Get quick answers to your questions about the article from our AI researcher chatbot
{'id': 'https://openalex.org/W1828019504', 'doi': 'https://doi.org/10.1002/sec.1088', 'title': 'Human-centric security service and its application in smart space', 'display_name': 'Human-centric security service and its application in smart space', 'publication_year': 2014, 'publication_date': '2014-08-21', 'ids': {'openalex': 'https://openalex.org/W1828019504', 'doi': 'https://doi.org/10.1002/sec.1088', 'mag': '1828019504'}, 'language': 'en', 'primary_location': {'is_oa': True, 'landing_page_url': 'https://doi.org/10.1002/sec.1088', 'pdf_url': 'https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/sec.1088', 'source': {'id': 'https://openalex.org/S120683614', 'display_name': 'Security and Communication Networks', 'issn_l': '1939-0122', 'issn': ['1939-0122', '1939-0114'], 'is_oa': True, 'is_in_doaj': False, 'is_core': True, 'host_organization': 'https://openalex.org/P4310319869', 'host_organization_name': 'Hindawi Publishing Corporation', 'host_organization_lineage': ['https://openalex.org/P4310319869'], 'host_organization_lineage_names': ['Hindawi Publishing Corporation'], 'type': 'journal'}, 'license': None, 'license_id': None, 'version': 'publishedVersion', 'is_accepted': True, 'is_published': True}, 'type': 'article', 'type_crossref': 'journal-article', 'indexed_in': ['crossref'], 'open_access': {'is_oa': True, 'oa_status': 'bronze', 'oa_url': 'https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/sec.1088', 'any_repository_has_fulltext': False}, 'authorships': [{'author_position': 'first', 'author': {'id': 'https://openalex.org/A5071166643', 'display_name': 'Hangbae Chang', 'orcid': 'https://orcid.org/0000-0001-6098-1419'}, 'institutions': [{'id': 'https://openalex.org/I67900169', 'display_name': 'Chung-Ang University', 'ror': 'https://ror.org/01r024a98', 'country_code': 'KR', 'type': 'education', 'lineage': ['https://openalex.org/I67900169']}], 'countries': ['KR'], 'is_corresponding': False, 'raw_author_name': 'Hangbae Chang', 'raw_affiliation_strings': ['Department of Industrial Security, College of Business and Economics Chung‐Ang University Seoul Korea'], 'affiliations': [{'raw_affiliation_string': 'Department of Industrial Security, College of Business and Economics Chung‐Ang University Seoul Korea', 'institution_ids': ['https://openalex.org/I67900169']}]}, {'author_position': 'middle', 'author': {'id': 'https://openalex.org/A5031443335', 'display_name': 'Hosin Lee', 'orcid': 'https://orcid.org/0000-0001-9766-1232'}, 'institutions': [{'id': 'https://openalex.org/I126307644', 'display_name': 'University of Iowa', 'ror': 'https://ror.org/036jqmy94', 'country_code': 'US', 'type': 'education', 'lineage': ['https://openalex.org/I126307644']}], 'countries': ['US'], 'is_corresponding': False, 'raw_author_name': 'Hosin David Lee', 'raw_affiliation_strings': ['Department of Environmental Engineering University of IOWA IOWA USA'], 'affiliations': [{'raw_affiliation_string': 'Department of Environmental Engineering University of IOWA IOWA USA', 'institution_ids': ['https://openalex.org/I126307644']}]}, {'author_position': 'last', 'author': {'id': 'https://openalex.org/A5003935929', 'display_name': 'Richard E. Overill', 'orcid': 'https://orcid.org/0000-0002-5943-1812'}, 'institutions': [{'id': 'https://openalex.org/I183935753', 'display_name': "King's College London", 