·788· 智能系统学报 第12卷 puter Security Conference.Baltimore,Maryland,1992:554- analysis for multimodal entry control[J].Expert systems 563. with applications,2011,38(6):6696-6704 [4]MATT B,SOPHIE E,SEAN P,et al.We have met the en- [15]MICHAEL D,WEIRU L,PAUL M.Detecting anomalies emy and he is us[C]//New Security Paradigms Workshop. in graphs with numeric labels[J].ACM conference on in- Lake Tahoe,USA,2008:1-11. formation and knowledge management,2011(10): [5]JIAN Pei,HAN Jiawei,BEHZAD M,et al.PrefixSpan: 1197-1202 mining sequential patterns efficiently by prefix-projected [16]胡向东,韩恺敏,许宏如.智能家居物联网的安全性设计 pattern growth[C]//20th International Council for Open and 与验证[几.重庆邮电大学学报:自然科学版,2016,26(2): Distance Education World Conference on Open Learning 171-176. and Distance Education.Heidelberg,Germany,2001:215- HU Xiangdong,Han Kaimin,XU Hongru.Design and im- 224 plementation of security-focused intelligent household In- [6]ANTONIO L.SIMON F,ZHUNAG Yan.A logical model ternet of things[J].Journal of Chongqing university of for detecting irregular actions in physical access[C]//IEEE posts and telecommunications:natural science edition, conference on database and expert systems applications. 2016.,26(2):171-176 [S.1.1.2007:560-564 [1刀胡向东,唐飞.智能家居门禁系统的安全控制方法.重 [7]DAVIS M,LIU W,MILLER P,et al.Detecting anomalise 庆邮电大学学报:自然科学版,2016,28(6):863-869. in graphs with numeric labels[C]//ACM Conference on In- HU Xiangdong,TANG Fei.Secure control methods of formation and Knowledge Management.Glasgow,United the entrance guard system for smart home[J].Journal of Kingdom,2011:1197-1202. [8]GOKHANK,DUC L,TING X,et al.Ettu:analyzing query Chongqing university of posts and telecommunications: natural science edition,2016,28(6):863-869. intents in corporate databases[C]//Proceedings of the 25th International Conference Companion on World Wide Web. [18]王菲.数据挖掘在图书馆用户行为分析上的应用研究D] Montreal,Canada,2016:463-466 上海:上海交通大学,2013:26-49. [9]TABISH R,IOANNIS A,JASON R.A new take on detect- WANG Fei.Data mining applied in the library user behavi- ing insider threats:exploring the use of hidden markov mod- or analysis[D].Shanghai:Shanghai Jiao Tong University, els[Cl//Proceedings of the 22nd International Conference on 2013:26-49 Intelligent User Interfaces Companion.Limassol,Cyprus, [19]郑伟平,言专艺,唐晓红.电子门禁数据挖掘与应用方法 2016:47-56. [)警察技术,2015,6:47-50 [10]TED E S,DAVID A B,THOMAS G D,et al.Detecting in- ZHENG Weiping,YAN Zhuanyi,TANG Xiaohong.Ac- sider threats in a real corporate database of computer us- cess control data mining and application methods[J].Po- age activity[C]//Proceedings of the 19th ACM SIGKDD lice technology,2015,6:47-50. International Conference on Knowledge Discovery and [20]史殿习,李寒,杨若松,等.用户日常频繁行为模式挖掘 Data Mining.Chicago,USA,2013:1393-1401. [)国防科技大学学报,2017,39(1)少74-80. [1】王怀宝,郭江利.基于跟踪轨迹的徘徊行为分析).计算 SHI Dianxi,LI Han,YANG Ruosong,et al.Mining user 机与数字工程,2016.445):843-846 frequent behavior patterns in daily life[J].Journal of na- WANG Huaibao,GUO Jiangli.Wandering behavior ana- tional university of defense technology,2017,39(1): lysis based on trajectory[J].Computer and digital engineer- 74-80. ing.2016,44(5):843-846 [21]顾兆军,安一然,刘飞.基于航站楼门禁日志挖掘的物理 [12]邹一波,陈一民.基于运动标签的异常行为检测算法[J 入侵检测技术[].计算机应用与软件,2015,32(11): 计算机应用与软件,2015,5:238-240,266 317-320,324. ZOU Yibo,CHEN Yimin.Anomalous behaviors detection GU Zhaojun,AN Yiran,LIU Fei.Physical intrusion detec- algorithm based on motion label[J].Computer applications tion technology based on terminal buildings access log and software,2015,5:238-240,266. mining[J].Computer applications and software,2015, [13]HAN Jiawei,MICHELINE K,PEI Jian.Data mining con- 32(11):317-320.324. cepts and techniques[M.3版.北京:机械工业出版社: [22]陈卓,杨炳儒,宋威,等.序列模式挖掘综述.计算机应 2016:355-356. 