{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T18:40:40Z","timestamp":1654108840368},"reference-count":0,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,4,1]]},"abstract":"<p>As the development of mobile internet bring convenient for people, the openness and variety of services make its security issues more complicated than those of traditional network. Firewall and intrusion detection focuses on external aggression, and cannot prevent revealing of internal information. As supplementary, security audit technology can monitor internal users' activity, forbid abnormal behavior of internal users. The author introduces related works about mobile internet security audit, comb through matured products on the market, and analyze current security status and architecture of mobile internet security. Based on the research results of traditional network security audit, the author provides a functional framework and universal model of mobile internet security auditing, as well as introduce an application scenario.<\/p>","DOI":"10.4018\/ijitn.2016040102","type":"journal-article","created":{"date-parts":[[2016,7,19]],"date-time":"2016-07-19T11:13:28Z","timestamp":1468926808000},"page":"12-20","source":"Crossref","is-referenced-by-count":0,"title":["Research on System Structure of Mobile Internet Security Audit"],"prefix":"10.4018","volume":"8","author":[{"given":"Xia-Meng","family":"Si","sequence":"first","affiliation":[{"name":"School of Software Engineering, Beijing University of Posts and Telecommunications. Beijing, China"}]}],"member":"2432","container-title":["International Journal of Interdisciplinary Telecommunications and Networking"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=160063","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T18:06:54Z","timestamp":1654106814000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJITN.2016040102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2016,4,1]]},"references-count":0,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijitn.2016040102","relation":{},"ISSN":["1941-8663","1941-8671"],"issn-type":[{"value":"1941-8663","type":"print"},{"value":"1941-8671","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4,1]]}}}