{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:17:55Z","timestamp":1763468275574,"version":"3.28.0"},"reference-count":7,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/ictc.2015.7354798","type":"proceedings-article","created":{"date-parts":[[2015,12,17]],"date-time":"2015-12-17T16:56:00Z","timestamp":1450371360000},"page":"1288-1293","source":"Crossref","is-referenced-by-count":7,"title":["A system for detection of abnormal behavior in BYOD based on web usage patterns"],"prefix":"10.1109","author":[{"given":"Taeeun","family":"Kim","sequence":"first","affiliation":[]},{"given":"Hwankuk","family":"Kim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC.2013.80"},{"key":"ref3","article-title":"Security Requirements of a Mobile Device Management System","volume":"6","author":"rhee","year":"2012","journal-title":"International Journal of Security and its Applications"},{"key":"ref6","article-title":"A Formal Policy Oriented Access Control Model for Secure Enterprise Network Environment","volume":"3","author":"singh","year":"2009","journal-title":"International Journal of Security and its Applications"},{"key":"ref5","first-page":"232","article-title":"Formal Specification of Common Criteria Based Access Control Policy Model","volume":"10","author":"manpreet","year":"2010","journal-title":"International Journal of Network Security"},{"key":"ref7","article-title":"Security Requirements of a Mobile Device Management System","volume":"6","author":"rhee","year":"2012","journal-title":"International Journal of Security and its Applications"},{"key":"ref2","first-page":"232","article-title":"Formal Specification of Common Criteria Based Access Control Policy Model","volume":"10","author":"manpreet","year":"2010","journal-title":"International Journal of Network Security"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2012.93"}],"event":{"name":"2015 International Conference on Information and Communication Technology Convergence (ICTC)","start":{"date-parts":[[2015,10,28]]},"location":"Jeju Island, South Korea","end":{"date-parts":[[2015,10,30]]}},"container-title":["2015 International Conference on Information and Communication Technology Convergence (ICTC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7337634\/7354472\/07354798.pdf?arnumber=7354798","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T21:13:45Z","timestamp":1490390025000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7354798\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":7,"URL":"https:\/\/doi.org\/10.1109\/ictc.2015.7354798","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}