{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T05:33:10Z","timestamp":1736573590157,"version":"3.32.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T00:00:00Z","timestamp":1726790400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T00:00:00Z","timestamp":1726790400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100015974","name":"State Grid Henan Electric Power Company","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100015974","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,20]]},"DOI":"10.1109\/icbase63199.2024.10762544","type":"proceedings-article","created":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T18:45:22Z","timestamp":1732646722000},"page":"749-755","source":"Crossref","is-referenced-by-count":0,"title":["Abnormal User Behavior Detection in Energy Big Data Platform Based on Digital Portrait"],"prefix":"10.1109","author":[{"given":"Hongkun","family":"Bai","sequence":"first","affiliation":[{"name":"State Grid Henan Economic Research Institute,Zhengzhou,China"}]},{"given":"Qiuyan","family":"Li","sequence":"additional","affiliation":[{"name":"State Grid Henan Economic Research Institute,Zhengzhou,China"}]},{"given":"Yibo","family":"Jia","sequence":"additional","affiliation":[{"name":"State Grid Henan Economic Research Institute,Zhengzhou,China"}]},{"given":"Feifei","family":"Bu","sequence":"additional","affiliation":[{"name":"State Grid Henan Economic Research Institute,Zhengzhou,China"}]},{"given":"Junli","family":"Guo","sequence":"additional","affiliation":[{"name":"Zhengzhou University,School of Cyber Science and Engineering,Zhengzhou,China"}]}],"member":"263","reference":[{"issue":"3","key":"ref1","first-page":"15","article-title":"Function system and application scenario design of energy big data application center[J]","volume":"48","author":"Yuanyuan","year":"2020"},{"issue":"06","key":"ref2","first-page":"1","article-title":"Review on the Research of Insider Threat of Cyber Physical Power System[J]","volume":"16","author":"Qingqing","year":"2022","journal-title":"Southen Power System Technology"},{"issue":"03","key":"ref3","first-page":"488","article-title":"Survey on insider threat detection method[J]","volume":"37","author":"Shize","year":"2022","journal-title":"Journal of Data Acquisition and Processing"},{"issue":"2","key":"ref4","first-page":"413","article-title":"Toxic behavior detection based on hierarchical undersampling and Bi-GRU network[J]","volume":"43","author":"Ya","year":"2022","journal-title":"Computer Engineering and Design"},{"issue":"2","key":"ref5","first-page":"198","article-title":"Log anomaly detection method based on parallel GRU classification model[J]","volume":"46","author":"Jianguo","year":"2022","journal-title":"Journal of Nanjing University of Science and Technology"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1016\/j.eswa.2019.05.043"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.3389\/fenrg.2021.742993"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.3389\/fenrg.2022.872028"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.3390\/ijerph19074347"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1016\/j.techfore.2022.122103"},{"issue":"12","key":"ref11","first-page":"141","article-title":"Study on user behavior profiling in insider threat detection[J]","volume":"39","author":"Yuanbo","year":"2018","journal-title":"Journal on Communications"},{"issue":"7","key":"ref12","first-page":"18","article-title":"anomaly detection model based on user portrait[J]","volume":"2017","author":"Gang","journal-title":"Netinfo Security"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1016\/j.eswa.2019.05.043"},{"year":"2019","article-title":"Standardization administration-Information security technology-Baseline for classified protection of cybersecurity: gb\/t 22239-2019[s]","key":"ref15"},{"issue":"3","key":"ref16","first-page":"47","article-title":"Research on portrait method of residential users based on multi-dimensional fine-grained behavior data[J]","volume":"21","author":"Tao","year":"2019","journal-title":"Power Demand Side Management"},{"issue":"14","key":"ref17","first-page":"66","article-title":"Parallel implementation method of firewall log anomaly detection based on [J]","volume":"29","author":"Cheng","year":"2023","journal-title":"Modern Computer"},{"issue":"03","key":"ref18","first-page":"84","article-title":"Method for Detecting Abnormal Network Traffic Based on Random Forest Algorithm[J]","volume":"39","author":"Xiang-mei","year":"2022","journal-title":"Journal of Sanming University"},{"issue":"0 2","key":"ref19","first-page":"1","article-title":"comparative analysis of several anomaly detection algorithms for power data","volume":"9","author":"Jialing","year":"2023"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/icdm14818.2008"}],"event":{"name":"2024 5th International Conference on Big Data &amp; Artificial Intelligence &amp; Software Engineering (ICBASE)","start":{"date-parts":[[2024,9,20]]},"location":"Wenzhou, China","end":{"date-parts":[[2024,9,22]]}},"container-title":["2024 5th International Conference on Big Data &amp;amp; Artificial Intelligence &amp;amp; Software Engineering (ICBASE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10761118\/10761986\/10762544.pdf?arnumber=10762544","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T19:49:56Z","timestamp":1736538596000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10762544\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,20]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icbase63199.2024.10762544","relation":{},"subject":[],"published":{"date-parts":[[2024,9,20]]}}}