{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T20:18:09Z","timestamp":1740169089100,"version":"3.37.3"},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602155","U1604155","61871430","61370221"],"award-info":[{"award-number":["61602155","U1604155","61871430","61370221"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Henan Science and Technology Innovation Project","award":["174100510010"],"award-info":[{"award-number":["174100510010"]}]},{"name":"Industry University Research Project of Henan Province","award":["172107000005"],"award-info":[{"award-number":["172107000005"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/access.2018.2877423","type":"journal-article","created":{"date-parts":[[2018,10,22]],"date-time":"2018-10-22T19:45:41Z","timestamp":1540237541000},"page":"63005-63020","source":"Crossref","is-referenced-by-count":2,"title":["An Anomaly Recognition and Autonomic Optimization Method to User\u2019s Sequence Behaviors for D2D Communications in MCC"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0932-8788","authenticated-orcid":false,"given":"Ruijuan","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Junlong","family":"Zhu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2523-1089","authenticated-orcid":false,"given":"Mingchuan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Qingtao","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Ruoshui","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Kang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1007\/s10618-015-0439-5"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/HMI.2016.7449167"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1023\/A:1024988512476"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1177\/1550147717701436"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1007\/978-3-642-15880-3_13"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/ICEngTechnol.2014.7016801"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1016\/j.knosys.2012.06.003"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1016\/j.jnca.2015.12.004"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.2202\/1544-6115.1441"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1007\/978-3-662-48558-3_38"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1007\/978-3-319-39555-5_12"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1016\/j.future.2018.01.028"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/MCOM.2018.1700876"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1111\/coin.12045"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1093\/bib\/bbt074"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1016\/j.dss.2015.05.002"},{"key":"ref3","first-page":"1271","article-title":"$\\text{A}^{3srC}$\n: Autonomic assessment approach to IOT security risk based on multidimensional normal cloud","volume":"16","author":"zheng","year":"2015","journal-title":"J Internet Technol"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/TWC.2017.2707084"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1007\/s11036-017-0839-4"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1016\/j.patcog.2016.03.008"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/TMC.2017.2687931"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1007\/s11227-016-1945-y"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/ECTICon.2016.7561437"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/PDCAT.2016.032"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/3152397"},{"key":"ref20","first-page":"376","article-title":"A user behavior anomaly detection approach based on sequence mining over data streams","author":"zhou","year":"2017","journal-title":"Proc Int Conf Parallel Distrib Comput Appl Technol (PDCAT)"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1007\/s12652-015-0341-4"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/JIOT.2017.2768073"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/ISCISC.2016.7736447"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/IRI.2017.44"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/978-3-319-41920-6_2","article-title":"A spectral clustering based outlier detection technique","author":"wang","year":"2016","journal-title":"Proc 12th Int Conf Mach Learn Data Mining Pattern Recognit (MLDM)"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1016\/j.infsof.2009.08.005"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8274985\/08502082.pdf?arnumber=8502082","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T20:27:12Z","timestamp":1643228832000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8502082\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/access.2018.2877423","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2018]]}}}