{"id":"https://openalex.org/W3168763570","doi":"https://doi.org/10.1109/syscon48628.2021.9447115","title":"Incorporating Behavior in Attribute Based Access Control Model Using Machine Learning","display_name":"Incorporating Behavior in Attribute Based Access Control Model Using Machine Learning","publication_year":2021,"publication_date":"2021-04-15","ids":{"openalex":"https://openalex.org/W3168763570","doi":"https://doi.org/10.1109/syscon48628.2021.9447115","mag":"3168763570"},"language":"en","primary_location":{"id":"doi:10.1109/syscon48628.2021.9447115","is_oa":false,"landing_page_url":"https://doi.org/10.1109/syscon48628.2021.9447115","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Systems Conference (SysCon)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062641071","display_name":"Majid Afshar","orcid":null},"institutions":[{"id":"https://openalex.org/I130438778","display_name":"Memorial University of Newfoundland","ror":"https://ror.org/04haebc03","country_code":"CA","type":"education","lineage":["https://openalex.org/I130438778"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Majid Afshar","raw_affiliation_strings":["Memorial University of Newfoundland, St. John\u2019s, Canada","Memorial University of Newfoundland, St. John's, Canada"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Memorial University of Newfoundland, St. John\u2019s, Canada","institution_ids":["https://openalex.org/I130438778"]},{"raw_affiliation_string":"Memorial University of Newfoundland, St. John's, Canada","institution_ids":["https://openalex.org/I130438778"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020161014","display_name":"Saeed Samet","orcid":"https://orcid.org/0000-0002-5116-5484"},"institutions":[{"id":"https://openalex.org/I74413500","display_name":"University of Windsor","ror":"https://ror.org/01gw3d370","country_code":"CA","type":"education","lineage":["https://openalex.org/I74413500"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Saeed Samet","raw_affiliation_strings":["School of Computer Science, University of Windsor, Windsor, Canada"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer Science, University of Windsor, Windsor, Canada","institution_ids":["https://openalex.org/I74413500"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031110204","display_name":"Hamid Usefi","orcid":"https://orcid.org/0000-0003-3311-4955"},"institutions":[{"id":"https://openalex.org/I130438778","display_name":"Memorial University of Newfoundland","ror":"https://ror.org/04haebc03","country_code":"CA","type":"education","lineage":["https://openalex.org/I130438778"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Hamid Usefi","raw_affiliation_strings":["Memorial University of Newfoundland, St. John\u2019s, Canada","Memorial University of Newfoundland, St. John's, Canada"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Memorial University of Newfoundland, St. John\u2019s, Canada","institution_ids":["https://openalex.org/I130438778"]},{"raw_affiliation_string":"Memorial University of Newfoundland, St. John's, Canada","institution_ids":["https://openalex.org/I130438778"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5062641071"],"corresponding_institution_ids":["https://openalex.org/I130438778"],"apc_list":null,"apc_paid":null,"fwci":2.0821,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.87315051,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.8272685408592224},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7949445247650146},{"id":"https://openalex.org/keywords/insider-threat","display_name":"Insider threat","score":0.7558456063270569},{"id":"https://openalex.org/keywords/insider","display_name":"Insider","score":0.6784467697143555},{"id":"https://openalex.org/keywords/physical-access","display_name":"Physical access","score":0.6018314957618713},{"id":"https://openalex.org/keywords/computer-access-control","display_name":"Computer access control","score":0.5341025590896606},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.5067139267921448},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4983251094818115},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4361925721168518},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.43433547019958496},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.42330461740493774},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.33518847823143005},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3149157166481018},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.17784294486045837}],"concepts":[{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.8272685408592224},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7949445247650146},{"id":"https://openalex.org/C2776633304","wikidata":"https://www.wikidata.org/wiki/Q6038026","display_name":"Insider threat","level":3,"score":0.7558456063270569},{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.6784467697143555},{"id":"https://openalex.org/C1304207","wikidata":"https://www.wikidata.org/wiki/Q7189582","display_name":"Physical