{“id”:“https://openalex.org/W2534166438“,”doi“:”https://doi.org/10.1109/sccc.2010.36“,”title“:“构建安全系统:从威胁到安全模式”,”display_name“:”Building Secure Systems:From Threats to Security Patterns“,”publication_year“:2010,”publiation_date“:”2010-11-01“,”ids“:{”openalex“:”https://openalex.org/W2534166438“,”doi“:”https://doi.org/10.1109/sccc.2010.36“,”mag“:”2534166438“},”language“:”en“,”primary_location“:{”is_oa“:false,”landing_page_url“:”https://doi.org/10.1109/sccc.2010.36“,”pdf_url“:null,”source“:null,”license“:null,”license_id“:null,”version“:null,”is_accepted“:false,”is_published“:false},”type“:”article“,”type_crossref“:”proceedings article“,”indexed_in“:[”crossref“],”open_access“:{”is_oa“:false,”oa_status“:”closed“,”oa_url“:null,”any_repository_has_fulltext“:false},”authorships“:[{”author_position“:“第一个”,“作者“:{”id“:”https://openalex.org/A5078871025“,”display_name“:”Eduardo B.Fern\u00e1ndez“,”orcid“:”https://orcid.org/0000-0002-5109-4591},“机构”:[{“id”:https://openalex.org/I63772739“,”display_name“:”佛罗里达大西洋大学“,”ror“:”https://ror.org/05p8w6387“,”country_code“:”US“,”type“:“教育”,”世系“:[”https://openalex.org/I63772739“]}],”国家“:[”美国“],”is_corresponding“:false,”raw_author_name“:”Eduardo B.Fernandez“,”raw _ afiliation_strings“:[“美国佛罗里达州博卡拉顿佛罗里达大西洋大学计算机科学与工程系”],”affiliations“:[{”raw _affiliation_strong“:”美国佛罗里达州博卡拉顿佛罗里达大西洋大学计算机科学与工程系“,“institution_ids”:[“https://openalex.org/I63772739“]}]},{”author_position“:”last“,”author“:{”id“:”https://openalex.org/A5085991264“,”display_name“:”Sergio Mujica“,”orcid“:null},”institutions“:[{”id“:”https://openalex.org/I13897259“,”display_name“:”安德烈大学\u00e9s Bello“,”ror“:”https://ror.org/01qq57711“,”country_code“:”CL“,”type“:“教育”,”世系“:[”https://openalex.org/I13897259“]}],”国家“:[”CL“],”is_corresponding“:false,”raw_author_name“:”Sergio Mujica“,”raw _affiliation_strings“:[“Escuela de Inform\u00e1tica,Universidad Andr\u00e 9s Bello,Santiago,Chile”],“affiliations”:[{“raw_affilition_string”:“Escuella de Inform\ u00e1 tica,Universidad Android\u00e9s Bello,Santiaog,Chiel”,“institution_ids”:[“https://openalex.org/I13897259“]}]}],”institution_assertions“:[],”countries_distiction_count“:2,”institutions_disticent_count”:2,“corresponding_author_ids”:[]、“corresconding_institution_ids“:[].”apc_list“:null,”apc_payed“:null,”fwci“:0.355,”has_fulltext“:true,”fulltext_origin“:”ngrams“,”cited_by_count 57281,“is_in_top_1_percent“:false,”is_in_top_10_percennt“:false},”cited_by_percentile_year“:{”min“:78,”max“:79},“biblio”:{“volume”:null,“issue”:null:null,”first_page“:nullhttps://openalex.org/T11241“,”display_name“:”Android恶意软件的特征描述和检测“,”score“:0.9993,”subfield“:{”id“:”https://openalex.org/subfields/1711“,”display_name“:”信号处理“},”字段“:{”id“:”https://openalex.org/fields/17“,”display_name“:”Computer Science“},”domain“:{”id“:”https://openalex.org/domains/3“,”display_name“:”物理科学“}},”主题“:[{”id“:”https://openalex.org/T11241“,”display_name“:”Android恶意软件的特征描述和检测“,”score“:0.9993,”subfield“:{”id“:”https://openalex.org/subfields/1711“,”display_name“:”信号处理“},”字段“:{”id“:”https://openalex.org/fields/17“,”display_name“:”Computer Science“},”domain“:{”id“:”https://openalex.org/domains/3“,”display_name“:”物理科学“}},{”id“:”https://openalex.org/T10734“,”“display_name”:“信息安全策略合规性和意识”,“score”:0.9987,“subfield”:{“id”:“https://openalex.org/subfields/1710“,”display_name“:”Information Systems“},”field“:{”id“:”https://openalex.org/fields/17“,”display_name“:”Computer Science“},”domain“:{”id“:”https://openalex.org/domains/3“,”display_name“:”物理科学“}},{”id“:”https://openalex.org/T12034“,”display_name“:”数字取证研究与挑战“,”score“:0.9972,”subfield“:{”id“:”https://openalex.org/subfields/1710“,”display_name“:”Information Systems“},”field“:{”id“:”https://openalex.org/fields/17“,”display_name“:”Computer