{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:25:07Z","timestamp":1740122707492,"version":"3.37.3"},"reference-count":9,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,2,5]],"date-time":"2018-02-05T00:00:00Z","timestamp":1517788800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602155","U1404611","61370221"],"award-info":[{"award-number":["61602155","U1404611","61370221"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["U1204614"],"award-info":[{"award-number":["U1204614"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Program for Science & Technology Innovative Research Team in University of Henan Province","award":["14IRTSTHN021"],"award-info":[{"award-number":["14IRTSTHN021"]}]},{"name":"Program for Science & Technology Innovation Talents in the University of Henan Province","award":["14HASTIT045","16HASTIT035"],"award-info":[{"award-number":["14HASTIT045","16HASTIT035"]}]},{"name":"Henan science and technology innovation outstanding talent","award":["164200510007"],"award-info":[{"award-number":["164200510007"]}]},{"name":"Training plan of Henan youth backbone teachers","award":["2014GGJS-053","2015GGJS-047"],"award-info":[{"award-number":["2014GGJS-053","2015GGJS-047"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1007\/s11277-018-5406-1","type":"journal-article","created":{"date-parts":[[2018,2,5]],"date-time":"2018-02-05T08:51:13Z","timestamp":1517820673000},"page":"3749-3758","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A User Recognition Strategy Under Mobile Cloud Environment"],"prefix":"10.1007","volume":"102","author":[{"given":"Ruijuan","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Jing","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Kang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Mingchuan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Junlong","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Qingtao","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Huiqiang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,5]]},"reference":[{"issue":"C","key":"5406_CR1","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.jnca.2015.02.003","volume":"52","author":"E Ahmed","year":"2015","unstructured":"Ahmed, E., Gani, A., Sookhak, M., Hamid, S. H. A., & Xia, F. (2015). Application optimization in mobile cloud computing: Motivation, taxonomies, and open challenges. Journal of Network and Computer Applications, 52(C), 52\u201368.","journal-title":"Journal of Network and Computer Applications"},{"issue":"7","key":"5406_CR2","first-page":"1271","volume":"16","author":"R Zheng","year":"2015","unstructured":"Zheng, R., Zhang, M., Wu, Q., Wei, W., & Yang, C. (2015). A(3)srC: Autonomic assessment approach to IOT security risk based on multidimensional normal cloud. Journal of Internet Technology, 16(7), 1271\u20131282.","journal-title":"Journal of Internet Technology"},{"key":"5406_CR3","doi-asserted-by":"crossref","unstructured":"Bavaud, F. (2010). Euclidean distances, soft and spectral clustering on weighted graphs. In Proceedings of the European conference on machine learning and principles and practice of knowledge discovery in databases (ECML PKDD 2010), Barcelona, Spain (pp. 103\u2013118).","DOI":"10.1007\/978-3-642-15880-3_13"},{"issue":"11","key":"5406_CR4","doi-asserted-by":"publisher","first-page":"4965","DOI":"10.1016\/j.eswa.2015.02.006","volume":"42","author":"X Ban Liu","year":"2015","unstructured":"Liu, X. Ban. (2015). Clustering by growing incremental self-organizing neural network. Expert Systems with Applications, 42(11), 4965\u20134981.","journal-title":"Expert Systems with Applications"},{"key":"5406_CR5","doi-asserted-by":"crossref","unstructured":"Li, H., & Wu, Q. (2013). Research of clustering algorithm based on information entropy and frequency sensitive discrepancy metric in anomaly detection. In Proceedings of the 2013 international conference on information science and cloud computing companion (ISCC-C 2013) (pp. 799\u2013805). Guangzhou: IEEE.","DOI":"10.1109\/ISCC-C.2013.108"},{"issue":"6","key":"5406_CR6","first-page":"132","volume":"18","author":"Y Lu","year":"2014","unstructured":"Lu, Y., Xi, X., Hua, Z., & Zhang, N. (2014). An abnormal user behaviour detection method based on partially labelled data. Computer Modelling and New Technologies, 18(6), 132\u2013141.","journal-title":"Computer Modelling and New Technologies"},{"key":"5406_CR7","unstructured":"Liang, H., Wei, W., & Fei, R. (2009). Anomaly detection using improved hierarchy clustering. In Proceedings of the 2009 international conference on artificial intelligence and computational intelligence (AICI 2009) (pp. 319\u2013323). Shanghai: IEEE."},{"issue":"2","key":"5406_CR8","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1007\/s11276-015-0980-6","volume":"22","author":"Y Zhu","year":"2016","unstructured":"Zhu, Y., & Ni, L. (2016). A probabilistic approach to statistical QoS provision of event detection in sensor networks. Wireless Networks, 22(2), 439\u2013451.","journal-title":"Wireless Networks"},{"key":"5406_CR9","doi-asserted-by":"crossref","unstructured":"Zheng, J., & Zhang, J. (2015). Association rule mining in DoS attack detection and defense in the application of network. In Proceedings of the 5th international conference on education, management, information and medicine (EMIM) (pp. 445\u2013449). Shenyang: IEEE.","DOI":"10.2991\/emim-15.2015.87"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-018-5406-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5406-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5406-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,4]],"date-time":"2019-02-04T19:50:24Z","timestamp":1549309824000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-018-5406-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,5]]},"references-count":9,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["5406"],"URL":"https:\/\/doi.org\/10.1007\/s11277-018-5406-1","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2018,2,5]]},"assertion":[{"value":"5 February 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}