{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T07:40:15Z","timestamp":1735630815382,"version":"3.32.0"},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,8,16]],"date-time":"2024-08-16T00:00:00Z","timestamp":1723766400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,8,16]],"date-time":"2024-08-16T00:00:00Z","timestamp":1723766400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,8,16]]},"DOI":"10.1109\/icait62580.2024.10807894","type":"proceedings-article","created":{"date-parts":[[2024,12,30]],"date-time":"2024-12-30T19:19:13Z","timestamp":1735586353000},"page":"238-243","source":"Crossref","is-referenced-by-count":0,"title":["A Method for Modeling Normal User Behavior Based on Security Risk Audit Elements"],"prefix":"10.1109","author":[{"given":"Yuke","family":"Wang","sequence":"first","affiliation":[{"name":"The 30th Research Institute of China Electronics Technology Group Corporation,Chengdu,China"}]},{"given":"Guishan","family":"Dong","sequence":"additional","affiliation":[{"name":"The 30th Research Institute of China Electronics Technology Group Corporation,Chengdu,China"}]},{"given":"Jian","family":"Bai","sequence":"additional","affiliation":[{"name":"The 30th Research Institute of China Electronics Technology Group Corporation,Chengdu,China"}]},{"given":"Sha","family":"Deng","sequence":"additional","affiliation":[{"name":"The 30th Research Institute of China Electronics Technology Group Corporation,Chengdu,China"}]},{"given":"Dong","family":"Tang","sequence":"additional","affiliation":[{"name":"The 30th Research Institute of China Electronics Technology Group Corporation,Chengdu,China"}]},{"given":"Shigang","family":"Liu","sequence":"additional","affiliation":[{"name":"The 30th Research Institute of China Electronics Technology Group Corporation,Chengdu,China"}]}],"member":"263","reference":[{"issue":"8","key":"ref1","first-page":"51","article-title":"Research on data security governance architecture and technology[J]","volume":"47","author":"Xiaowei","year":"2021","journal-title":"Information and Communications Technology and Policy"},{"issue":"06","key":"ref2","first-page":"61","article-title":"Exploration of Database Security Audit Protection System for Large State-owned Banks","author":"Gao","year":"2023","journal-title":"China Financial Computer"},{"issue":"8","key":"ref3","first-page":"138","article-title":"Database security audit system based on bypass monitoring[J]","volume":"51","author":"Lei","year":"2015","journal-title":"Computer Engineering and Applications"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICISCE.2016.55"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICPICS50287.2020.9202122"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCS57501.2023.10151001"},{"key":"ref7","article-title":"Research on Database Intrusion Detection System Based on User Behavior Analysis and Recognition","author":"Dapeng","year":"2015","journal-title":"Diss. University of Electronic Science and Technology of China"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IAAI54625.2021.9699973"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICEI.2018.00055"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2694428.2694435"},{"issue":"4","key":"ref11","first-page":"24","article-title":"Application of data analysis of internet of vehicles based on data dimension reduction and clustering[J]","volume":"47","author":"L C","year":"2022","journal-title":"Automotive Applied Technology"},{"issue":"02","key":"ref12","first-page":"53","article-title":"Research on the analysis of internal user entity behavior in enterprises based on big data[J]","volume":"25","author":"Jiameng","year":"2023","journal-title":"China New Telecommunications"}],"event":{"name":"2024 IEEE 16th International Conference on Advanced Infocomm Technology (ICAIT)","start":{"date-parts":[[2024,8,16]]},"location":"Enshi, China","end":{"date-parts":[[2024,8,19]]}},"container-title":["2024 IEEE 16th International Conference on Advanced Infocomm Technology (ICAIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10807850\/10807809\/10807894.pdf?arnumber=10807894","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T06:45:14Z","timestamp":1735627514000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10807894\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,16]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icait62580.2024.10807894","relation":{},"subject":[],"published":{"date-parts":[[2024,8,16]]}}}