{"id":"https://openalex.org/W2917267049","doi":"https://doi.org/10.1109/glocom.2018.8647325","title":"Sema-ICN: Toward Semantic Information-Centric Networking Supporting Smart Anomalous Access Detection","display_name":"Sema-ICN: Toward Semantic Information-Centric Networking Supporting Smart Anomalous Access Detection","publication_year":2018,"publication_date":"2018-12-01","ids":{"openalex":"https://openalex.org/W2917267049","doi":"https://doi.org/10.1109/glocom.2018.8647325","mag":"2917267049"},"language":"en","primary_location":{"id":"doi:10.1109/glocom.2018.8647325","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2018.8647325","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101613404","display_name":"Meng Xi","orcid":"https://orcid.org/0000-0002-7702-4516"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Meng Xi","raw_affiliation_strings":["School of Cyber Security, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004673608","display_name":"Jun Wu","orcid":"https://orcid.org/0000-0003-2483-6980"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jun Wu","raw_affiliation_strings":["Shanghai Key Laboratory of Integrated Administration Technologies for Information Security, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Integrated Administration Technologies for Information Security, Shanghai, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100391361","display_name":"Jianhua Li","orcid":"https://orcid.org/0000-0002-6831-3973"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jianhua Li","raw_affiliation_strings":["Shanghai Key Laboratory of Integrated Administration Technologies for Information Security, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Integrated Administration Technologies for Information Security, Shanghai, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007267530","display_name":"Gaolei Li","orcid":"https://orcid.org/0000-0003-3913-5001"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gaolei Li","raw_affiliation_strings":["School of Cyber Security, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101613404"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":0.5536,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.72300235,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9886999726295471,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9855999946594238,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8244888782501221},{"id":"https://openalex.org/keywords/information-centric-networking","display_name":"Information-centric networking","score":0.5279732346534729},{"id":"https://openalex.org/keywords/relevance","display_name":"Relevance (law)","score":0.4974973499774933},{"id":"https://openalex.org/keywords/semantic-technology","display_name":"Semantic technology","score":0.47896769642829895},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.47231289744377136},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.4418548047542572},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.4358021020889282},{"id":"https://openalex.org/keywords/semantic-network","display_name":"Semantic network","score":0.42794108390808105},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4185049831867218},{"id":"https://openalex.org/keywords/semantic-computing","display_name":"Semantic computing","score":0.40740132331848145},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.35765647888183594},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3128190040588379},{"id":"https://openalex.org/keywords/semantic-web","display_name":"Semantic Web","score":0.21699103713035583},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.11041474342346191},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11026549339294434}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8244888782501221},{"id":"https://openalex.org/C2777455782","wikidata":"https://www.wikidata.org/wiki/Q18208068","display_name":"Information-centric networking","level":3,"score":0.5279732346534729},{"id":"https://openalex.org/C158154518","wikidata":"https://www.wikidata.org/wiki/Q7310970","display_name":"Relevance (law)","level":2,"score":0.4974973499774933},{"id":"https://openalex.org/C6881194","wikidata":"https://www.wikidata.org/wiki/Q7449091","display_name":"Semantic technology","level":4,"score":0.47896769642829895},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.47231289744377136},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.4418548047542572},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.4358021020889282},{"id":"https://openalex.org/C85407183","wikidata":"https://www.wikidata.org/wiki/Q1045785","display_name":"Semantic