{"id":"https://openalex.org/W795159059","doi":"https://doi.org/10.1117/12.2197092","title":"Statistical process control based chart for information systems security","display_name":"Statistical process control based chart for information systems security","publication_year":2015,"publication_date":"2015-07-02","ids":{"openalex":"https://openalex.org/W795159059","doi":"https://doi.org/10.1117/12.2197092","mag":"795159059"},"language":"en","primary_location":{"id":"doi:10.1117/12.2197092","is_oa":false,"landing_page_url":"https://doi.org/10.1117/12.2197092","pdf_url":null,"source":{"id":"https://openalex.org/S183492911","display_name":"Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE","issn_l":"0277-786X","issn":["0277-786X","1996-756X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310315543","host_organization_name":"SPIE","host_organization_lineage":["https://openalex.org/P4310315543"],"host_organization_lineage_names":["SPIE"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SPIE Proceedings","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057677840","display_name":"Mansoor Khan","orcid":"https://orcid.org/0000-0001-5496-1585"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Mansoor S. Khan","raw_affiliation_strings":["Beijing Institute of Technology (China)",", Beijing Institute of Technology, , China"],"affiliations":[{"raw_affiliation_string":"Beijing Institute of Technology (China)","institution_ids":["https://openalex.org/I125839683"]},{"raw_affiliation_string":", Beijing Institute of Technology, , China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068547916","display_name":"Lirong Cui","orcid":"https://orcid.org/0000-0002-8987-4307"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lirong Cui","raw_affiliation_strings":["Beijing Institute of Technology (China)",", Beijing Institute of Technology, , China"],"affiliations":[{"raw_affiliation_string":"Beijing Institute of Technology (China)","institution_ids":["https://openalex.org/I125839683"]},{"raw_affiliation_string":", Beijing Institute of Technology, , China","institution_ids":["https://openalex.org/I125839683"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5057677840"],"corresponding_institution_ids":["https://openalex.org/I125839683"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.00939374,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"9631","issue":null,"first_page":"96312J","last_page":"96312J"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11443","display_name":"Advanced Statistical Process Monitoring","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1804","display_name":"Statistics, Probability and Uncertainty"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11443","display_name":"Advanced Statistical Process Monitoring","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1804","display_name":"Statistics, Probability and Uncertainty"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11871","display_name":"Advanced Statistical Methods and Models","score":0.9782000184059143,"subfield":{"id":"https://openalex.org/subfields/2613","display_name":"Statistics and Probability"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9742000102996826,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ewma-chart","display_name":"EWMA chart","score":0.9352053999900818},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7657341957092285},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6802553534507751},{"id":"https://openalex.org/keywords/control-chart","display_name":"Control chart","score":0.6745970845222473},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.6042185425758362},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.592392086982727},{"id":"https://openalex.org/keywords/statistical-process-control","display_name":"Statistical process control","score":0.579748272895813},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5377708673477173},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.49931955337524414},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.4706118702888489},{"id":"https://openalex.org/keywords/chart","display_name":"Chart","score":0.4341733455657959},{"id":"https://openalex.org/keywords/quality","display_name":"Quality (philosophy)","score":0.42474985122680664},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.13772791624069214},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09730148315429688},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.09299331903457642}],"concepts":[{"id":"https://openalex.org/C74746147","wikidata":"https://www.wikidata.org/wiki/Q5324652","display_name":"EWMA chart","level":4,"score":0.9352053999900818},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7657341957092285},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6802553534507751},{"id":"https://openalex.org/C196985124","wikidata":"https://www.wikidata.org/wiki/Q1369242","display_name":"Control chart","level":3,"score":0.6745970845222473},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.6042185425758362},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.592392086982727},{"id":"https://openalex.org/C113644684","wikidata":"https://www.wikidata.org/wiki/Q1356717","display_name":"Statistical process control","level":3,"score":0.579748272895813},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5377708673477173},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.49931955337524414},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.4706118702888489},{"id":"https://openalex.org/C190812933","wikidata":"https://www.wikidata.org/wiki/Q28923","display_name":"Chart","level":2,"score":0.4341733455657959},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.42474985122680664},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.13772791624069214},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09730148315429688},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.09299331903457642},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1117/12.2197092","is_oa":false,"landing_page_url":"https://doi.org/10.1117/12.2197092","pdf_url":null,"source":{"id":"https://openalex.org/S183492911","display_name":"Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE","issn_l":"0277-786X","issn":["0277-786X","1996-756X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310315543","host_organization_name":"SPIE","host_organization_lineage":["https://openalex.org/P4310315543"],"host_organization_lineage_names":["SPIE"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SPIE Proceedings","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5699999928474426,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W2000039071","https://openalex.org/W2044036264","https://openalex.org/W4229980202","https://openalex.org/W4245521939","https://openalex.org/W4252108370"],"related_works":["https://openalex.org/W4245271849","https://openalex.org/W2126524872","https://openalex.org/W4235019031","https://openalex.org/W4386867921","https://openalex.org/W2073944369","https://openalex.org/W3200938883","https://openalex.org/W3201688424","https://openalex.org/W4381431108","https://openalex.org/W2931607628","https://openalex.org/W755050109"],"abstract_inverted_index":{"Intrusion":[0],"detection":[1],"systems":[2,55],"have":[3],"a":[4],"highly":[5,29],"significant":[6],"role":[7],"in":[8,50],"securing":[9],"computer":[10,22,51],"networks":[11,23,52],"and":[12,19,24,53,94,120],"information":[13,25,38,54],"systems.":[14,39],"To":[15],"assure":[16],"the":[17,43,82,87,91,104,114,129],"reliability":[18],"quality":[20,68],"of":[21,45,106,113],"systems,":[26],"it":[27,80],"is":[28],"desirable":[30],"to":[31],"develop":[32],"techniques":[33],"that":[34],"detect":[35],"intrusions":[36],"into":[37],"We":[40,85,98,110],"put":[41],"forward":[42],"concept":[44],"statistical":[46],"process":[47],"control":[48,88],"(SPC)":[49],"intrusions.":[56],"In":[57],"this":[58],"article":[59],"we":[60,124],"propose":[61],"exponentially":[62],"weighted":[63],"moving":[64],"average":[65],"(EWMA)":[66],"type":[67],"monitoring":[69],"scheme.":[70],"Our":[71],"proposed":[72,92,115],"scheme":[73,93,116],"has":[74],"only":[75],"one":[76],"parameter":[77],"which":[78],"differentiates":[79],"from":[81],"past":[83],"versions.":[84],"construct":[86],"limits":[89],"for":[90,103,108,128],"investigate":[95],"their":[96],"effectiveness.":[97],"provide":[99,125],"an":[100],"industrial":[101],"example":[102],"sake":[105],"clarity":[107],"practitioner.":[109],"give":[111],"comparison":[112],"with":[117],"EWMA":[118],"schemes":[119],"p":[121],"chart;":[122],"finally":[123],"some":[126],"recommendations":[127],"future":[130],"work.":[131]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
