{"id":"https://openalex.org/W3107087514","doi":"https://doi.org/10.1145/3428658.3431757","title":"AS-ProCBE","display_name":"AS-ProCBE","publication_year":2020,"publication_date":"2020-11-25","ids":{"openalex":"https://openalex.org/W3107087514","doi":"https://doi.org/10.1145/3428658.3431757","mag":"3107087514"},"language":"en","primary_location":{"id":"doi:10.1145/3428658.3431757","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3428658.3431757","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Brazilian Symposium on Multimedia and the Web","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025176798","display_name":"Ricardo Borges Almeida","orcid":"https://orcid.org/0000-0001-9412-1839"},"institutions":[{"id":"https://openalex.org/I169248161","display_name":"Universidade Federal de Pelotas","ror":"https://ror.org/05msy9z54","country_code":"BR","type":"education","lineage":["https://openalex.org/I169248161"]}],"countries":["BR"],"is_corresponding":true,"raw_author_name":"Ricardo B. Almeida","raw_affiliation_strings":["Universidade Federal de Pelotas"],"affiliations":[{"raw_affiliation_string":"Universidade Federal de Pelotas","institution_ids":["https://openalex.org/I169248161"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080095667","display_name":"Roger Machado","orcid":"https://orcid.org/0000-0001-6354-3481"},"institutions":[{"id":"https://openalex.org/I4210155777","display_name":"Instituto Federal Sul-rio-grandense","ror":"https://ror.org/05dr32318","country_code":"BR","type":"education","lineage":["https://openalex.org/I4210155777"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Roger S. Machado","raw_affiliation_strings":["Instituto Federal de Educa\u00e7\u00e3o, Ci\u00eancia e Tecnologia Sul-rio-grandense"],"affiliations":[{"raw_affiliation_string":"Instituto Federal de Educa\u00e7\u00e3o, Ci\u00eancia e Tecnologia Sul-rio-grandense","institution_ids":["https://openalex.org/I4210155777"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060305913","display_name":"Lucas Medeiros Donato","orcid":null},"institutions":[{"id":"https://openalex.org/I66943878","display_name":"De Montfort University","ror":"https://ror.org/0312pnr83","country_code":"GB","type":"education","lineage":["https://openalex.org/I66943878"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Lucas M. Donato","raw_affiliation_strings":["De Montfort University"],"affiliations":[{"raw_affiliation_string":"De Montfort University","institution_ids":["https://openalex.org/I66943878"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081639170","display_name":"Adenauer Yamin","orcid":"https://orcid.org/0000-0002-7333-244X"},"institutions":[{"id":"https://openalex.org/I169248161","display_name":"Universidade Federal de Pelotas","ror":"https://ror.org/05msy9z54","country_code":"BR","type":"education","lineage":["https://openalex.org/I169248161"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Adenauer C. Yamin","raw_affiliation_strings":["Universidade Federal de Pelotas"],"affiliations":[{"raw_affiliation_string":"Universidade Federal de Pelotas","institution_ids":["https://openalex.org/I169248161"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035253687","display_name":"Ana Marilza Pernas","orcid":"https://orcid.org/0000-0001-8142-817X"},"institutions":[{"id":"https://openalex.org/I169248161","display_name":"Universidade Federal de Pelotas","ror":"https://ror.org/05msy9z54","country_code":"BR","type":"education","lineage":["https://openalex.org/I169248161"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Ana M. Pernas","raw_affiliation_strings":["Universidade Federal de Pelotas"],"affiliations":[{"raw_affiliation_string":"Universidade Federal de Pelotas","institution_ids":["https://openalex.org/I169248161"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5025176798"],"corresponding_institution_ids":["https://openalex.org/I169248161"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13319218,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"149","last_page":"152"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10444","display_name":"Context-Aware Activity Recognition Systems","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10444","display_name":"Context-Aware Activity Recognition Systems","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9879999756813049,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/contextualization","display_name":"Contextualization","score":0.8063092827796936},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7678971290588379},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6956470608711243},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6373171806335449},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5552988648414612},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.47989213466644287},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.43462979793548584},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4323507845401764},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12331369519233704},{"id":"https://openalex.org/keywords/systems-engineering","display_name":"Systems engineering","score":0.10423165559768677}],"concepts":[{"id":"https://openalex.org/C2780712339","wikidata":"https://www.wikidata.org/wiki/Q5165204","display_name":"Contextualization","level":3,"score":0.8063092827796936},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7678971290588379},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6956470608711243},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6373171806335449},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5552988648414612},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.47989213466644287},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.43462979793548584},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4323507845401764},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12331369519233704},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.10423165559768677},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C527412718","wikidata":"https://www.wikidata.org/wiki/Q855395","display_name":"Interpretation (philosophy)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3428658.3431757","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3428658.3431757","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Brazilian Symposium on Multimedia and the Web","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W2036315391","https://openalex.org/W2047556470","https://openalex.org/W2595473657","https://openalex.org/W2927219253","https://openalex.org/W2974098582","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W1687432146","https://openalex.org/W1591874556","https://openalex.org/W2185608106","https://openalex.org/W3046258185","https://openalex.org/W1548083239","https://openalex.org/W3216994056","https://openalex.org/W2268232908","https://openalex.org/W205610463","https://openalex.org/W4296050054","https://openalex.org/W2893240344"],"abstract_inverted_index":{"The":[0],"Internet":[1],"of":[2,61,74,107,115],"Things":[3],"(IoT)":[4],"is":[5,11,40],"a":[6,19,23,62,79],"Ubiquitous":[7],"Computing":[8],"materialization":[9],"that":[10],"gaining":[12],"prominence.":[13],"Security":[14],"has":[15,53],"become":[16],"potentialized":[17],"as":[18,54,78],"necessary":[20],"feature":[21],"for":[22,46,64],"viable":[24],"IoT.":[25],"Promoting":[26],"security":[27,38,48,66,108],"over":[28],"this":[29,95],"dynamic":[30],"and":[31,36,89,113],"heterogeneous":[32,91],"environment":[33],"with":[34],"pre-defined":[35],"static":[37],"mechanisms":[39],"an":[41],"unfeasible":[42],"task.":[43],"Therefore,":[44],"solutions":[45],"adaptive":[47,65],"are":[49,118],"required.":[50],"This":[51],"paper":[52],"main":[55],"objective":[56],"to":[57,102],"present":[58],"the":[59,72,81,86,104,111],"conception":[60],"proposal":[63,96],"through":[67],"progressive":[68,105],"context-based":[69],"enrichment":[70],"considering":[71],"challenges":[73],"IoT":[75],"scenarios,":[76],"offering":[77],"differential":[80],"contextual":[82],"information":[83],"acquisition":[84],"in":[85],"opportune":[87],"moment":[88],"contemplating":[90],"sources.":[92],"To":[93],"evaluate":[94],"was":[97],"developed":[98],"one":[99],"case":[100],"study":[101],"validate":[103],"contextualization":[106],"events.":[109],"Finally,":[110],"strengths":[112],"limitations":[114],"our":[116],"approach":[117],"discussed,":[119],"followed":[120],"by":[121],"future":[122],"works.":[123]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2020-12-07T00:00:00"}
