{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T08:38:33Z","timestamp":1777624713970,"version":"3.51.4"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,4,15]]},"DOI":"10.1109\/syscon48628.2021.9447115","type":"proceedings-article","created":{"date-parts":[[2021,6,9]],"date-time":"2021-06-09T21:20:08Z","timestamp":1623273608000},"page":"1-8","source":"Crossref","is-referenced-by-count":13,"title":["Incorporating Behavior in Attribute Based Access Control Model Using Machine Learning"],"prefix":"10.1109","author":[{"given":"Majid","family":"Afshar","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Saeed","family":"Samet","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hamid","family":"Usefi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1409240.1409243"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1232722.1232726"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1963192.1963276"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1008992.1009048"},{"key":"ref14","article-title":"A study of mobile search queries in japan","author":"baeza-yates","year":"2007","journal-title":"Proceedings of the International World Wide Web Conference"},{"key":"ref15","first-page":"327","article-title":"Identifying user behavior by analyzing web server access log file","volume":"9","author":"suneetha","year":"2009","journal-title":"IJCSNS International Journal of Computer Science and Network Security"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN49398.2020.9209707"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20161-5_68"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1108\/EL-01-2016-0004"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232894"},{"key":"ref4","year":"2017","journal-title":"Data exfiltration study Actors tactics and detection"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s10651-007-0043-y"},{"key":"ref3","article-title":"Guide to attribute based access control (abac) definition and considerations (draft)","volume":"800","author":"hu","year":"2013","journal-title":"NIST Special Publication"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.02.005"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1136\/amiajnl-2011-000217"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766910"},{"key":"ref7","author":"bigus","year":"2012","journal-title":"Modeling user access to computer resources"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2003.1206966"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICEE.2010.349"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/507711.507722"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1059981.1059982"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2970501"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2017.8125845"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom-CPSCom.2010.60"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2012-0454"},{"key":"ref26","author":"dheeru","year":"2017","journal-title":"UCI Machine Learning Repository"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"12020","DOI":"10.1088\/1742-6596\/933\/1\/012020","article-title":"An attribute based access control framework for healthcare system","volume":"933","author":"afshar","year":"2017","journal-title":"Journal of Physics Conference Series"}],"event":{"name":"2021 IEEE International Systems Conference (SysCon)","location":"Vancouver, BC, Canada","start":{"date-parts":[[2021,4,15]]},"end":{"date-parts":[[2021,5,15]]}},"container-title":["2021 IEEE International Systems Conference (SysCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9447020\/9447051\/09447115.pdf?arnumber=9447115","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:42:21Z","timestamp":1652197341000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9447115\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,15]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/syscon48628.2021.9447115","relation":{},"subject":[],"published":{"date-parts":[[2021,4,15]]}}}