{"id":"https://openalex.org/W2030226212","doi":"https://doi.org/10.1145/2557977.2558000","title":"Threat-based evaluation for context-aware multimedia surveillance system","display_name":"Threat-based evaluation for context-aware multimedia surveillance system","publication_year":2014,"publication_date":"2014-01-09","ids":{"openalex":"https://openalex.org/W2030226212","doi":"https://doi.org/10.1145/2557977.2558000","mag":"2030226212"},"language":"en","primary_location":{"id":"doi:10.1145/2557977.2558000","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2557977.2558000","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071435827","display_name":"Yuan Tian","orcid":"https://orcid.org/0000-0001-6073-8582"},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Yuan Tian","raw_affiliation_strings":["King Saud University, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101592001","display_name":"Biao Song","orcid":"https://orcid.org/0000-0001-6555-6278"},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Biao Song","raw_affiliation_strings":["King Saud University, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023598867","display_name":"Mznah Al\u2010Rodhaan","orcid":"https://orcid.org/0000-0002-9790-5345"},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Mznah Al-Rodhaan","raw_affiliation_strings":["King Saud University, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111806406","display_name":"Abdullah Al\u2010Dhelaan","orcid":null},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Abdullah Al-Dhelaan","raw_affiliation_strings":["King Saud University, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000263913","display_name":"Eui\u2010Nam Huh","orcid":"https://orcid.org/0000-0003-0184-6975"},"institutions":[{"id":"https://openalex.org/I35928602","display_name":"Kyung Hee University","ror":"https://ror.org/01zqcg218","country_code":"KR","type":"education","lineage":["https://openalex.org/I35928602"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Eui-Nam Huh","raw_affiliation_strings":["KyungHee University, Suwon, Republic of Korea","KyungHee University, Suwon, Republic of Korea#TAB#"],"affiliations":[{"raw_affiliation_string":"KyungHee University, Suwon, Republic of Korea","institution_ids":["https://openalex.org/I35928602"]},{"raw_affiliation_string":"KyungHee University, Suwon, Republic of Korea#TAB#","institution_ids":["https://openalex.org/I35928602"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5071435827"],"corresponding_institution_ids":["https://openalex.org/I28022161"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10138889,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8490133285522461},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6448886394500732},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.6306109428405762},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.5802514553070068},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5525821447372437},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5065149068832397},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.49604901671409607},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44062721729278564},{"id":"https://openalex.org/keywords/context-awareness","display_name":"Context awareness","score":0.41420772671699524},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.08239009976387024}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8490133285522461},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6448886394500732},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.6306109428405762},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.5802514553070068},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5525821447372437},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5065149068832397},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.49604901671409607},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44062721729278564},{"id":"https://openalex.org/C2781368080","wikidata":"https://www.wikidata.org/wiki/Q501688","display_name":"Context awareness","level":3,"score":0.41420772671699524},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.08239009976387024},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C2778707766","wikidata":"https://www.wikidata.org/wiki/Q202064","display_name":"Phone","level":2,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2557977.2558000","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2557977.2558000","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6200000047683716}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1548605257","https://openalex.org/W1970774272","https://openalex.org/W1997409447","https://openalex.org/W2046677339","https://openalex.org/W2059766562","https://openalex.org/W2115725524","https://openalex.org/W2119801963","https://openalex.org/W2123784270","https://openalex.org/W2135689024","https://openalex.org/W2136704308","https://openalex.org/W2154542232","https://openalex.org/W2167113943","https://openalex.org/W2169740160","https://openalex.org/W2535446614","https://openalex.org/W4240459754"],"related_works":["https://openalex.org/W2120447654","https://openalex.org/W2977179488","https://openalex.org/W2144453115","https://openalex.org/W2128223750","https://openalex.org/W4238532390","https://openalex.org/W2188872161","https://openalex.org/W2961779879","https://openalex.org/W797688974","https://openalex.org/W2002978035","https://openalex.org/W2209382646"],"abstract_inverted_index":{"Multimedia":[0],"surveillance":[1,28,64,72,113],"has":[2],"become":[3],"commonplace":[4],"and":[5,23,88,123],"getting":[6,31],"increasingly":[7],"intelligent":[8],"in":[9,15,49,55],"recent":[10],"years.":[11],"The":[12,95],"technological":[13],"advances":[14],"computer-vision":[16],"techniques":[17],"help":[18,103],"to":[19,85,102,105],"detect":[20],"suspicious":[21],"movement":[22],"identify":[24,89],"objects.":[25],"Meanwhile,":[26],"as":[27],"system":[29,73],"is":[30,59,79,100,125],"more":[32],"sophisticated,":[33],"the":[34,53,63,107],"risk":[35],"of":[36],"privacy":[37,44,122],"intrusion":[38],"also":[39],"increases.":[40],"Various":[41],"researches":[42],"regards":[43],"protection":[45],"have":[46],"been":[47],"done":[48],"multimedia":[50,71,93,112],"surveillance,":[51],"however,":[52],"implementations":[54],"current":[56],"security":[57],"systems":[58],"limited":[60],"compared":[61],"with":[62,74],"technology.":[65],"In":[66],"this":[67],"paper,":[68],"a":[69,117],"context-aware":[70],"threat-based":[75],"service":[76,114],"selection":[77],"method":[78],"proposed.":[80],"We":[81],"use":[82],"pre-defined":[83],"context":[84],"recognize":[86],"activities":[87],"different":[90],"behaviors":[91],"from":[92],"streams.":[94],"Analytic":[96],"Hierarchy":[97],"Process":[98],"approach":[99],"applied":[101],"user":[104,110],"analyze":[106],"services.":[108],"A":[109],"preferred":[111],"which":[115],"achieves":[116],"desired":[118],"trade-off":[119],"between":[120],"security,":[121],"cost":[124],"provided":[126],"automatically.":[127]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