network","level":2,"score":0.42794108390808105},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4185049831867218},{"id":"https://openalex.org/C511149849","wikidata":"https://www.wikidata.org/wiki/Q7449051","display_name":"Semantic computing","level":3,"score":0.40740132331848145},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.35765647888183594},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3128190040588379},{"id":"https://openalex.org/C2129575","wikidata":"https://www.wikidata.org/wiki/Q54837","display_name":"Semantic Web","level":2,"score":0.21699103713035583},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.11041474342346191},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11026549339294434},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/glocom.2018.8647325","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2018.8647325","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5699999928474426,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1490768968","https://openalex.org/W1508999718","https://openalex.org/W1739224446","https://openalex.org/W1966808540","https://openalex.org/W1973467201","https://openalex.org/W2014952121","https://openalex.org/W2165663423","https://openalex.org/W2167187514","https://openalex.org/W2233554446","https://openalex.org/W2300469216","https://openalex.org/W2583323490","https://openalex.org/W2755200181","https://openalex.org/W2756489700","https://openalex.org/W2786501201","https://openalex.org/W2789467011","https://openalex.org/W2793130752","https://openalex.org/W2808560727","https://openalex.org/W2963391656","https://openalex.org/W2963527058","https://openalex.org/W3101090957","https://openalex.org/W3125734447"],"related_works":["https://openalex.org/W2280628760","https://openalex.org/W1990650227","https://openalex.org/W3134365128","https://openalex.org/W3012445987","https://openalex.org/W2389674590","https://openalex.org/W2016166863","https://openalex.org/W1446171314","https://openalex.org/W4243405474","https://openalex.org/W2189524781","https://openalex.org/W2197479404"],"abstract_inverted_index":{"As":[0],"a":[1,63,118,145,200],"next-generation":[2],"networking":[3],"architecture,":[4],"information-centric":[5],"networks":[6],"(ICN)":[7],"has":[8],"strengthened":[9],"the":[10,27,40,50,85,107,169,181,184,188,196],"focus":[11],"on":[12,75,155],"physical":[13],"location-independent":[14],"content":[15,44,139],"sharing,":[16],"which":[17,105,129],"introduces":[18],"abundant":[19],"semantic":[20,28,64,92,130,142,202],"features":[21],"and":[22,46,79],"novel":[23,201],"access":[24,121,152,164],"approach.":[25],"However,":[26],"modeling":[29],"of":[30,42,109,183,190],"ICN":[31,38,65,90,95],"is":[32,148,167,195],"an":[33],"unresolved":[34],"problem,":[35],"thus":[36],"current":[37],"lacks":[39],"capabilities":[41],"smart":[43,119],"analysis":[45],"understanding":[47],"to":[48,99,138,150,198],"support":[49],"knowledge":[51],"decision":[52],"for":[53,204],"optimized":[54],"user":[55],"experience.":[56],"To":[57,187],"address":[58],"this":[59,113,193],"issue,":[60],"we":[61,115],"propose":[62,199],"model,":[66],"Sema-ICN,":[67],"that":[68,166],"can":[69],"provide":[70],"logically":[71],"related":[72],"information":[73],"depending":[74],"content-relevance-based":[76],"relationships":[77],"extraction":[78],"name-based":[80],"weight":[81],"setting.":[82],"Moreover,":[83],"besides":[84],"great":[86],"benefits":[87],"brought":[88],"into":[89],"by":[91,125],"features,":[93],"Sema-":[94,126],"will":[96,172],"also":[97],"contribute":[98],"security":[100],"protection":[101],"against":[102],"anomalous":[103,120],"access,":[104],"usually":[106],"basis":[108],"further":[110],"threats.":[111],"In":[112],"paper,":[114],"additionally":[116],"design":[117],"detection":[122],"scheme":[123],"supported":[124],"ICN,":[127],"in":[128],"communities":[131],"are":[132],"partitioned":[133],"utilizing":[134],"spectral":[135],"clustering":[136],"according":[137],"name":[140],"with":[141],"attributes.":[143],"And":[144],"forecast":[146,170],"model":[147,203],"introduced":[149],"predict":[151],"situation":[153],"based":[154],"triple":[156],"exponential":[157],"smoothing":[158],"algorithm":[159],"using":[160],"historical":[161],"request":[162],"data,":[163],"traffic":[165],"beyond":[168],"results":[171,179],"be":[173],"considered":[174],"as":[175],"anomalous.":[176],"The":[177],"simulation":[178],"demonstrate":[180],"efficiency":[182],"proposed":[185],"scheme.":[186],"best":[189],"our":[191],"knowledge,":[192],"work":[194],"first":[197],"ICN.":[205]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1}],"updated_date":"2026-01-13T01:12:25.745995","created_date":"2025-10-10T00:00:00"}