'ror': 'https://ror.org/0220mzb33', 'country_code': 'GB', 'type': 'education', 'lineage': ['https://openalex.org/I124357947', 'https://openalex.org/I183935753']}], 'countries': ['GB'], 'is_corresponding': False, 'raw_author_name': 'Richard Overill', 'raw_affiliation_strings': ["Department of Computer Science, King's College, London#TAB#"], 'affiliations': [{'raw_affiliation_string': "Department of Computer Science, King's College, London#TAB#", 'institution_ids': ['https://openalex.org/I183935753']}]}], 'institution_assertions': [], 'countries_distinct_count': 3, 'institutions_distinct_count': 3, 'corresponding_author_ids': [], 'corresponding_institution_ids': [], 'apc_list': {'value': 2100, 'currency': 'USD', 'value_usd': 2100, 'provenance': 'doaj'}, 'apc_paid': None, 'fwci': 0.0, 'has_fulltext': True, 'fulltext_origin': 'pdf', 'cited_by_count': 2, 'citation_normalized_percentile': {'value': 0.658136, 'is_in_top_1_percent': False, 'is_in_top_10_percent': False}, 'cited_by_percentile_year': {'min': 73, 'max': 76}, 'biblio': {'volume': '7', 'issue': '10', 'first_page': '1439', 'last_page': '1440'}, 'is_retracted': False, 'is_paratext': False, 'primary_topic': {'id': 'https://openalex.org/T14280', 'display_name': 'Big Data Technologies and Applications', 'score': 0.7381, 'subfield': {'id': 'https://openalex.org/subfields/1802', 'display_name': 'Information Systems and Management'}, 'field': {'id': 'https://openalex.org/fields/18', 'display_name': 'Decision Sciences'}, 'domain': {'id': 'https://openalex.org/domains/2', 'display_name': 'Social Sciences'}}, 'topics': [{'id': 'https://openalex.org/T14280', 'display_name': 'Big Data Technologies and Applications', 'score': 0.7381, 'subfield': {'id': 'https://openalex.org/subfields/1802', 'display_name': 'Information Systems and Management'}, 'field': {'id': 'https://openalex.org/fields/18', 'display_name': 'Decision Sciences'}, 'domain': {'id': 'https://openalex.org/domains/2', 'display_name': 'Social Sciences'}}, {'id': 'https://openalex.org/T10400', 'display_name': 'Network Security and Intrusion Detection', 'score': 0.6919, 'subfield': {'id': 'https://openalex.org/subfields/1705', 'display_name': 'Computer Networks and Communications'}, 'field': {'id': 'https://openalex.org/fields/17', 'display_name': 'Computer Science'}, 'domain': {'id': 'https://openalex.org/domains/3', 'display_name': 'Physical Sciences'}}, {'id': 'https://openalex.org/T12034', 'display_name': 'Digital and Cyber Forensics', 'score': 0.6423, 'subfield': {'id': 'https://openalex.org/subfields/1710', 'display_name': 'Information Systems'}, 'field': {'id': 'https://openalex.org/fields/17', 'display_name': 'Computer Science'}, 'domain': {'id': 'https://openalex.org/domains/3', 'display_name': 'Physical Sciences'}}], 'keywords': [], 'concepts': [{'id': 'https://openalex.org/C41008148', 'wikidata': 'https://www.wikidata.org/wiki/Q21198', 'display_name': 'Computer science', 'level': 0, 'score': 0.8356819}, {'id': 'https://openalex.org/C38652104', 'wikidata': 'https://www.wikidata.org/wiki/Q3510521', 'display_name': 'Computer security', 'level': 1, 'score': 0.62053514}, {'id': 'https://openalex.org/C2778572836', 'wikidata': 'https://www.wikidata.org/wiki/Q380933', 'display_name': 'Space (punctuation)', 'level': 2, 'score': 0.538053}, {'id': 'https://openalex.org/C2780378061', 'wikidata': 'https://www.wikidata.org/wiki/Q25351891', 'display_name': 'Service (business)', 'level': 2, 'score': 0.522127}, {'id': 'https://openalex.org/C108827166', 'wikidata': 'https://www.wikidata.org/wiki/Q175975', 'display_name': 'Internet privacy', 'level': 1, 'score': 0.34139848}, {'id': 'https://openalex.org/C144133560', 'wikidata': 'https://www.wikidata.org/wiki/Q4830453', 'display_name': 'Business', 'level': 0, 'score': 0.10382676}, {'id': 'https://openalex.org/C162853370', 'wikidata': 'https://www.wikidata.org/wiki/Q39809', 'display_name': 'Marketing', 'level': 1, 'score': 0.0}, {'id': 'https://openalex.org/C111919701', 'wikidata': 'https://www.wikidata.org/wiki/Q9135', 'display_name': 'Operating system', 'level': 1, 'score': 0.0}], 'mesh': [], 'locations_count': 1, 'locations': [{'is_oa': True, 'landing_page_url': 'https://doi.org/10.1002/sec.1088', 'pdf_url': 'https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/sec.1088', 'source': {'id': 'https://openalex.org/S120683614', 'display_name': 'Security and Communication Networks', 'issn_l': '1939-0122', 'issn': ['1939-0122', '1939-0114'], 'is_oa': True, 'is_in_doaj': False, 'is_core': True, 'host_organization': 'https://openalex.org/P4310319869', 'host_organization_name': 'Hindawi Publishing Corporation', 'host_organization_lineage': ['https://openalex.org/P4310319869'], 'host_organization_lineage_names': ['Hindawi Publishing Corporation'], 'type': 'journal'}, 'license': None, 'license_id': None, 'version': 'publishedVersion', 'is_accepted': True, 'is_published': True}], 'best_oa_location': {'is_oa': True, 'landing_page_url': 'https://doi.org/10.1002/sec.1088', 'pdf_url': 'https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/sec.1088', 'source': {'id': 'https://openalex.org/S120683614', 'display_name': 'Security and Communication Networks', 'issn_l': '1939-0122', 'issn': ['1939-0122', '1939-0114'], 'is_oa': True, 'is_in_doaj': False, 'is_core': True, 'host_organization': 'https://openalex.org/P4310319869', 'host_organization_name': 'Hindawi Publishing Corporation', 'host_organization_lineage': ['https://openalex.org/P4310319869'], 'host_organization_lineage_names': ['Hindawi Publishing Corporation'], 'type': 'journal'}, 'license': None, 'license_id': None, 'version': 'publishedVersion', 'is_accepted': True, 'is_published': True}, 'sustainable_development_goals': [{'display_name': 'Peace, justice, and strong institutions', 'id': 'https://metadata.un.org/sdg/16', 'score': 0.57}], 'grants': [], 'datasets': [], 'versions': [], 'referenced_works_count': 0, 'referenced_works': [], 'related_works': ['https://openalex.org/W2748952813', 'https://openalex.org/W2530322880', 'https://openalex.org/W2390279801', 'https://openalex.org/W2382290278', 'https://openalex.org/W2376932109', 'https://openalex.org/W2358668433', 'https://openalex.org/W2350741829', 'https://openalex.org/W2130043461', 'https://openalex.org/W2001405890', 'https://openalex.org/W1596801655'], 'abstract_inverted_index': {'Information': [0], 'Communication': [1, 1481], 'Technology': [2], 'paradigms': [3], 'are': [4, 39], 'standing': [5], 'on': [6, 169, 263, 359, 374, 452, 522, 648, 785, 896, 1021, 1063, 1251, 1282, 1328, 1334], 'the': [7, 29, 45, 58, 64, 67, 80, 93, 129, 138, 144, 184, 320, 344, 360, 375, 402, 512, 524, 662, 740, 748, 756, 822, 827, 847, 874, 879, 882, 887, 891, 894, 897, 905, 939, 964, 983, 1038, 1064, 1084, 1114, 1167, 1329, 1397, 1406, 1416, 1429, 1460, 1476, 1487], 'new': [8, 691, 816, 