{"id":"https://openalex.org/W3180624417","doi":"https://doi.org/10.1145/3451471.3451491","title":"Web Access Log Anomaly Detection Based on Deep Learning","display_name":"Web Access Log Anomaly Detection Based on Deep Learning","publication_year":2021,"publication_date":"2021-01-16","ids":{"openalex":"https://openalex.org/W3180624417","doi":"https://doi.org/10.1145/3451471.3451491","mag":"3180624417"},"language":"en","primary_location":{"id":"doi:10.1145/3451471.3451491","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3451471.3451491","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 The 4th International Conference on Software Engineering and Information Management","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100414577","display_name":"Quan Liu","orcid":"https://orcid.org/0000-0002-9036-0290"},"institutions":[{"id":"https://openalex.org/I4210096139","display_name":"China Institute of Atomic Energy","ror":"https://ror.org/00v5gqm66","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210096139"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Quan Liu","raw_affiliation_strings":["China Institute of Atomic Energy, China"],"affiliations":[{"raw_affiliation_string":"China Institute of Atomic Energy, China","institution_ids":["https://openalex.org/I4210096139"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5100414577"],"corresponding_institution_ids":["https://openalex.org/I4210096139"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.10939568,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"118","last_page":"123"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7471654415130615},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6877463459968567},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.47035741806030273},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.45862334966659546},{"id":"https://openalex.org/keywords/measure","display_name":"Measure (data warehouse)","score":0.4556984007358551},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4471474289894104},{"id":"https://openalex.org/keywords/web-log-analysis-software","display_name":"Web log analysis software","score":0.4419867694377899},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4258742928504944},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3553085923194885},{"id":"https://openalex.org/keywords/web-server","display_name":"Web server","score":0.3122069835662842},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24421265721321106},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2387050986289978},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.23540404438972473}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7471654415130615},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6877463459968567},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.47035741806030273},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.45862334966659546},{"id":"https://openalex.org/C2780009758","wikidata":"https://www.wikidata.org/wiki/Q6804172","display_name":"Measure (data warehouse)","level":2,"score":0.4556984007358551},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4471474289894104},{"id":"https://openalex.org/C104352257","wikidata":"https://www.wikidata.org/wiki/Q1238961","display_name":"Web log analysis software","level":5,"score":0.4419867694377899},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4258742928504944},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3553085923194885},{"id":"https://openalex.org/C11392498","wikidata":"https://www.wikidata.org/wiki/Q11288","display_name":"Web server","level":3,"score":0.3122069835662842},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24421265721321106},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2387050986289978},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.23540404438972473},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C173576120","wikidata":"https://www.wikidata.org/wiki/Q2641220","display_name":"Static web page","level":4,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3451471.3451491","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3451471.3451491","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 The 4th International Conference on Software Engineering and Information Management","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1498436455","https://openalex.org/W1988790447","https://openalex.org/W2001905757","https://openalex.org/W2028070629","https://openalex.org/W2062227835","https://openalex.org/W2072132034","https://openalex.org/W2072607050","https://openalex.org/W2949117887"],"related_works":["https://openalex.org/W2806741695","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W3210364259","https://openalex.org/W4300558037","https://openalex.org/W2912112202","https://openalex.org/W2667207928","https://openalex.org/W4377864969","https://openalex.org/W2972971679"],"abstract_inverted_index":{"Network":[0],"information":[1,36],"security":[2],"is":[3,21,60,119],"becoming":[4],"a":[5,92,122],"vital":[6],"topic":[7],"for":[8],"many":[9],"companies":[10,25],"and":[11,26,50,66,74,110],"research":[12,27],"institutes":[13,28],"with":[14],"big":[15],"data.":[16],"Information":[17],"leakage":[18],"via":[19],"cyber":[20],"rising":[22],"rapidly.":[23],"Many":[24],"managers":[29,128],"have":[30],"not":[31],"realized":[32],"the":[33,48,53,79,86,89,112,131],"significance":[34],"of":[35,43,52,64,68,71],"security.":[37],"This":[38],"paper":[39],"describes":[40],"an":[41,106],"investigation":[42],"anomaly":[44,132],"detection.":[45],"We":[46],"measure":[47],"format":[49],"content":[51],"original":[54],"web":[55],"access":[56,65,69,108],"log.":[57],"The":[58,116],"intent":[59],"to":[61,75,101,104,120,129],"analyze":[62],"types":[63,70],"distribution":[67],"each":[72],"user":[73],"transform":[76],"them":[77],"into":[78],"type":[80],"that":[81,124],"can":[82,96,125],"be":[83,97],"learned":[84],"by":[85],"machine.":[87],"With":[88],"transformed":[90],"log,":[91],"neural":[93],"network":[94],"model":[95,123],"put":[98],"in":[99],"place":[100],"learn":[102],"how":[103],"detect":[105],"abnormal":[107],"log":[109],"alert":[111],"relative":[113],"computer":[114,127],"managers.":[115],"main":[117],"goal":[118],"design":[121],"assist":[126],"do":[130],"detection":[133],"job.":[134]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
