{"id":"https://openalex.org/W2555763936","doi":"https://doi.org/10.1145/2987386.2987397","title":"Intrusion Detection System based on Complex Event Processing in RFID middleware","display_name":"Intrusion Detection System based on Complex Event Processing in RFID middleware","publication_year":2016,"publication_date":"2016-10-11","ids":{"openalex":"https://openalex.org/W2555763936","doi":"https://doi.org/10.1145/2987386.2987397","mag":"2555763936"},"language":"en","primary_location":{"id":"doi:10.1145/2987386.2987397","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2987386.2987397","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070031914","display_name":"Shang-Nan Yin","orcid":"https://orcid.org/0000-0003-1342-8236"},"institutions":[{"id":"https://openalex.org/I24062138","display_name":"Konkuk University","ror":"https://ror.org/025h1m602","country_code":"KR","type":"education","lineage":["https://openalex.org/I24062138"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Shang-Nan Yin","raw_affiliation_strings":["Division of Internet and Multimedia Engineering, Konkuk University, Seoul, Rep.of Korea"],"affiliations":[{"raw_affiliation_string":"Division of Internet and Multimedia Engineering, Konkuk University, Seoul, Rep.of Korea","institution_ids":["https://openalex.org/I24062138"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101119389","display_name":"Ho-Seok Kang","orcid":null},"institutions":[{"id":"https://openalex.org/I24062138","display_name":"Konkuk University","ror":"https://ror.org/025h1m602","country_code":"KR","type":"education","lineage":["https://openalex.org/I24062138"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Ho-Seok Kang","raw_affiliation_strings":["Division of Internet and Multimedia Engineering, Konkuk University, Seoul, Rep.of Korea"],"affiliations":[{"raw_affiliation_string":"Division of Internet and Multimedia Engineering, Konkuk University, Seoul, Rep.of Korea","institution_ids":["https://openalex.org/I24062138"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100742805","display_name":"Zhiguo Chen","orcid":"https://orcid.org/0000-0002-9541-1894"},"institutions":[{"id":"https://openalex.org/I24062138","display_name":"Konkuk University","ror":"https://ror.org/025h1m602","country_code":"KR","type":"education","lineage":["https://openalex.org/I24062138"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Zhi-Guo Chen","raw_affiliation_strings":["Division of Internet and Multimedia Engineering, Konkuk University, Seoul, Rep.of Korea"],"affiliations":[{"raw_affiliation_string":"Division of Internet and Multimedia Engineering, Konkuk University, Seoul, Rep.of Korea","institution_ids":["https://openalex.org/I24062138"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101530954","display_name":"Sung\u2010Ryul Kim","orcid":"https://orcid.org/0000-0002-0241-3832"},"institutions":[{"id":"https://openalex.org/I24062138","display_name":"Konkuk University","ror":"https://ror.org/025h1m602","country_code":"KR","type":"education","lineage":["https://openalex.org/I24062138"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Sung-Ryul Kim","raw_affiliation_strings":["Division of Internet and Multimedia Engineering, Konkuk University, Seoul, Rep.of Korea"],"affiliations":[{"raw_affiliation_string":"Division of Internet and Multimedia Engineering, Konkuk University, Seoul, Rep.of Korea","institution_ids":["https://openalex.org/I24062138"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5070031914"],"corresponding_institution_ids":["https://openalex.org/I24062138"],"apc_list":null,"apc_paid":null,"fwci":0.334,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.67561716,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"125","last_page":"129"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10444","display_name":"Context-Aware Activity Recognition Systems","score":0.9878000020980835,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10444","display_name":"Context-Aware Activity Recognition Systems","score":0.9878000020980835,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9865999817848206,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9815999865531921,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7634434700012207},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7377333641052246},{"id":"https://openalex.org/keywords/middleware","display_name":"Middleware (distributed applications)","score":0.7232798337936401},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.6629213690757751},{"id":"https://openalex.org/keywords/clone","display_name":"clone (Java method)","score":0.6232781410217285},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5165049433708191},{"id":"https://openalex.org/keywords/complex-event-processing","display_name":"Complex event processing","score":0.5057616233825684},{"id":"https://openalex.org/keywords/radio-frequency-identification","display_name":"Radio-frequency