{"id":"https://openalex.org/W2320964920","doi":"https://doi.org/10.1002/sec.1381","title":"Security analysis of online digital goods business based on stochastic game net model","display_name":"Security analysis of online digital goods business based on stochastic game net model","publication_year":2015,"publication_date":"2015-12-09","ids":{"openalex":"https://openalex.org/W2320964920","doi":"https://doi.org/10.1002/sec.1381","mag":"2320964920"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1002/sec.1381","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0122","issn":["1939-0122","1939-0114"],"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113909012","display_name":"Junjie Lv","orcid":null},"institutions":[{"id":"https://openalex.org/I179026463","display_name":"Beijing Technology and Business University","ror":"https://ror.org/013e0zm98","country_code":"CN","type":"funder","lineage":["https://openalex.org/I179026463"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junjie Lv","raw_affiliation_strings":["Business School Beijing Technology and Business University Beijing China"],"affiliations":[{"raw_affiliation_string":"Business School Beijing Technology and Business University Beijing China","institution_ids":["https://openalex.org/I179026463"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101462636","display_name":"Chen Zhao","orcid":"https://orcid.org/0000-0001-7672-146X"},"institutions":[{"id":"https://openalex.org/I179026463","display_name":"Beijing Technology and Business University","ror":"https://ror.org/013e0zm98","country_code":"CN","type":"funder","lineage":["https://openalex.org/I179026463"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chen Zhao","raw_affiliation_strings":["Business School Beijing Technology and Business University Beijing China"],"affiliations":[{"raw_affiliation_string":"Business School Beijing Technology and Business University Beijing China","institution_ids":["https://openalex.org/I179026463"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":null,"fwci":2.701,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":4,"citation_normalized_percentile":{"value":0.806863,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":79,"max":80},"biblio":{"volume":"9","issue":"7","first_page":"587","last_page":"598"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9856,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9856,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9785,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9715,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-goods","display_name":"Digital goods","score":0.54868484},{"id":"https://openalex.org/keywords/mode","display_name":"Mode (computer interface)","score":0.46598262}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.82649744},{"id":"https://openalex.org/C2775906015","wikidata":"https://www.wikidata.org/wiki/Q1224899","display_name":"Digital goods","level":2,"score":0.54868484},{"id":"https://openalex.org/C4216890","wikidata":"https://www.wikidata.org/wiki/Q815823","display_name":"Business model","level":2,"score":0.5421939},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.5231256},{"id":"https://openalex.org/C48677424","wikidata":"https://www.wikidata.org/wiki/Q6888088","display_name":"Mode (computer interface)","level":2,"score":0.46598262},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40396678},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.15624276},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.13624167},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.13002661},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.096762836},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1002/sec.1381","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0122","issn":["1939-0122","1939-0114"],"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.43}],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61173008"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61303244"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61402022"},{"funder":"https://openalex.org/F4320334978","funder_display_name":"Beijing Nova Program","award_id":"Z121101002512063"}],"datasets":[],"versions":[],"referenced_works_count":19,"referenced_works":["https://openalex.org/W1517441327","https://openalex.org/W1639353385","https://openalex.org/W1763216878","https://openalex.org/W1964439345","https://openalex.org/W1984696425","https://openalex.org/W2006748449","https://openalex.org/W2039362345","https://openalex.org/W2043188574","https://openalex.org/W2062757535","https://openalex.org/W2064348065","https://openalex.org/W2067064328","https://openalex.org/W2081433663","https://openalex.org/W2108849030","https://openalex.org/W2134647533","https://openalex.org/W2137140618","https://openalex.org/W2158953581","https://openalex.org/W2159096137","https://openalex.org/W2171233306","https://openalex.org/W2544473506"],"related_works":["https://openalex.org/W3214445118","https://openalex.org/W3146829242","https://openalex.org/W3127139357","https://openalex.org/W2806948274","https://openalex.org/W2603393818","https://openalex.org/W2538131842","https://openalex.org/W2367714496","https://openalex.org/W2351190957","https://openalex.org/W2194897473","https://openalex.org/W138768472"],"abstract_inverted_index":{"Abstract":[0],"Digital":[1],"goods":[2,41,61,87,115],"business":[3,42,62,88,116,127],"as":[4],"a":[5,27],"new":[6,16],"mode":[7],"of":[8,20,59,70,122],"e\u2010commerce":[9],"develops":[10],"distinct":[11],"features":[12],"while":[13],"it":[14],"faces":[15],"threats.":[17],"The":[18,102,120],"aim":[19],"this":[21],"paper":[22],"is":[23,44,64,90],"to":[24,36,46,66,76],"show":[25,125],"how":[26],"stochastic":[28],"game":[29],"nets":[30],"(SGN)":[31],"framework":[32],"can":[33,129,142],"be":[34,130,143],"used":[35,91],"model":[37,105],"and":[38,75,95,137],"analyze":[39],"digital":[40,60,86,114],"that":[43,126],"subject":[45],"various":[47],"attacks.":[48],"We":[49],"illustrate":[50],"our":[51],"work":[52],"in":[53,72,85,113],"the":[54,73,78,82,123,138],"following":[55],"steps.":[56],"A":[57],"scenario":[58,89],"security":[63,128],"built":[65],"identify":[67],"action":[68],"procedures":[69],"participants":[71],"scene":[74],"investigate":[77],"risk":[79,134],"factors.":[80],"Next,":[81],"interactive":[83],"processes":[84],"for":[92,110],"designing,":[93],"establishing,":[94],"simulating":[96],"an":[97,107],"extensible":[98],"graphically":[99],"SGN":[100,104],"model.":[101],"developed":[103],"provides":[106],"efficient":[108],"environment":[109],"defining":[111],"uncertainties":[112],"with":[117],"proposed":[118],"indicators.":[119],"findings":[121],"study":[124],"improved":[131],"by":[132],"using":[133],"management":[135],"actions,":[136],"overall":[139],"system":[140],"costs":[141],"reduced.":[144],"Copyright":[145],"\u00a9":[146],"2015":[147],"John":[148],"Wiley":[149],"&":[150],"Sons,":[151],"Ltd.":[152]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2320964920","counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2017,"cited_by_count":3}],"updated_date":"2025-04-24T05:34:25.129053","created_date":"2016-06-24"}