1199], 'Internet': [9, 1026, 1054], 'era,': [10], '"Internet': [11], 'of': [12, 24, 60, 66, 82, 105, 113, 124, 140, 173, 193, 201, 228, 255, 326, 404, 462, 582, 601, 615, 653, 708, 824, 881, 941, 977, 1027, 1041, 1055, 1066, 1069, 1087, 1100, 1116, 1141, 1170, 1241, 1313, 1331, 1423, 1445, 1478], 'Things,"': [13], 'which': [14, 166, 456, 1006, 1112, 1355], 'is': [15, 48, 161, 167, 177, 181, 226, 408, 465, 836, 911, 1113, 1475], 'going': [16], 'to': [17, 163, 182, 400, 510, 533, 554, 613, 633, 820, 838, 904, 1159, 1271, 1277, 1309, 1363, 1390, 1395, 1405, 1437, 1459], 'rapidly': [18], 'evolve': [19], 'smart': [20, 25, 46, 77, 269, 679, 697, 1142, 1453], 'space.': [21, 1454], 'The': [22, 377, 424, 473, 528, 567, 607, 670, 703, 788, 833, 853, 913, 1013, 1058, 1134, 1176, 1236, 1285, 1323], 'concept': [23], 'space': [26, 47, 78, 270], 'would': [27, 133, 1388, 1432], 'create': [28], 'environment': [30, 69, 752], 'where': [31], 'real': [32, 1360], 'world': [33], 'myriad': [34], 'things': [35, 1056], 'and': [36, 74, 86, 99, 109, 115, 122, 209, 219, 239, 250, 265, 285, 288, 307, 312, 314, 330, 340, 354, 385, 396, 416, 440, 464, 470, 496, 520, 526, 550, 577, 590, 627, 686, 714, 725, 734, 745, 753, 770, 810, 818, 843, 869, 919, 935, 947, 960, 985, 1002, 1034, 1045, 1080, 1125, 1138, 1147, 1155, 1164, 1172, 1184, 1194, 1208, 1215, 1223, 1246, 1261, 1268, 1276, 1292, 1297, 1303, 1315, 1318, 1339, 1345, 1370, 1383, 1403, 1411, 1440, 1449, 1466, 1470, 1480], 'intelligent': [37, 303, 309], 'devices': [38], 'connected': [40, 373], 'via': [41, 151], 'wire/wireless': [42], 'networks.': [43], 'As': [44], 'approaching,': [49], 'this': [50, 91, 127, 158, 223, 259, 1443, 1464], 'phenomenon': [51, 357], 'will': [52, 900], 'pose': [53], 'an': [54], 'important': [55], 'challenge': [56], 'in': [57, 101, 126, 206, 258, 268, 699, 750, 758, 793, 846, 945, 982, 1090, 1106, 1166, 1418, 1452], 'perspective': [59], 'information': [61, 72, 84, 94, 125, 147, 186, 211, 232, 247, 649, 895, 1335], 'security.': [62, 962], 'While': [63], 'characteristics': [65, 81, 139, 200], 'existing': [68, 130, 185], 'include': [70], 'passive': [71], 'process': [73, 85, 742, 783, 1169], 'system-based': [75], 'computing,': [76], 'possesses': [79, 1371], 'kinetic': [83], 'user': [87, 241, 298, 429, 446, 515, 537, 559, 715, 735, 746, 757, 771], 'context-based': [88], 'service.': [89], 'In': [90, 157], 'environment,': [92, 128], 'could': [95, 665], 'be': [96, 902, 967, 1008, 1433], 'easily': [97], 'collected': [98], 'misused': [100], 'various': [102, 191, 421, 459, 763], 'ways,': [103], 'because': [104, 893], 'connection': [106], 'between': [107, 743], 'virtual': [108], 'physical': [110, 116, 215], 'space,': [111], 'regardless': [112], 'time': [114, 162, 644, 1153], 'limitation.': [117], 'To': [118], 'guarantee': [119], 'confidentiality,': [120], 'integrity,': [121], 'availability': [123], 'security': [131, 174, 180, 187, 212, 224, 274, 276, 281, 283, 289, 294, 301, 315, 367, 525, 581, 674, 692, 880, 1017, 1165, 1266, 1290, 1311, 1321, 1336, 1447], 'service/system': [132], 'encounter': [134], 'some': [135], 'limitations.': [136], 'Considering': [137], 'recent': [141], 'incidents,': [142], 'utilizing': [143], 'state-of-the-art': [145], 'technology,': [146], 'leakage': [148], 'takes': [149], 'place': [150], 'diverse': [152], 'channels,': [153], 'including': [154, 197], 'social': [155, 280], 'engineering.': [156], 