access","level":3,"score":0.6018314957618713},{"id":"https://openalex.org/C44415380","wikidata":"https://www.wikidata.org/wiki/Q17008721","display_name":"Computer access control","level":3,"score":0.5341025590896606},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.5067139267921448},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4983251094818115},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4361925721168518},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.43433547019958496},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.42330461740493774},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.33518847823143005},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3149157166481018},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.17784294486045837},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/syscon48628.2021.9447115","is_oa":false,"landing_page_url":"https://doi.org/10.1109/syscon48628.2021.9447115","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Systems Conference (SysCon)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6399999856948853,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W35977024","https://openalex.org/W1702882272","https://openalex.org/W1921112198","https://openalex.org/W1970123191","https://openalex.org/W1973003491","https://openalex.org/W1986789244","https://openalex.org/W1988974490","https://openalex.org/W2064522604","https://openalex.org/W2076127024","https://openalex.org/W2097712921","https://openalex.org/W2123937625","https://openalex.org/W2129860818","https://openalex.org/W2136081225","https://openalex.org/W2141549207","https://openalex.org/W2150847526","https://openalex.org/W2160207938","https://openalex.org/W2291470926","https://openalex.org/W2300311174","https://openalex.org/W2535416933","https://openalex.org/W2610970335","https://openalex.org/W2749040653","https://openalex.org/W2774585501","https://openalex.org/W2782392215","https://openalex.org/W3003685271","https://openalex.org/W3090066802","https://openalex.org/W3120740533","https://openalex.org/W6680797700"],"related_works":["https://openalex.org/W147380542","https://openalex.org/W2610842535","https://openalex.org/W2590966200","https://openalex.org/W1967782256","https://openalex.org/W2948572976","https://openalex.org/W3168763570","https://openalex.org/W1540410554","https://openalex.org/W4233716256","https://openalex.org/W2522430697","https://openalex.org/W4300503186"],"abstract_inverted_index":{"Preventing":[0],"unauthorized":[1],"and":[2,46,50,87,142,197,219,238],"illegitimate":[3],"access":[4,13,34,71,84,93,118,124,186,207],"to":[5,26,42,56,91,111,117,163,182,204],"sensitive":[6],"resources":[7,120],"is":[8,68,138,235],"the":[9,17,92,113,119,154,165,176,210],"primary":[10],"duty":[11],"of":[12,79,83,109,128,178,190,212],"control":[14,35,72,85],"models.":[15],"However,":[16,103],"malicious":[18],"activities":[19],"by":[20,59,95,125,140],"authorized":[21,126,242],"users":[22,116,127,167,243],"cause":[23],"significant":[24],"damages":[25],"their":[27,40,161],"underlying":[28],"systems.":[29],"In":[30,131],"many":[31],"cases,":[32],"existing":[33],"models":[36],"are":[37,217],"incomplete":[38],"in":[39,240],"ability":[41],"detect":[43,164],"insider":[44,52],"abuse,":[45],"rather":[47],"than":[48],"detecting":[49,241],"preventing":[51],"attack,":[53],"it":[54,104,158],"seems":[55],"still":[57,105],"operate":[58],"forensic":[60],"analysis":[61],"after":[62],"an":[63,134],"attack.":[64],"Attribute-Based":[65],"Access":[66,136],"Control":[67,137],"a":[69,107,129,179,191,200,222],"new":[70],"model":[73,152,173,205,234],"that":[74,232],"can":[75],"be":[76,195],"used":[77],"instead":[78],"other":[80],"traditional":[81],"types":[82],"models,":[86],"makes":[88],"decisions":[89],"according":[90],"requests":[94],"utilizing":[96],"users'":[97,144,206],"as":[98,100],"well":[99],"resources'":[101],"attributes.":[102,171],"endures":[106],"quandary":[108],"how":[110],"permit":[112],"real":[114],"eligible":[115],"while":[121],"blocking":[122],"abnormal":[123,166,245],"system.":[130],"this":[132],"paper,":[133],"Attribute/Behavior-Based":[135],"proposed":[139],"understanding":[141],"deriving":[143],"behaviors":[145,162,177],"from":[146,224],"log":[147],"files.":[148],"Not":[149],"only":[150],"our":[151,233],"uses":[153,175],"user/resource":[155],"attributes,":[156],"but":[157],"also":[159],"utilizes":[160],"even":[168],"with":[169,244],"valid":[170],"This":[172],"principally":[174],"given":[180],"user":[181],"grant":[183],"or":[184],"deny":[185],"requests.":[187],"The":[188],"concept":[189],"user's":[192],"behavior":[193],"will":[194],"introduced,":[196],"we":[198],"present":[199],"feature":[201],"construction":[202],"method":[203],"behaviors.":[208,246],"As":[209],"proof":[211],"concept,":[213],"machine":[214],"learning":[215],"algorithms":[216],"trained":[218],"tested":[220],"using":[221],"database":[223],"UCI":[225],"Machine":[226],"Learning":[227],"Repository.":[228],"Experimental":[229],"results":[230],"illustrate":[231],"efficient,":[236],"accurate,":[237],"promising":[239]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":3}],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2025-10-10T00:00:00"}
