{"id":"https://openalex.org/W3010154780","doi":"https://doi.org/10.1155/2020/8387672","title":"User Audit Model Based on Attribute Measurement and Similarity Measurement","display_name":"User Audit Model Based on Attribute Measurement and Similarity Measurement","publication_year":2020,"publication_date":"2020-03-09","ids":{"openalex":"https://openalex.org/W3010154780","doi":"https://doi.org/10.1155/2020/8387672","mag":"3010154780"},"language":"en","primary_location":{"id":"doi:10.1155/2020/8387672","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8387672","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8387672.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2020/8387672.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060400323","display_name":"Xiaohui Yang","orcid":"https://orcid.org/0000-0003-0379-6326"},"institutions":[{"id":"https://openalex.org/I43337087","display_name":"Hebei University","ror":"https://ror.org/01p884a79","country_code":"CN","type":"education","lineage":["https://openalex.org/I43337087"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaohui Yang","raw_affiliation_strings":["School of Cyber Security and Computer, Hebei University, Baoding 071002, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security and Computer, Hebei University, Baoding 071002, China","institution_ids":["https://openalex.org/I43337087"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102016102","display_name":"Ying Sun","orcid":"https://orcid.org/0000-0002-6199-5895"},"institutions":[{"id":"https://openalex.org/I43337087","display_name":"Hebei University","ror":"https://ror.org/01p884a79","country_code":"CN","type":"education","lineage":["https://openalex.org/I43337087"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ying Sun","raw_affiliation_strings":["School of Cyber Security and Computer, Hebei University, Baoding 071002, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security and Computer, Hebei University, Baoding 071002, China","institution_ids":["https://openalex.org/I43337087"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5060400323"],"corresponding_institution_ids":["https://openalex.org/I43337087"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.3083,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.58709883,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":93,"max":95},"biblio":{"volume":"2020","issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8920263648033142},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.6854438781738281},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.5908820033073425},{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.587914228439331},{"id":"https://openalex.org/keywords/levenshtein-distance","display_name":"Levenshtein distance","score":0.5372481346130371},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5305643081665039},{"id":"https://openalex.org/keywords/network-forensics","display_name":"Network forensics","score":0.4374179244041443},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4132424294948578},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3900344669818878},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.37121832370758057},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.1805259883403778},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.18031814694404602},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.12821218371391296}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8920263648033142},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.6854438781738281},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.5908820033073425},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.587914228439331},{"id":"https://openalex.org/C2777515626","wikidata":"https://www.wikidata.org/wiki/Q496939","display_name":"Levenshtein distance","level":2,"score":0.5372481346130371},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5305643081665039},{"id":"https://openalex.org/C50747538","wikidata":"https://www.wikidata.org/wiki/Q7001032","display_name":"Network forensics","level":3,"score":0.4374179244041443},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4132424294948578},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3900344669818878},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.37121832370758057},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.1805259883403778},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.18031814694404602},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12821218371391296},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2020/8387672","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8387672","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8387672.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:8587f1b1b7674e0e920159944a7fa375","is_oa":true,"landing_page_url":"https://doaj.org/article/8587f1b1b7674e0e920159944a7fa375","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2020 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2020/8387672","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8387672","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8387672.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.75}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3010154780.pdf","grobid_xml":"https://content.openalex.org/works/W3010154780.grobid-xml"},"referenced_works_count":4,"referenced_works":["https://openalex.org/W1985767166","https://openalex.org/W2094948131","https://openalex.org/W2313602410","https://openalex.org/W2956092535"],"related_works":["https://openalex.org/W2404647514","https://openalex.org/W1667647204","https://openalex.org/W4247536566","https://openalex.org/W2018477250","https://openalex.org/W3119814709","https://openalex.org/W4241418540","https://openalex.org/W1508895727","https://openalex.org/W2725786787","https://openalex.org/W4283160672","https://openalex.org/W2945511280"],"abstract_inverted_index":{"The":[0,36],"Internet":[1],"of":[2,15,51,57,65,148,195,208],"Things":[3],"(IoT)":[4],"is":[5,85,112,120,143,171],"an":[6,86],"open":[7],"network.":[8,20],"And,":[9],"there":[10],"are":[11,176],"a":[12,49,100,123,129,162,168],"large":[13],"number":[14],"malicious":[16,22,82,174],"nodes":[17,23,38,84,97],"in":[18,62,204],"the":[19,27,41,55,58,63,95,115,138,146,157,190,205,209],"These":[21],"may":[24],"tamper":[25],"with":[26],"correct":[28],"data":[29,43,194],"and":[30,71,77,108,173,192,197,201],"pass":[31],"them":[32],"to":[33,48,53,80,89,94,127,132],"other":[34,72],"nodes.":[35],"normal":[37],"will":[39],"use":[40],"wrong":[42],"for":[44],"information":[45,67,79],"dissemination":[46,64],"due":[47],"lack":[50],"ability":[52],"verify":[54],"correctness":[56],"messages":[59],"received,":[60],"resulting":[61],"false":[66],"on":[68,105,156,167],"medical,":[69],"social,":[70],"networks.":[73,91],"Auditing":[74],"user":[75,83,96,101,116,134,163],"attributes":[76],"behavior":[78,193],"identify":[81],"important":[87],"way":[88],"secure":[90],"In":[92],"response":[93],"audit":[98,102,164],"problem,":[99],"model":[103,126,165,186],"based":[104,155,166],"attribute":[106,117,135,191],"measurement":[107,110,118,141],"similarity":[109,140,147],"(AM-SM-UAM)":[111],"proposed.":[113],"Firstly,":[114],"algorithm":[119,142],"constructed,":[121,144],"using":[122],"hierarchical":[124],"decision":[125],"construct":[128],"judgment":[130],"matrix":[131],"analyze":[133,189],"data.":[136],"Secondly,":[137],"blog":[139,149],"evaluating":[145],"posts":[150],"published":[151],"by":[152,178],"different":[153],"users":[154,175,196],"improved":[158],"Levenshtein":[159],"distance.":[160],"Finally,":[161],"security":[169,179],"degree":[170],"built,":[172],"defined":[177],"thresholds.":[180],"Experimental":[181],"results":[182],"show":[183],"that":[184],"this":[185],"can":[187],"comprehensively":[188],"have":[198],"more":[199],"accurate":[200],"stable":[202],"performance":[203],"practical":[206],"application":[207],"network":[210],"platforms.":[211]},"counts_by_year":[{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