'vein,': [159], 'it': [160, 659], 'change': [164], 'paradigms,': [165], 'focused': [168], 'human': [170, 198], 'behavioral': [171], 'aspects': [172], 'system.': [175, 787], 'What': [176], 'called': [178], 'human-centric': [179, 293, 794, 849, 923, 978, 1011, 1320, 1446], 'upgrade': [183], 'system': [188, 233, 328, 349, 505, 819, 910], 'by': [189, 237, 335, 389, 437, 485, 543, 585, 620, 681, 720, 798, 864, 885, 926, 980, 1029, 1073, 1094, 1096, 1132, 1144, 1189, 1254, 1300, 1342, 1359], 'considering': [190], 'elements': [192], 'our': [194, 1392], 'daily': [195], 'life': [196], 'behavior,': [199, 244, 275], 'organization': [202], 'or': [203, 655], 'nation,': [204], 'changes': [205, 1089], 'modern': [207], 'society,': [208], 'integrated/converged': [210], 'management': [213, 676, 694, 1293], '(including': [214], 'security,': [216, 218, 248, 979], 'technical': [217], 'managerial': [220], 'security).': [221], 'Specifically,': [222], 'service': [225, 295, 1448], 'capable': [227], 'profiling': [229], 'a': [230, 253, 409, 444, 501, 556, 594, 631, 690, 700, 774, 780, 815, 840, 909, 950, 970, 1047, 1109, 1117, 1120, 1126, 1151, 1198, 1265, 1307, 1319, 1372, 1419, 1434], 'certain': [231], "user's": [234], 'future': [235, 848], 'action': [236], 'accumulating': [238], 'analyzing': [240, 1242], 'log': [242, 675, 693], 'data,': [243], 'knowledge': [245], 'about': [246, 762], 'attitude,': [249], 'behavior.': [251], 'Accordingly,': [252], 'number': [254], 'papers': [256, 1417, 1431], 'included': [257], 'special': [260, 1456], 'issue': [261, 267], 'focus': [262], 'law': [264], 'regulation': [266], '(open': [271], 'environment),': [272], 'organizational': [273], 'evaluation': [277], 'for': [278, 292, 332, 366, 370, 383, 413, 434, 468, 482, 506, 580, 678, 696, 717, 826, 922, 974, 1010, 1025, 1053, 1186, 1295, 1337, 1399, 1408, 1414, 1463, 1483], 'organization,': [279], 'culture,': [282], 'policy': [284, 1291], 'awareness,': [286], 'privacy': [287, 576, 709, 729, 823, 1004], 'issue,': [290], 'methodology': [291, 1158], 'design,': [296], 'multi-dimensional': [297], 'pattern': [299], 'recognition': [300], 'system,': [302], 'intrusion': [304], 'detection,': [305], 'prevention': [306], 'response,': [308], 'digital': [310], 'forensics': [311], 'diagnostics,': [313], 'case': [316], 'studies.': [317], 'More': [318], 'specifically,': [319], 'paper': [321, 378, 425, 474, 529, 568, 608, 671, 704, 789, 854, 914, 1014, 1059, 1135, 1177, 1237, 1286, 1324], 'entitled': [322, 379, 426, 475, 530, 569, 609, 672, 705, 790, 855, 915, 1015, 1060, 1136, 1178, 1238, 1287, 1325], '"Human-centric': [323], 'visual': [324], 'monitoring': [325, 348, 1267], 'multi-clients': [327], 'behavior': [329], 'BiT': [331], 'trust': [333], 'computing"': [334], 'Eun-Ha': [336], 'Song,': [337, 1258], 'Su-Hyun': [338], 'Yang,': [339], 'Young-Sik': [341], 'Jeong': [342, 1196], 'proposes': [343, 399, 443, 500, 553, 593, 630, 689, 728, 773, 814, 872, 938, 1046, 1083, 1150, 1197, 1264, 1306, 1349], 'trusted': [345, 361], 'platform': [346, 362], 'board': [347, 363, 1462], 'that': [350, 407, 598, 661, 737, 776, 873, 1204, 1428], 'enabled': [351], 'effectively': [352], 'detecting': [353, 1227], 'managing': [355], 'abnormal': [356], 'based': [358, 451, 784, 1020, 1250, 1281], 'not': [364, 901, 1228], 'only': [365, 1229], 'but': [368, 1232], 'also': [369, 993, 1233, 1404], 'multiple': [371, 1206], 'clients': [372], 'Web.': [376], '"Unified': [380], 