{"id":"https://openalex.org/W2102552198","doi":"https://doi.org/10.23919/acc.2004.1386699","title":"User profiling for computer security","display_name":"User profiling for computer security","publication_year":2004,"publication_date":"2004-01-01","ids":{"openalex":"https://openalex.org/W2102552198","doi":"https://doi.org/10.23919/acc.2004.1386699","mag":"2102552198"},"language":"en","primary_location":{"id":"doi:10.23919/acc.2004.1386699","is_oa":false,"landing_page_url":"https://doi.org/10.23919/acc.2004.1386699","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2004 American Control Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083361757","display_name":"D.L. Pepyne","orcid":null},"institutions":[{"id":"https://openalex.org/I136199984","display_name":"Harvard University","ror":"https://ror.org/03vek6s52","country_code":"US","type":"education","lineage":["https://openalex.org/I136199984"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"D.L. Pepyne","raw_affiliation_strings":["Division of Engineering and Applied Science, Harvard University, Cambridge, MA, USA"],"affiliations":[{"raw_affiliation_string":"Division of Engineering and Applied Science, Harvard University, Cambridge, MA, USA","institution_ids":["https://openalex.org/I136199984"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035529420","display_name":"J. Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jinghua Hu","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Massachusetts, Amherst, MA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Massachusetts, Amherst, MA, USA","institution_ids":["https://openalex.org/I24603500"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110939771","display_name":"Weibo Gong","orcid":null},"institutions":[{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Weibo Gong","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Massachusetts, Amherst, MA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Massachusetts, Amherst, MA, USA","institution_ids":["https://openalex.org/I24603500"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5083361757"],"corresponding_institution_ids":["https://openalex.org/I136199984"],"apc_list":null,"apc_paid":null,"fwci":0.2317,"has_fulltext":false,"cited_by_count":26,"citation_normalized_percentile":{"value":0.63675716,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"982","last_page":"987 vol.2"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.8078379034996033},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7524369955062866},{"id":"https://openalex.org/keywords/queueing-theory","display_name":"Queueing theory","score":0.6516588926315308},{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.45752274990081787},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4478526711463928},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.359282910823822},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.12676900625228882}],"concepts":[{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.8078379034996033},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7524369955062866},{"id":"https://openalex.org/C22684755","wikidata":"https://www.wikidata.org/wiki/Q847526","display_name":"Queueing theory","level":2,"score":0.6516588926315308},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.45752274990081787},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4478526711463928},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.359282910823822},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.12676900625228882},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/acc.2004.1386699","is_oa":false,"landing_page_url":"https://doi.org/10.23919/acc.2004.1386699","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2004 American Control Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Decent work and economic growth","id":"https://metadata.un.org/sdg/8","score":0.4699999988079071}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W168451370","https://openalex.org/W1483953966","https://openalex.org/W1493775511","https://openalex.org/W1521160590","https://openalex.org/W1540076235","https://openalex.org/W1974742355","https://openalex.org/W1980065740","https://openalex.org/W1994340575","https://openalex.org/W2085305295","https://openalex.org/W2145332315","https://openalex.org/W2150847526","https://openalex.org/W2913860073"],"related_works":["https://openalex.org/W1585007175","https://openalex.org/W2382521049","https://openalex.org/W2144385241","https://openalex.org/W4300101996","https://openalex.org/W2165950148","https://openalex.org/W4253593777","https://openalex.org/W2951497643","https://openalex.org/W2161444195","https://openalex.org/W2589019771","https://openalex.org/W4403053866"],"abstract_inverted_index":{"Systems":[0],"and":[1,16,32,50,97,119],"control":[2,17,33],"theory":[3,18,34,49],"was":[4],"largely":[5],"responsible":[6],"for":[7,55,73,126],"realizing":[8],"the":[9,25,45,81,110,114,120],"industrial":[10],"revolution.":[11],"We":[12],"believe":[13],"that":[14],"systems":[15,31],"also":[19],"plays":[20],"a":[21,94],"key":[22],"role":[23],"in":[24,93],"information":[26],"revolution":[27],"underway.":[28],"In":[29],"particular,":[30],"should":[35],"have":[36],"much":[37],"to":[38,70,89],"offer":[39],"network":[40],"security.":[41],"This":[42],"paper":[43],"explores":[44],"use":[46,90,121],"of":[47,64,77,80,83,112,116,122],"queueing":[48],"logistic":[51],"regression":[52],"modeling":[53],"methods":[54],"profiling":[56,118],"computer":[57],"users":[58],"based":[59],"on":[60],"simple":[61,123],"temporal":[62,124],"aspects":[63],"their":[65,84,91],"behavior.":[66],"The":[67],"goal":[68],"is":[69],"develop":[71],"profiles":[72],"very":[74,95],"specialized":[75],"groups":[76],"users,":[78],"because":[79],"nature":[82],"work":[85],"would":[86],"be":[87],"expected":[88],"computers":[92],"similar":[96],"regular":[98],"way,":[99],"e.g.,":[100],"bank":[101],"tellers,":[102],"insurance":[103],"adjusters,":[104],"etc.":[105],"Encouraging":[106],"proof-of-concept":[107],"results":[108],"suggest":[109],"potential":[111],"both":[113],"idea":[115],"user":[117],"features":[125],"grouping":[127],"users.":[128]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":3},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":5},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
