{"id":"https://openalex.org/W2495783969","doi":"https://doi.org/10.4018/ijitn.2016040102","title":"Research on System Structure of Mobile Internet Security Audit","display_name":"Research on System Structure of Mobile Internet Security Audit","publication_year":2016,"publication_date":"2016-04-01","ids":{"openalex":"https://openalex.org/W2495783969","doi":"https://doi.org/10.4018/ijitn.2016040102","mag":"2495783969"},"language":"en","primary_location":{"id":"doi:10.4018/ijitn.2016040102","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijitn.2016040102","pdf_url":null,"source":{"id":"https://openalex.org/S32289611","display_name":"International Journal of Interdisciplinary Telecommunications and Networking","issn_l":"1941-8663","issn":["1941-8663","1941-8671"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Interdisciplinary Telecommunications and Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070264099","display_name":"Xia-Meng Si","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xia-Meng Si","raw_affiliation_strings":["School of Software Engineering, Beijing University of Posts and Telecommunications. Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Beijing University of Posts and Telecommunications. Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5070264099"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.08048653,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":"2","first_page":"12","last_page":"20"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12451","display_name":"Smart Grid and Power Systems","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8031419515609741},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7129845023155212},{"id":"https://openalex.org/keywords/internet-security","display_name":"Internet security","score":0.5203894376754761},{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.5067468285560608},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.4945974051952362},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.4564334452152252},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4478260278701782},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4302406311035156},{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.4166489839553833},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.41447246074676514},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.4120437502861023},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.38359442353248596},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.3828415274620056},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3181943893432617},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.14461937546730042}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8031419515609741},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7129845023155212},{"id":"https://openalex.org/C22111027","wikidata":"https://www.wikidata.org/wiki/Q1070427","display_name":"Internet security","level":4,"score":0.5203894376754761},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.5067468285560608},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.4945974051952362},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.4564334452152252},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4478260278701782},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4302406311035156},{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.4166489839553833},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.41447246074676514},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.4120437502861023},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.38359442353248596},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.3828415274620056},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3181943893432617},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.14461937546730042},{"id":"https://openalex.org/C115304011","wikidata":"https://www.wikidata.org/wiki/Q72755","display_name":"Schwarzschild radius","level":3,"score":0.0},{"id":"https://openalex.org/C2776401274","wikidata":"https://www.wikidata.org/wiki/Q3756855","display_name":"Accretion (finance)","level":2,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C121955636","wikidata":"https://www.wikidata.org/wiki/Q4116214","display_name":"Accounting","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/ijitn.2016040102","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijitn.2016040102","pdf_url":null,"source":{"id":"https://openalex.org/S32289611","display_name":"International Journal of Interdisciplinary Telecommunications and Networking","issn_l":"1941-8663","issn":["1941-8663","1941-8671"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Interdisciplinary Telecommunications and Networking","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jitn00:v:8:y:2016:i:2:p:12-20","is_oa":false,"landing_page_url":"https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJITN.2016040102","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7200000286102295,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W1974022228","https://openalex.org/W2039351491","https://openalex.org/W2333408683","https://openalex.org/W2355175744","https://openalex.org/W2381911250"],"related_works":["https://openalex.org/W1969914915","https://openalex.org/W2370365793","https://openalex.org/W2033357182","https://openalex.org/W3188450124","https://openalex.org/W2372674753","https://openalex.org/W2345270111","https://openalex.org/W2062404660","https://openalex.org/W2390699807","https://openalex.org/W2373080253","https://openalex.org/W2547256912"],"abstract_inverted_index":{"As":[0,42],"the":[1,10,73,88,96],"development":[2],"of":[3,14,24,39,55,82,91,105],"mobile":[4,64,83,106],"internet":[5,65,84,107],"bring":[6],"convenient":[7],"for":[8],"people,":[9],"openness":[11],"and":[12,28,35,75,80,102],"variety":[13],"services":[15],"make":[16],"its":[17],"security":[18,44,66,78,94,108],"issues":[19],"more":[20],"complicated":[21],"than":[22],"those":[23],"traditional":[25,92],"network.":[26],"Firewall":[27],"intrusion":[29],"detection":[30],"focuses":[31],"on":[32,72,87],"external":[33],"aggression,":[34],"cannot":[36],"prevent":[37],"revealing":[38],"internal":[40,49,56],"information.":[41],"supplementary,":[43],"audit":[45],"technology":[46],"can":[47],"monitor":[48],"users'":[50],"activity,":[51],"forbid":[52],"abnormal":[53],"behavior":[54],"users.":[57],"The":[58],"author":[59,97],"introduces":[60],"related":[61],"works":[62],"about":[63],"audit,":[67,95],"comb":[68],"through":[69],"matured":[70],"products":[71],"market,":[74],"analyze":[76],"current":[77],"status":[79],"architecture":[81],"security.":[85],"Based":[86],"research":[89],"results":[90],"network":[93],"provides":[98],"a":[99],"functional":[100],"framework":[101],"universal":[103],"model":[104],"auditing,":[109],"as":[110,112],"well":[111],"introduce":[113],"an":[114],"application":[115],"scenario.":[116]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
