{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T15:40:45Z","timestamp":1766504445036,"version":"3.37.3"},"reference-count":29,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"State Key Development Program of China","award":["2017YFE0111900","2018YFB0804402"],"award-info":[{"award-number":["2017YFE0111900","2018YFB0804402"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572355","U1736115","61272106","61572349"],"award-info":[{"award-number":["61572355","U1736115","61272106","61572349"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Discovery Grants Program"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1109\/tii.2019.2925422","type":"journal-article","created":{"date-parts":[[2019,6,27]],"date-time":"2019-06-27T20:17:32Z","timestamp":1561666652000},"page":"1024-1034","source":"Crossref","is-referenced-by-count":12,"title":["An Effective Evolutionary Analysis Scheme for Industrial Software Access Control Models"],"prefix":"10.1109","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2421-8704","authenticated-orcid":false,"given":"Zhuobing","family":"Han","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0752-6764","authenticated-orcid":false,"given":"Xiaohong","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8701-3944","authenticated-orcid":false,"given":"Guangquan","family":"Xu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0394-4635","authenticated-orcid":false,"given":"Naixue","family":"Xiong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1436-6076","authenticated-orcid":false,"given":"Ettore","family":"Merlo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8784-8236","authenticated-orcid":false,"given":"Eleni","family":"Stroulia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Formal Concept Analysis Mathematical Foundations","year":"2012","author":"ganter","key":"ref10"},{"key":"ref11","first-page":"5","article-title":"Familles minimales d&#x2019;implications informatives r&#x00E9;sultant d&#x2019;un tableau de donn&#x00E9;es binaires","volume":"95","author":"guigues","year":"1986","journal-title":"Math&#x00E9;matiques et Sciences Humaines"},{"key":"ref12","first-page":"127","article-title":"System of data analysis concept explorer","volume":"2000","author":"yevtushenko","year":"0","journal-title":"Proc 7th Nat Conf Artificial Intell"},{"journal-title":"Nouvelles Recherches sur la Distribution Florale","year":"1908","author":"jaccard","key":"ref13"},{"key":"ref14","first-page":"240","article-title":"Note on regression and inheritance in the case of two parents","volume":"58","author":"pearson","year":"0","journal-title":"Proc Roy Soc London"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.05.022"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/357401.357404"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070564"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70731"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1869459.1869486"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2821768"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/IV.2011.46"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2024445.2024467"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/smr.314"},{"key":"ref29","first-page":"384","article-title":"FCA based concept constructing and similarity measurement algorithms","author":"lee","year":"0","journal-title":"Proc 6th Int Conf Adv Inf Manage Service"},{"journal-title":"Common Vulnerabilities and Exposures (CVE)","year":"2017","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/smr.301"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2789219"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2011.5971962"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2016.2599841"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2841047"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2004.1342719"},{"key":"ref22","first-page":"143","article-title":"When functions change their names: Automatic detection of origin relationships","author":"kim","year":"0","journal-title":"Proc 12th Working Conf Reverse Eng"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2004.1357803"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2847447"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420956"},{"key":"ref26","first-page":"249","article-title":"Isomorphic generating of concept lattices","volume":"1","author":"shen","year":"0","journal-title":"Proc IEEE Int Conf Granular Comput"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/11528784_13"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424\/8963774\/08747428.pdf?arnumber=8747428","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T16:57:56Z","timestamp":1651078676000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8747428\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2]]},"references-count":29,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tii.2019.2925422","relation":{},"ISSN":["1551-3203","1941-0050"],"issn-type":[{"type":"print","value":"1551-3203"},{"type":"electronic","value":"1941-0050"}],"subject":[],"published":{"date-parts":[[2020,2]]}}}