'Threat': [381], 'Model': [382], 'Analyzing': [384], 'Evaluating': [386], 'Software': [387], 'Threats"': [388], 'XiaoHong': [390], 'Li,': [391, 545, 928], 'Ke': [392], 'He,': [393, 487], 'Zhiyong': [394], 'Feng,': [395], 'Guangquan': [397], 'Xu': [398, 1036], 'improve': [401, 511], 'trustworthiness': [403], 'software': [405, 418, 986], 'designs': [406], 'unified': [410], 'threat': [411], 'model': [412, 1019, 1240, 1270, 1308], 'representing,': [414], 'analyzing,': [415], 'evaluating': [417], 'threats': [419, 1244, 1274], 'at': [420], 'design': [422, 534, 555, 775, 1152, 1168, 1294], 'stages.': [423], '"A': [427, 570, 610, 706, 1016, 1239, 1326], 'novel': [428, 445, 611], 'authentication': [430, 447, 538, 560, 716, 736, 772, 946, 952, 975], 'scheme': [431, 448, 539, 561, 573, 597, 677, 695, 953, 1052], 'with': [432, 449, 540, 562, 604, 954, 1108, 1211, 1375], 'anonymity': [433, 450], 'wireless': [435, 469], 'communications"': [436], 'Jianwei': [438, 546], 'Niu': [439], 'Xiong': [441, 544], 'Li': [442], 'elliptic': [453], 'curve': [454], 'cryptosystem,': [455], 'can': [457, 738, 754, 777, 966], 'resist': [458], 'known': [460], 'types': [461], 'attacks': [463], 'more': [466, 841], 'practical': [467], 'mobile': [471, 507, 514, 616, 640], 'communications.': [472], '"UFLE:': [476], 'A': [477], 'User-friendly': [478], 'Location-free': [479], 'Encryption': [480], 'System': [481], 'Mobile': [483], 'Users"': [484], 'Yi-Jun': [486], 'Patrick': [488], 'P.': [489], 'F.': [490], 'Chan,': [491], 'Lucas': [492], 'C.': [493], 'K.': [494], 'Hui,': [495], 'S.': [497], 'M.': [498], 'Yiu': [499], 'user-friendly': [502], 'location-free': [503], 'encryption': [504, 517], 'users': [508], '(UFLE)': [509], 'solution': [513], 'location-specific': [516], 'from': [518, 650, 889, 1122, 1129], 'Studer': [519], 'Perrig': [521], 'both': [523], 'usability.': [527], '"Applying': [531], 'biometrics': [532], 'three-factors': [535], 'remote': [536, 558], 'key': [541, 563], 'agreement"': [542], 'Niu,': [547], 'Zhibo': [548], 'Wang,': [549, 1079], 'Caisen': [551], 'Chen': [552, 1469], 'three-factor': [557], 'agreement': [564], 'using': [565, 642, 712, 732, 768, 860], 'biometrics.': [566], 'spatial': [571, 595], 'transformation': [572, 596, 603], 'supporting': [574], 'data': [575], 'query': [578], 'integrity': [579], 'outsourced': [583], 'databases"': [584], 'Hyeong-Il': [586], 'Kim,': [587, 622, 683, 722, 803, 809, 1260], 'Al-Amin': [588], 'Hossain,': [589], 'Jae-Woo': [591], 'Chang': [592, 1305], 'makes': [599], 'use': [600], 'shearing': [602], 'rotation': [605], 'shifting.': [606], 'approach': [612], 'detection': [614], 'rogue': [617, 635, 667], 'access': [618, 636], 'points"': [619], 'Iluk': [621], 'Jungtaek': [623], 'Seo,': [624, 800], 'Taeshik': [625], 'Shon,': [626], 'Jongsub': [628], 'Moon': [629], 'method': [632, 664, 876], 'detect': [634, 666], 'points': [637], '(APs)': [638], 'over': [639], 'networks': [641], 'round-trip': [643], 'measurements,': [645], 'without': [646], 'relying': [647], 'authorized': [651], 'lists': [652], 'APs': [654, 668], 'users.': [656], 'Through': [657], 'experiments,': [658], 'proved': [660], 'proposed': [663, 834, 875], 'successfully.': [669], '"Multi-camera-based': [673], 'surveillance"': [680], 'Daehoon': [682], 'Eenjun': [684], 'Hwang,': [685], 'Seungmin': [687, 1192], 'Rho': [688], 'surveillance': [698, 1187], 'multi-camera': [701], 'environment.': [702, 