identification","score":0.5014123916625977},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.49599489569664},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4187147915363312},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38333263993263245},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.37834200263023376},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3014106750488281},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.09280279278755188},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.08508872985839844}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7634434700012207},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7377333641052246},{"id":"https://openalex.org/C169468491","wikidata":"https://www.wikidata.org/wiki/Q146923","display_name":"Middleware (distributed applications)","level":2,"score":0.7232798337936401},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.6629213690757751},{"id":"https://openalex.org/C81089528","wikidata":"https://www.wikidata.org/wiki/Q5134986","display_name":"clone (Java method)","level":3,"score":0.6232781410217285},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5165049433708191},{"id":"https://openalex.org/C123606473","wikidata":"https://www.wikidata.org/wiki/Q907918","display_name":"Complex event processing","level":3,"score":0.5057616233825684},{"id":"https://openalex.org/C204222849","wikidata":"https://www.wikidata.org/wiki/Q104954","display_name":"Radio-frequency identification","level":2,"score":0.5014123916625977},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.49599489569664},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4187147915363312},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38333263993263245},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.37834200263023376},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3014106750488281},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.09280279278755188},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.08508872985839844},{"id":"https://openalex.org/C552990157","wikidata":"https://www.wikidata.org/wiki/Q7430","display_name":"DNA","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2987386.2987397","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2987386.2987397","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference on Research in Adaptive and Convergent Systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6100000143051147}],"awards":[{"id":"https://openalex.org/G7274962185","display_name":null,"funder_award_id":"2016R1D1A1B02011964","funder_id":"https://openalex.org/F4320322120","funder_display_name":"National Research Foundation of Korea"}],"funders":[{"id":"https://openalex.org/F4320322120","display_name":"National Research Foundation of Korea","ror":"https://ror.org/013aysd81"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W2134611999","https://openalex.org/W2155341033","https://openalex.org/W2178921228","https://openalex.org/W2185583222","https://openalex.org/W2332751971","https://openalex.org/W2381941298","https://openalex.org/W2473542928","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W1586782953","https://openalex.org/W2171440522","https://openalex.org/W2100581814","https://openalex.org/W2471294444","https://openalex.org/W2112755143","https://openalex.org/W2168673191","https://openalex.org/W2540034839","https://openalex.org/W2151684339","https://openalex.org/W2100651148","https://openalex.org/W2076281900"],"abstract_inverted_index":{"Radio":[0],"Frequency":[1],"Identification":[2],"(RFID)":[3],"technology":[4],"has":[5],"been":[6],"applied":[7],"in":[8,83,129],"many":[9],"fields,":[10],"such":[11],"as":[12],"tracking":[13],"product":[14],"through":[15,93],"the":[16,51,84,90,98,114,120],"supply":[17],"chains,":[18],"electronic":[19],"passport":[20],"(ePassport),":[21],"proximity":[22,63],"card,":[23],"etc.":[24],"Most":[25],"companies":[26],"will":[27,88],"choose":[28],"low-cost":[29],"RFID":[30,34,85],"tags.":[31],"However,":[32],"these":[33,47],"tags":[35,48,92,108],"are":[36],"almost":[37],"no":[38],"security":[39],"mechanism":[40],"so":[41],"that":[42],"criminals":[43],"can":[44],"easily":[45],"clone":[46,107],"and":[49,67,111,127],"get":[50],"user":[52],"permissions.":[53],"In":[54],"this":[55,123],"paper,":[56],"we":[57],"aim":[58],"at":[59],"more":[60],"efficient":[61],"detection":[62,72,125],"card":[64],"be":[65],"cloned":[66,91],"design":[68],"a":[69],"real-time":[70],"intrusion":[71,124],"system":[73,96,126],"based":[74],"on":[75],"one":[76],"tool":[77],"of":[78,122],"Complex":[79],"Event":[80],"Processing":[81],"(Esper)":[82],"middleware.":[86],"We":[87,118],"detect":[89],"training":[94],"our":[95],"with":[97],"user's":[99],"habits.":[100],"When":[101],"detected":[102],"anomalous":[103],"behavior":[104],"which":[105],"may":[106],"have":[109],"occurred,":[110],"then":[112],"send":[113],"notification":[115],"to":[116,132],"user.":[117],"discuss":[119],"reliability":[121],"describes":[128],"detail":[130],"how":[131],"work.":[133]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
