{"id":"https://openalex.org/W4402941205","doi":"https://doi.org/10.1007/s11416-024-00538-w","title":"The editorial for special issue \u201cRussian Research in Artificial Intelligence for Cybersecurity\u201d of Journal of Computer Virology and Hacking Techniques (JICV) highlights the studies of Russian researchers in the field of artificial intelligence to ensure cybersecurity","display_name":"The editorial for special issue \u201cRussian Research in Artificial Intelligence for Cybersecurity\u201d of Journal of Computer Virology and Hacking Techniques (JICV) highlights the studies of Russian researchers in the field of artificial intelligence to ensure cybersecurity","publication_year":2024,"publication_date":"2024-09-27","ids":{"openalex":"https://openalex.org/W4402941205","doi":"https://doi.org/10.1007/s11416-024-00538-w"},"language":"en","primary_location":{"id":"doi:10.1007/s11416-024-00538-w","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s11416-024-00538-w","pdf_url":"https://link.springer.com/content/pdf/10.1007/s11416-024-00538-w.pdf","source":{"id":"https://openalex.org/S2764922190","display_name":"Journal of Computer Virology and Hacking Techniques","issn_l":"2263-8733","issn":["2263-8733"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Virology and Hacking Techniques","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://link.springer.com/content/pdf/10.1007/s11416-024-00538-w.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011030952","display_name":"Ekaterina Pleshakova","orcid":"https://orcid.org/0000-0003-3836-0258"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Ekaterina Pleshakova","raw_affiliation_strings":["Moscow, Russia"],"affiliations":[{"raw_affiliation_string":"Moscow, Russia","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044531125","display_name":"\u0410.\u041c. \u041a\u043e\u0440\u0435\u043d\u0435\u0432\u0430","orcid":"https://orcid.org/0000-0002-3186-0471"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Alisa Koreneva","raw_affiliation_strings":["Moscow, Russia"],"affiliations":[{"raw_affiliation_string":"Moscow, Russia","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5011030952"],"corresponding_institution_ids":[],"apc_list":{"value":2390,"currency":"EUR","value_usd":2990},"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.30941392,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"20","issue":"3","first_page":"347","last_page":"348"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T14258","display_name":"Legal and Policy Issues","score":0.7694000005722046,"subfield":{"id":"https://openalex.org/subfields/3308","display_name":"Law"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T14258","display_name":"Legal and Policy Issues","score":0.7694000005722046,"subfield":{"id":"https://openalex.org/subfields/3308","display_name":"Law"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T14282","display_name":"Security, Politics, and Digital Transformation","score":0.7412999868392944,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13747","display_name":"Sociopolitical Dynamics in Russia","score":0.7166000008583069,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.7421741485595703},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.664278507232666},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.5836156606674194},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.38276559114456177},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37411296367645264}],"concepts":[{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.7421741485595703},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.664278507232666},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.5836156606674194},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.38276559114456177},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37411296367645264},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s11416-024-00538-w","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s11416-024-00538-w","pdf_url":"https://link.springer.com/content/pdf/10.1007/s11416-024-00538-w.pdf","source":{"id":"https://openalex.org/S2764922190","display_name":"Journal of Computer Virology and Hacking Techniques","issn_l":"2263-8733","issn":["2263-8733"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Virology and Hacking Techniques","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1007/s11416-024-00538-w","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s11416-024-00538-w","pdf_url":"https://link.springer.com/content/pdf/10.1007/s11416-024-00538-w.pdf","source":{"id":"https://openalex.org/S2764922190","display_name":"Journal of Computer Virology and Hacking Techniques","issn_l":"2263-8733","issn":["2263-8733"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Virology and Hacking Techniques","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4402941205.pdf","grobid_xml":"https://content.openalex.org/works/W4402941205.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2921504876","https://openalex.org/W2725637128","https://openalex.org/W2897593657","https://openalex.org/W3006507989","https://openalex.org/W2294330327","https://openalex.org/W4251184983","https://openalex.org/W2371430952","https://openalex.org/W2381740503"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2026-03-10T14:07:55.174380","created_date":"2025-10-10T00:00:00"}