852, 1057], 'study': [707, 1327], 'problem': [710, 730, 766], 'solving': [711, 731, 767], 'device': [713, 733, 744, 769], 'M2M': [718, 751], 'environments"': [719, 1143], 'Jin-Mook': [721], 'Hwa-Young': [723], 'Jeong,': [724], 'Bong-Hwa': [726], 'Hong': [727], 'support': [739, 755, 1410, 1485], 'certification': [741, 760, 782], 'communicating': [747], 'subject': [749], 'another': [759], 'work': [761, 1413], 'services.': [764], 'Privacy': [765], 'pass': [778], 'through': [779], 'light': [781], 'existent': [786], '"Privacy': [791], 'protection': [792], 'healthcare': [795, 850], 'home': [796, 851], 'environment"': [797], 'Deok-Seok': [799], 'Soon': [801], 'Seok': [802, 812], 'Yong': [804], 'Hee': [805, 808], 'Lee,': [806], 'Gwang': [807], 'Yoon': [811], 'Shin': [813], 'architecture': [817], 'secure': [821, 842], 'person': [825], 'newly': [828], 'published': [829], 'international': [830], 'standard': [831], 'technology.': [832], 'technology': [835], 'expected': [837], 'provide': [839], 'realistic': [844], 'alternative': [845], '"Improved': [856], 'cancelable': [857], 'fingerprint': [858], 'templates': [859], 'minutiae-based': [861], 'functional': [862], 'transform"': [863], 'Daesung': [865], 'Moon,': [866], 'Jang-Hee': [867], 'Yoo,': [868], 'Mun-Kyu': [870], 'Lee': [871], 'significantly': [877], 'improves': [878], 'original': [883, 898], 'template': [884, 899], 'preventing': [886], 'attacker': [888, 906], 'reconstructing': [890], 'transform': [892], 'available': [903], 'even': [907], 'when': [908], 'compromised.': [912], '"Robust': [916], 'password': [917, 924, 943, 951, 956], 'changing': [918, 944], 'DoS': [920, 958], 'resilience': [921], 'authentication"': [925], 'Xiangxue': [927], 'Haifeng': [929], 'Qian,': [930], 'Yu': [931], 'Yu,': [932], 'Jian': [933], 'Weng,': [934], 'Ziping': [936], 'Wang': [937], 'requirements': [940], 'robust': [942, 955, 1180], 'presents': [948], 'SPCA,': [949], 'changing,': [957], 'resilience,': [959], 'card-compromise': [961], 'Thus,': [963], 'proposal': [965], 'viewed': [968], 'as': [969, 999], 'suitable': [971], 'candidate': [972], 'instantiation': [973], 'services': [976], 'embedding': [981], 'computer': [984], 'systems.': [987], 'Strong': [988], 'Password': [989], 'Check': [990], 'Authentication': [991], '(SPCA)': [992], 'achieves': [994], 'other': [995], 'appealing': [996], 'features,': [997], 'such': [998], 'self-healing': [1000], 'ability': [1001], 'strong': [1003, 1373], 'protection,': [1005], 'may': [1007], 'useful': [1009], 'applications.': [1012], 'communication': [1018], 'certificateless': [1022, 1042, 1049], 'online/offline': [1023, 1043, 1050], 'signcryption': [1024, 1044, 1051], 'Things"': [1028], 'Ming': [1030], 'Luo,': [1031], 'Min': [1032], 'Tu,': [1033], 'Jianfeng': [1035], 'defines': [1037], 'formal': [1039, 1139, 1156], 'models': [1040], 'concrete': [1048], '"Discovering': [1061], 'anomaly': [1062], 'basis': [1065], 'flow': [1067, 1085], 'estimation': [1068, 1086, 1185], 'alert': [1070, 1101], 'feature': [1071, 1091, 1102], 'distribution"': [1072], 'Xuejiao': [1074], 'Liu,': [1075], 'Yingjie': [1076], 'Xia,': [1077], 'Yanbo': [1078], 'Jing': [1081], 'Ren': [1082], 'abrupt': [1088], 'distribution': [1092, 1118, 1127], 'caused': [1093], 'anomalies,': [1095], 'computing': [1097], 'Kullback–Leibler': [1098], 'distance': [1099], 'values': [1103], 'under': [1104], 'observation': [1105], 'comparison': [1107], 