用研究,2008,25(7):1960-1964. [14]BOSTJAN K,ERIK D,TEA T,et al.A probabilistic risk CHEN Zhuo,YANG Bingru,SONG Wei,et al.Survey ofputer Security Conference. Baltimore, Maryland, 1992: 554- 563. MATT B, SOPHIE E, SEAN P, et al. We have met the enemy and he is us[C]//New Security Paradigms Workshop. Lake Tahoe, USA, 2008: 1-11. [4] JIAN Pei, HAN Jiawei, BEHZAD M, et al. PrefixSpan: mining sequential patterns efficiently by prefix-projected pattern growth[C]//20th International Council for Open and Distance Education World Conference on Open Learning and Distance Education. Heidelberg, Germany, 2001: 215- 224. [5] ANTONIO L, SIMON F, ZHUNAG Yan. A logical model for detecting irregular actions in physical access[C]// IEEE conference on database and expert systems applications. [S.l.], 2007: 560-564. [6] DAVIS M, LIU W, MILLER P, et al. Detecting anomalise in graphs with numeric labels[C]//ACM Conference on Information and Knowledge Management. Glasgow, United Kingdom, 2011: 1197-1202. [7] GOKHAN K, DUC L, TING X, et al. Ettu: analyzing query intents in corporate databases[C]//Proceedings of the 25th International Conference Companion on World Wide Web. Montreal, Canada, 2016: 463-466. [8] TABISH R, IOANNIS A, JASON R. A new take on detecting insider threats: exploring the use of hidden markov models[C]//Proceedings of the 22nd International Conference on Intelligent User Interfaces Companion. Limassol, Cyprus, 2016: 47-56. [9] TED E S, DAVID A B, THOMAS G D, et al. Detecting insider threats in a real corporate database of computer usage activity[C]//Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Chicago, USA, 2013: 1393-1401. [10] 王怀宝, 郭江利. 基于跟踪轨迹的徘徊行为分析[J]. 计算 机与数字工程, 2016, 44(5): 843–846. WANG Huaibao, GUO Jiangli. Wandering behavior analysis based on trajectory[J]. Computer and digital engineering, 2016, 44(5): 843–846. [11] 邹一波, 陈一民. 基于运动标签的异常行为检测算法[J]. 计算机应用与软件, 2015, 5: 238–240, 266. ZOU Yibo, CHEN Yimin. Anomalous behaviors detection algorithm based on motion label[J]. Computer applications and software, 2015, 5: 238–240, 266. [12] HAN Jiawei, MICHELINE K, PEI Jian. Data mining concepts and techniques[M]. 3 版. 北京: 机械工业出版社: 2016: 355-356. [13] [14] BOSTJAN K, ERIK D, TEA T, et al. A probabilistic risk analysis for multimodal entry control[J]. Expert systems with applications, 2011, 38(6): 6696–6704. MICHAEL D, WEIRU L, PAUL M. Detecting anomalies in graphs with numeric labels[J]. ACM conference on information and knowledge management, 2011(10): 1197–1202. [15] 胡向东, 韩恺敏, 许宏如. 智能家居物联网的安全性设计 与验证[J]. 重庆邮电大学学报:自然科学版, 2016, 26(2): 171–176. HU Xiangdong, Han Kaimin, XU Hongru. Design and implementation of security-focused intelligent household Internet of things[J]. Journal of Chongqing university of posts and telecommunications: natural science edition, 2016, 26(2): 171–176. [16] 胡向东, 唐飞. 智能家居门禁系统的安全控制方法[J]. 重 庆邮电大学学报:自然科学版, 2016, 28(6): 863–869. HU Xiangdong, TANG Fei. Secure control methods of the entrance guard system for smart home[J]. Journal of Chongqing university of posts and telecommunications: natural science edition, 2016, 28(6): 863–869. [17] 王菲. 数据挖掘在图书馆用户行为分析上的应用研究[D]. 上海: 上海交通大学, 2013: 26-49. WANG Fei. Data mining applied in the library user behavior analysis[D]. Shanghai: Shanghai Jiao Tong University, 2013: 26-49. [18] 郑伟平, 言专艺, 唐晓红. 电子门禁数据挖掘与应用方法 [J]. 警察技术, 2015, 6: 47–50. ZHENG Weiping, YAN Zhuanyi, TANG Xiaohong. Access control data mining and application methods[J]. Police technology, 2015, 6: 47–50. [19] 史殿习, 李寒, 杨若松, 等. 用户日常频繁行为模式挖掘 [J]. 国防科技大学学报, 2017, 39(1): 74–80. SHI Dianxi, LI Han, YANG Ruosong, et al. Mining user frequent behavior patterns in daily life[J]. Journal of national university of defense technology, 2017, 39(1): 74–80. [20] 顾兆军, 安一然, 刘飞. 基于航站楼门禁日志挖掘的物理 入侵检测技术[J]. 计算机应用与软件, 2015, 32(11): 317–320, 324. GU Zhaojun, AN Yiran, LIU Fei. Physical intrusion detection technology based on terminal buildings access log mining[J]. Computer applications and software, 2015, 32(11): 317–320, 324. [21] 陈卓, 杨炳儒, 宋威, 等. 序列模式挖掘综述[J]. 计算机应 用研究, 2008, 25(7): 1960–1964. CHEN Zhuo, YANG Bingru, SONG Wei, et al. Survey of [22] ·788· 智 能 系 统 学 报 第 12 卷