{"id":"https://openalex.org/W3033662891","doi":"https://doi.org/10.18280/isi.250208","title":"An Emergency Management System for Government Data Security Based on Artificial Intelligence","display_name":"An Emergency Management System for Government Data Security Based on Artificial Intelligence","publication_year":2020,"publication_date":"2020-05-15","ids":{"openalex":"https://openalex.org/W3033662891","doi":"https://doi.org/10.18280/isi.250208","mag":"3033662891"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.18280/isi.250208","pdf_url":"https://www.iieta.org/download/file/fid/32512","source":{"id":"https://openalex.org/S1757003","display_name":"Ing\u00e9nierie des syst\u00e8mes d information","issn_l":"1633-1311","issn":["1633-1311","2116-7125"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310311056","host_organization_name":"Lavoisier publishing","host_organization_lineage":["https://openalex.org/P4310311056"],"host_organization_lineage_names":["Lavoisier publishing"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://www.iieta.org/download/file/fid/32512","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053787944","display_name":"Haining Luo","orcid":"https://orcid.org/0009-0001-6292-5979"},"institutions":[],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haining Luo","raw_affiliation_strings":["State Information Center, Beijing 100045, China"],"affiliations":[{"raw_affiliation_string":"State Information Center, Beijing 100045, China","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":0,"corresponding_author_ids":["https://openalex.org/A5053787944"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.638,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":6,"citation_normalized_percentile":{"value":0.757564,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":81,"max":82},"biblio":{"volume":"25","issue":"2","first_page":"207","last_page":"213"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9394,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9394,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.5325714},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.42839032},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.41426674},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4141869},{"id":"https://openalex.org/C110354214","wikidata":"https://www.wikidata.org/wiki/Q6314146","display_name":"Engineering management","level":1,"score":0.3859079},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3676538},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2765348},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.18280/isi.250208","pdf_url":"https://www.iieta.org/download/file/fid/32512","source":{"id":"https://openalex.org/S1757003","display_name":"Ing\u00e9nierie des syst\u00e8mes d information","issn_l":"1633-1311","issn":["1633-1311","2116-7125"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310311056","host_organization_name":"Lavoisier publishing","host_organization_lineage":["https://openalex.org/P4310311056"],"host_organization_lineage_names":["Lavoisier publishing"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.18280/isi.250208","pdf_url":"https://www.iieta.org/download/file/fid/32512","source":{"id":"https://openalex.org/S1757003","display_name":"Ing\u00e9nierie des syst\u00e8mes d information","issn_l":"1633-1311","issn":["1633-1311","2116-7125"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310311056","host_organization_name":"Lavoisier publishing","host_organization_lineage":["https://openalex.org/P4310311056"],"host_organization_lineage_names":["Lavoisier publishing"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":21,"referenced_works":["https://openalex.org/W1512235915","https://openalex.org/W1972020554","https://openalex.org/W2002347650","https://openalex.org/W2004156648","https://openalex.org/W2031489836","https://openalex.org/W2036144257","https://openalex.org/W2040299065","https://openalex.org/W2067461601","https://openalex.org/W2082758646","https://openalex.org/W2141774578","https://openalex.org/W2313545748","https://openalex.org/W2327910946","https://openalex.org/W2400390729","https://openalex.org/W2564626915","https://openalex.org/W2572839999","https://openalex.org/W2582467255","https://openalex.org/W2590527746","https://openalex.org/W2605362632","https://openalex.org/W2898108725","https://openalex.org/W2940786172","https://openalex.org/W4288076474"],"related_works":["https://openalex.org/W4376623224","https://openalex.org/W4306742369","https://openalex.org/W4303457083","https://openalex.org/W3136979370","https://openalex.org/W2951359407","https://openalex.org/W2772917594","https://openalex.org/W2748952813","https://openalex.org/W2124566234","https://openalex.org/W2058170566","https://openalex.org/W2036807459"],"abstract_inverted_index":{"This":[0],"paper":[1],"designs":[2],"a":[3,17],"novel":[4,18],"emergency":[5,76,102],"management":[6,77,103],"system":[7,78,115],"for":[8,81,135],"government":[9,23,43,53,82,111],"data":[10,24,44,46,54,83],"security":[11,41,55,68],"based":[12,28,70],"on":[13,29,45],"artificial":[14,58],"intelligence":[15],"(AI).Firstly,":[16],"concept":[19],"was":[20,79],"put":[21],"forward":[22],"resilience":[25],"chain":[26],"(GDRC)":[27],"the":[30,40,98,106,113,137],"AI":[31,34],"technology.Next,":[32],"several":[33],"techniques":[35],"were":[36],"designed":[37],"to":[38],"ensure":[39],"of":[42,89,92,110,123,126,140],"sharing":[47,107],"and":[48,62,66,85,108,120],"exchange":[49,109],"platforms,":[50],"including":[51],"intelligent":[52],"monitoring":[56],"technology,":[57,65],"neural":[59],"network":[60],"(ANN)":[61],"fuzzy":[63,71],"identification":[64],"firewall":[67],"technology":[69],"clustering.On":[72],"this":[73],"basis,":[74],"an":[75],"established":[80],"security,":[84],"verified":[86],"through":[87],"simulation":[88],"fault":[90,138],"tolerance":[91,139],"multi-agent":[93,141],"formation.The":[94],"results":[95,130],"show":[96],"that":[97],"GDRC":[99],"helps":[100],"solve":[101],"problems":[104],"in":[105],"data;":[112],"proposed":[114],"realized":[116],"deep":[117],"learning":[118],"(DL),":[119],"real-time":[121],"updates":[122],"dynamic":[124],"features":[125],"multiple":[127],"agents.The":[128],"research":[129],"provide":[131],"effective":[132],"decision":[133],"supports":[134],"improving":[136],"system.":[142]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3033662891","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2025-02-18T18:20:15.828433","created_date":"2020-06-12"}