'reference': [1110], 'distribution,': [1111], 'mixture': [1115], 'drawing': [1119], 'tread': [1121], 'historical': [1123], 'alerts,': [1124], 'derived': [1128], 'expertise': [1130], 'provided': [1131], 'administrators.': [1133], '"Modeling': [1137], 'verification': [1140, 1157], 'Fulvio': [1145], 'Corno': [1146], 'Muhammad': [1148], 'Sanaullah': [1149], 'modeling': [1154], 'consider': [1160], 'correctness,': [1161], 'reliability,': [1162], 'safety,': [1163], 'SmE': [1171], 'their': [1173, 1400, 1409], 'related': [1174], 'components.': [1175], '"Real-time': [1179], '3D': [1181, 1200], 'object': [1182, 1201], 'tracking': [1183, 1202], 'system"': [1188], 'Jin-hyung': [1190], 'Park,': [1191], 'Rho,': [1193], 'Chang-sung': [1195], 'algorithm': [1203, 1219], 'supports': [1205], 'planar': [1207, 1230], 'nonplanar': [1209, 1234], 'objects': [1210, 1231], 'real-time': [1212, 1224], 'processing': [1213], 'speed': [1214], 'high': [1216, 1221], 'accuracy.': [1217], 'This': [1218], 'provides': [1220], 'accuracy': [1222], 'performance': [1225], 'while': [1226], 'objects.': [1235], 'cyber': [1243, 1273], 'trend': [1245, 1275], 'tracing': [1247], 'potential': [1248, 1279], 'attackers': [1249, 1280], 'darknet': [1252, 1283], 'traffic"': [1253], 'Sang-soo': [1255], 'Choi,': [1256], 'Jungsuk': [1257], 'Seokhun': [1259], 'Sookyun': [1262], 'Kim': [1263, 1302, 1348], 'response': [1269], 'analyze': [1272], 'trace': [1278], 'traffic.': [1284], '"Human': [1288], 'centric': [1289], 'small': [1296, 1314], 'medium': [1298, 1316], 'business"': [1299], 'Yanghoon': [1301], 'Hangbae': [1304], 'measure': [1310], 'levels': [1312], 'business': [1317], 'policy.': [1322], 'influences': [1330], 'R&D': [1332, 1364, 1376], 'investment': [1333], 'mechanical': [1338], 'electronics': [1340], 'industry"': [1341], 'Seung-Ryung': [1343], 'Oh': [1344], 'Kun': [1346], 'Woo': [1347], 'Expected': [1350], 'Net': [1351], 'Present': [1352], 'Value': [1353, 1380], '(ENPV),': [1354], 'has': [1356], 'been': [1357], 'deduced': [1358], 'option': [1361], 'according': [1362], 'investment,': [1365, 1377], 'reflects': [1366], 'market': [1367, 1384], 'value': [1368], 'well,': [1369], 'correlation': [1374], 'Real': [1378], 'Option': [1379], '(ROV),': [1381], 'ENPV,': [1382], 'value.': [1385], 'Eventually,': [1386], 'we': [1387], 'like': [1389], 'extend': [1391], 'sincere': [1393], 'appreciation': [1394], 'all': [1396], 'authors': [1398], 'priceless': [1401], 'dedication': [1402], 'referees': [1407], 'hard': [1412], 'reviewing': [1415], 'timely': [1420], 'manner': [1421], 'despite': [1422], 'busyness.': [1424], 'We': [1425], 'firmly': [1426], 'believe': [1427], 'accepted': [1430], 'meaningful': [1435], 'contribution': [1436], 'researchers,': [1438], 'students,': [1439], 'practitioners': [1441], 'studying': [1442], 'field': [1444], 'its': [1450], 'application': [1451], 'Our': [1455], 'thanks': [1457], 'go': [1458], 'editorial': [1461], 'SI': [1465], 'Professor': [1467], 'Hsiao-Hwa': [1468], 'Hamid': [1471], 'R.': [1472], 'Sharif,': [1473], 'who': [1474], 'Editor-in-Chief': [1477], 'Security': [1479], 'Networks': [1482], 'his': [1484], 'throughout': [1486], 'whole': [1488], 'publication': [1489], 'processes.': [1490]}, 'cited_by_api_url': 'https://api.openalex.org/works?filter=cites:W1828019504', 'counts_by_year': [{'year': 2018, 'cited_by_count': 2}], 'updated_date': '2024-12-09T04:44:19.237161', 'created_date': '2016-06-24'}