{"id":"https://openalex.org/W2808425496","doi":"https://doi.org/10.1155/2018/9809345","title":"An Efficient Security System for Mobile Data Monitoring","display_name":"An Efficient Security System for Mobile Data Monitoring","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2808425496","doi":"https://doi.org/10.1155/2018/9809345","mag":"2808425496"},"language":"en","primary_location":{"id":"doi:10.1155/2018/9809345","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/9809345","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2018/9809345.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/wcmc/2018/9809345.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101913329","display_name":"Likun Liu","orcid":"https://orcid.org/0000-0002-2113-4679"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Likun Liu","raw_affiliation_strings":["School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001, China","School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001, China","institution_ids":["https://openalex.org/I204983213"]},{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100417312","display_name":"Hongli Zhang","orcid":"https://orcid.org/0000-0002-8167-7106"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongli Zhang","raw_affiliation_strings":["School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001, China","School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001, China","institution_ids":["https://openalex.org/I204983213"]},{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072540013","display_name":"Xiangzhan Yu","orcid":"https://orcid.org/0000-0002-1183-2844"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiangzhan Yu","raw_affiliation_strings":["School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001, China","School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001, China","institution_ids":["https://openalex.org/I204983213"]},{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101444228","display_name":"Yi Xin","orcid":"https://orcid.org/0000-0001-5855-3837"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Xin","raw_affiliation_strings":["School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001, China","School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001, China","institution_ids":["https://openalex.org/I204983213"]},{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100771200","display_name":"Muhammad Shafiq","orcid":"https://orcid.org/0000-0003-1909-9373"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Muhammad Shafiq","raw_affiliation_strings":["School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001, China","School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001, China","institution_ids":["https://openalex.org/I204983213"]},{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008751520","display_name":"Mengmeng Ge","orcid":"https://orcid.org/0000-0001-6912-6152"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mengmeng Ge","raw_affiliation_strings":["School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001, China","School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001, China","institution_ids":["https://openalex.org/I204983213"]},{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001","institution_ids":["https://openalex.org/I204983213"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5072540013"],"corresponding_institution_ids":["https://openalex.org/I204983213"],"apc_list":{"value":2300,"currency":"USD","value_usd":2300},"apc_paid":{"value":2300,"currency":"USD","value_usd":2300},"fwci":0.7381,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.74071931,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":"2018","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8853065967559814},{"id":"https://openalex.org/keywords/partition","display_name":"Partition (number theory)","score":0.6823122501373291},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6645804643630981},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5587904453277588},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5025050640106201},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.47937825322151184},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.42976754903793335},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38877734541893005},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.37300020456314087},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3641864061355591},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13289815187454224},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.1287398636341095}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8853065967559814},{"id":"https://openalex.org/C42812","wikidata":"https://www.wikidata.org/wiki/Q1082910","display_name":"Partition (number theory)","level":2,"score":0.6823122501373291},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6645804643630981},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5587904453277588},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5025050640106201},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.47937825322151184},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.42976754903793335},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38877734541893005},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.37300020456314087},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3641864061355591},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13289815187454224},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.1287398636341095},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2018/9809345","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/9809345","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2018/9809345.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:fde3d2bb24e744d2a1fab4680e9e7994","is_oa":true,"landing_page_url":"https://doaj.org/article/fde3d2bb24e744d2a1fab4680e9e7994","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Wireless Communications and Mobile Computing, Vol 2018 (2018)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2018/9809345","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/9809345","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2018/9809345.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5250343265","display_name":null,"funder_award_id":"2016QY05X1000","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G7986705998","display_name":null,"funder_award_id":"2016QY01W0100","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2808425496.pdf","grobid_xml":"https://content.openalex.org/works/W2808425496.grobid-xml"},"referenced_works_count":10,"referenced_works":["https://openalex.org/W1589035208","https://openalex.org/W2004875427","https://openalex.org/W2099964107","https://openalex.org/W2139325411","https://openalex.org/W2286071403","https://openalex.org/W2301806785","https://openalex.org/W2311356833","https://openalex.org/W2345691643","https://openalex.org/W4246744783","https://openalex.org/W4249397330"],"related_works":["https://openalex.org/W4388150944","https://openalex.org/W4242235492","https://openalex.org/W4237162029","https://openalex.org/W2367268135","https://openalex.org/W2385701518","https://openalex.org/W4237464767","https://openalex.org/W2068562251","https://openalex.org/W4252295672","https://openalex.org/W1480190076","https://openalex.org/W2357468538"],"abstract_inverted_index":{"During":[0],"the":[1,25,30,56,71,89,102,115,155,168,173,182,194],"last":[2],"decade,":[3],"rapid":[4],"development":[5],"of":[6,16,55,73,125,175,185],"mobile":[7,17,26],"devices":[8],"and":[9,28,38,53,130,136,148,167,189],"applications":[10],"has":[11],"produced":[12,160],"a":[13,110,121],"large":[14,51],"number":[15,174],"data":[18,27],"which":[19,69,132],"hide":[20],"numerous":[21],"cyber\u2010attacks.":[22],"To":[23,100],"monitor":[24],"detect":[29,154],"attacks,":[31,142],"NIDS/NIPS":[32],"plays":[33],"important":[34],"role":[35],"for":[36,49],"ISP":[37],"enterprise,":[39],"but":[40],"now":[41],"it":[42],"still":[43],"faces":[44],"two":[45,116],"challenges,":[46],"high":[47],"performance":[48,60,166],"super":[50],"patterns":[52,176],"detection":[54,186],"latest":[57],"attacks.":[58],"High":[59],"is":[61,70,80,128,177,187],"dominated":[62],"by":[63],"Deep":[64],"Packet":[65],"Inspection":[66],"(DPI)":[67],"mechanism,":[68],"core":[72],"security":[74,111],"devices.":[75],"A":[76],"new":[77,122],"TTL":[78,95,141,146],"attack":[79,191],"just":[81],"put":[82],"forward":[83],"to":[84,96,113,153],"escape":[85,97],"detecting,":[86],"such":[87],"that":[88],"adversary":[90],"inserts":[91],"packet":[92],"with":[93,158],"short":[94],"from":[98],"NIDS/NIPS.":[99],"address":[101],"above\u2010mentioned":[103],"problems,":[104],"in":[105],"this":[106],"paper,":[107],"we":[108,143],"design":[109],"system":[112],"handle":[114],"aspects.":[117],"For":[118,139],"efficient":[119],"DPI,":[120],"two\u2010step":[123],"partition":[124],"pattern":[126],"set":[127,144],"demonstrated":[129],"discussed,":[131],"includes":[133],"first":[134],"set\u2010partition":[135],"second":[137],"set\u2010partition.":[138],"resisting":[140],"reasonable":[145],"threshold":[147],"patch":[149],"TCP":[150],"protocol":[151],"stack":[152],"attack.":[156],"Compared":[157],"recent":[159],"algorithm,":[161],"our":[162],"experiments":[163],"show":[164],"better":[165],"throughput":[169,195],"increased":[170],"27%":[171],"when":[172],"10":[178],"6":[179],".":[180],"Moreover,":[181],"success":[183],"rate":[184],"100%,":[188],"while":[190],"intensity":[192],"increased,":[193],"decreased.":[196]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
