Ltd,Nanjing,China,210003"],"affiliations":[{"raw_affiliation_string":"State Grid Key Laboratory of Information &#x0026; Network Security State Grid Smart Grid Research Enstitute Co., Ltd,Nanjing,China,210003","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086857066","display_name":"ZaoJian Dai","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dai ZaoJian","raw_affiliation_strings":["State Grid Key Laboratory of Information &#x0026; Network Security State Grid Smart Grid Research Enstitute Co., Ltd,Nanjing,China,210003"],"affiliations":[{"raw_affiliation_string":"State Grid Key Laboratory of Information &#x0026; Network Security State Grid Smart Grid Research Enstitute Co., Ltd,Nanjing,China,210003","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100605099","display_name":"Chen L\u00fc","orcid":"https://orcid.org/0000-0003-1927-2391"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chen Lu","raw_affiliation_strings":["State Grid Key Laboratory of Information &#x0026; Network Security State Grid Smart Grid Research Enstitute Co., Ltd,Nanjing,China,210003"],"affiliations":[{"raw_affiliation_string":"State Grid Key Laboratory of Information &#x0026; Network Security State Grid Smart Grid Research Enstitute Co., Ltd,Nanjing,China,210003","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100355277"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14470774,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"44","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7659908533096313},{"id":"https://openalex.org/keywords/situation-awareness","display_name":"Situation awareness","score":0.6791635155677795},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.5753226280212402},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5580047965049744},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.48987123370170593},{"id":"https://openalex.org/keywords/terminal","display_name":"Terminal (telecommunication)","score":0.4479932188987732},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.43863725662231445},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.18551424145698547},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.18030869960784912},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12761661410331726},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11831572651863098}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7659908533096313},{"id":"https://openalex.org/C145804949","wikidata":"https://www.wikidata.org/wiki/Q478123","display_name":"Situation awareness","level":2,"score":0.6791635155677795},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.5753226280212402},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5580047965049744},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.48987123370170593},{"id":"https://openalex.org/C2779664074","wikidata":"https://www.wikidata.org/wiki/Q3518405","display_name":"Terminal (telecommunication)","level":2,"score":0.4479932188987732},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.43863725662231445},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.18551424145698547},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.18030869960784912},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12761661410331726},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11831572651863098},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dsit55514.2022.9943899","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsit55514.2022.9943899","pdf_url":null,"source":{"id":"https://openalex.org/S4363608293","display_name":"2022 5th International Conference on Data Science and Information Technology (DSIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 5th International Conference on Data Science and Information Technology (DSIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7799999713897705,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W1835962356","https://openalex.org/W1970378524","https://openalex.org/W2359962489","https://openalex.org/W2767660019","https://openalex.org/W2916257864","https://openalex.org/W4239510810"],"related_works":["https://openalex.org/W4390608645","https://openalex.org/W4247566972","https://openalex.org/W4394895745","https://openalex.org/W2960264696","https://openalex.org/W3090563135","https://openalex.org/W2497432351","https://openalex.org/W4206777497","https://openalex.org/W3211557223","https://openalex.org/W2910064364","https://openalex.org/W2367960839"],"abstract_inverted_index":{"According":[0],"to":[1,42,105,140,147],"the":[2,44,59,74,80,83,87,92,107,111,173,177,191],"characteristics":[3],"of":[4,51,61,69,110,179],"security":[5,17,65,108,130,133,142,153,180],"threats":[6],"and":[7,48,57,90,127,135,144,155,160,163,187,190],"massive":[8,52],"users":[9],"in":[10,198],"power":[11,53,70,124,150,200],"mobile":[12,15,54,71,75,88,112,125,151],"applications,":[13],"a":[14,199],"application":[16,55,72,113,152],"situational":[18],"awareness":[19,67,182],"method":[20,29,68,174],"based":[21],"on":[22],"big":[23,32],"data":[24,33,62,121],"architecture":[25],"is":[26],"proposed.":[27],"The":[28,64,167],"uses":[30],"open-source":[31],"technology":[34],"frameworks":[35],"such":[36,122],"as":[37,79,104,123],"Kafka,":[38],"Flink,":[39],"Elasticsearch,":[40],"etc.":[41],"complete":[43],"collection,":[45],"analysis,":[46],"storage":[47],"visual":[49],"display":[50],"data,":[56],"improve":[58],"throughput":[60],"processing.":[63],"situation":[66,181],"takes":[73],"terminal":[76,93,128],"threat":[77,94,184],"index":[78,95],"core,":[81],"divides":[82],"risk":[84],"level":[85],"for":[86,183],"terminal,":[89],"predicts":[91],"through":[96,117],"support":[97],"vector":[98],"machine":[99],"regression":[100],"algorithm":[101],"(SVR),":[102],"so":[103],"construct":[106],"profile":[109],"operation":[114,131,143],"terminal.":[115],"Finally,":[116],"visualization":[118],"services,":[119],"various":[120],"applications":[126],"assets,":[129],"statistics,":[132],"strategies,":[134],"alarm":[136],"analysis":[137,162,169],"are":[138],"displayed":[139],"guide":[141],"maintenance":[145],"personnel":[146],"carry":[148],"out":[149],"monitoring":[154],"early":[156],"warning,":[157],"banning":[158],"disposal":[159],"traceability":[161],"other":[164],"decision-making":[165],"work.":[166],"experimental":[168],"results":[170,193],"show":[171],"that":[172],"can":[175],"meet":[176],"requirements":[178],"assessment":[185],"accuracy":[186],"response":[188],"speed,":[189],"related":[192],"have":[194],"been":[195],"well":[196],"applied":[197],"company.":[201]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