Science“},”domain“:{”id“:”https://openalex.org/domains/3“,”display_name“:”物理科学“}}],”关键词“:[{”id“:”https://openalex.org/keywords/security-analysis网站“,”display_name“:”安全分析“,”score“:0.522892},{”id“:”https://openalex.org/keywords/security“,”display_name“:”Security“,”score“:0.503764},{”id“:”https://openalex.org/keywords/security-through-obsecurity“,”“display_name”:“通过模糊实现安全性”,“score”:0.44792414}],“concepts”:[{“id”:“https://openalex.org/C41008148,“wikidata”:https://www.wikidata.org/wiki/Q21198“,”display_name“:”计算机科学“,”level“:0,”score“:0.6950143},{”id“:”https://openalex.org/C38652104,“wikidata”:https://www.wikidata.org/wiki/Q3510521“,”display_name“:”计算机安全“,”level“:1,”score“:0.65558776},{”id“:”https://openalex.org/C38369872,“wikidata”:https://www.wikidata.org/wiki/Q7445009“,”display_name“:”安全分析“,”level“:2,”score“:0.54582524},{”id“:”https://openalex.org/C121822524,“wikidata”:https://www.wikidata.org/wiki/Q5157582“,”display_name“:”计算机安全模型“,”level“:2,”score“:0.48446107},{”id“:”https://openalex.org/C103377522,“wikidata”:https://www.wikidata.org/wiki/Q3493999“,”display_name“:”安全信息和事件管理“,”level“:4,”score“:0.44985497},{”id“:”https://openalex.org/C114869243,“wikidata”:https://www.wikidata.org/wiki/Q133735“,”“display_name”“:”“模糊安全”“,”级别“:5,”分数“:0.44792414},{”id“:”https://openalex.org/C184842701,“wikidata”:https://www.wikidata.org/wiki/Q370563“,”display_name“:”云计算安全“,”level“:3,”score“:0.40325862},{”id“:”https://openalex.org/C79974875,“wikidata”:https://www.wikidata.org/wiki/Q483639“,”display_name“:”云计算“,”level“:2,”score“:0.08125284},{”id“:”https://openalex.org/C111919701,“wikidata”:https://www.wikidata.org/wiki/Q9135“,”display_name“:”操作系统“,”level“:1,”score“:0.05483955}],”mesh“:[],”locations_count“:1.”locations“:[{”is_oa“:false,”landing_page_url“:”https://doi.org/10.1109/sccc.2010.36“,”pdf_url“:null,”source“:null,”license“:null:”license_id“:null,”version“:number,”is_accepted“:false,”is_published“:false}],”best_oa_location“:nul,”sustainable_development_goals“:[],”grants“:[],”datasets“:],”versions“:[]:”,“referenced_works_count”:15,“referrenced_works”:[”https://openalex.org/W1512453887","https://openalex.org/W1514888816","https://openalex.org/W1569144507","https://openalex.org/W1595029147","https://openalex.org/W1604658196网址","https://openalex.org/W1971320885","https://openalex.org/W1985185742","https://openalex.org/W2062599271","https://openalex.org/W2084510361","https://openalex.org/W2132695268","https://openalex.org/W2158145963","https://openalex.org/W2474274012","https://openalex.org/W2502940379","https://openalex.org/W2728230640","https://openalex.org/W4285719527“],”related_works“:[”https://openalex.org/W88610236","https://openalex.org/W833563683","https://openalex.org/W2418642600","https://openalex.org/W2372674753","https://openalex.org/W2353811196","https://openalex.org/W2353177111","https://openalex.org/W2336014427","https://openalex.org/W2290724697","https://openalex.org/W2165898552","https://openalex.org/W2030343105“],”abstract_inverted_index“:{”We“:[0,19],”present“:[1],”an“:[2],”approach“:[3,32],”using“:[4],”two“:[5],”dimensions“:[6],”to“:[7],”propagate“:[8],”security“:[9,37],”restrictions:“:[10],”allow“:[11,15],”the“:[12,16,36,40],”lifecycle“:[13],”and“:[14],“architecture”:[17],“等级”:[18],“相信”:[20],“那”:[21],“这”:[22],“加倍”:[23],“传播“:[24],”可以“:[25,33],”是“:[26],”非常“:[27],”有效“:[28],”用于“:[29],”安全。“:[30],”此“:[31],”也“:[34],”便利“:[35],”分析“:[38],”的“:[39],”系统。“:[41]},”cited_by_api_url“:”https://api.openalex.org/works?filter=引用:W25344166438“,”counts_by_year“:[{“年份”:2021,”cited_by_count“:1},{“年”:2020,”ciped_by_cunt“:1\n,{”年份“:2015,”cited_by_counts“:1{,”年“:2012,”citted_by_count”:1}],”updated_date“:”2024-09-18T03:11:25.732395“,”created_dates“:”2016-10-28“}”