{"id":"https://openalex.org/W2956698276","doi":"https://doi.org/10.1109/access.2019.2928359","title":"A Deception Model Robust to Eavesdropping Over Communication for Social Network Systems","display_name":"A Deception Model Robust to Eavesdropping Over Communication for Social Network Systems","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2956698276","doi":"https://doi.org/10.1109/access.2019.2928359","mag":"2956698276"},"language":"en","primary_location":{"id":"doi:10.1109/access.2019.2928359","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2928359","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08760227.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08760227.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034530048","display_name":"Abiodun Esther Omolara","orcid":"https://orcid.org/0000-0002-7801-2541"},"institutions":[{"id":"https://openalex.org/I139322472","display_name":"Universiti Sains Malaysia","ror":"https://ror.org/02rgb2k63","country_code":"MY","type":"education","lineage":["https://openalex.org/I139322472"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Abiodun Esther Omolara","raw_affiliation_strings":["Security and Forensic Research Group (SFRG) Laboratory, School of Computer Sciences, Universiti Sains Malaysia, Penang, Malaysia"],"affiliations":[{"raw_affiliation_string":"Security and Forensic Research Group (SFRG) Laboratory, School of Computer Sciences, Universiti Sains Malaysia, Penang, Malaysia","institution_ids":["https://openalex.org/I139322472"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069838011","display_name":"Aman Jantan","orcid":"https://orcid.org/0000-0001-9899-2287"},"institutions":[{"id":"https://openalex.org/I139322472","display_name":"Universiti Sains Malaysia","ror":"https://ror.org/02rgb2k63","country_code":"MY","type":"education","lineage":["https://openalex.org/I139322472"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Aman Jantan","raw_affiliation_strings":["Security and Forensic Research Group (SFRG) Laboratory, School of Computer Sciences, Universiti Sains Malaysia, Penang, Malaysia"],"affiliations":[{"raw_affiliation_string":"Security and Forensic Research Group (SFRG) Laboratory, School of Computer Sciences, Universiti Sains Malaysia, Penang, Malaysia","institution_ids":["https://openalex.org/I139322472"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050410057","display_name":"Oludare Isaac Abiodun","orcid":"https://orcid.org/0000-0003-0138-6446"},"institutions":[{"id":"https://openalex.org/I201292520","display_name":"Bingham University","ror":"https://ror.org/04dbvvk55","country_code":"NG","type":"education","lineage":["https://openalex.org/I201292520"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"Oludare Isaac Abiodun","raw_affiliation_strings":["Department of Computer Science, Bingham University, Karu, Nigeria"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Bingham University, Karu, Nigeria","institution_ids":["https://openalex.org/I201292520"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080462989","display_name":"Kemi Victoria Dada","orcid":null},"institutions":[{"id":"https://openalex.org/I12789410","display_name":"Ahmadu Bello University","ror":"https://ror.org/019apvn83","country_code":"NG","type":"education","lineage":["https://openalex.org/I12789410"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"Kemi Victoria Dada","raw_affiliation_strings":["Department of Statistics, Ahmadu Bello University, Zaria, Nigeria"],"affiliations":[{"raw_affiliation_string":"Department of Statistics, Ahmadu Bello University, Zaria, Nigeria","institution_ids":["https://openalex.org/I12789410"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069240487","display_name":"Humaira Arshad","orcid":"https://orcid.org/0000-0003-3615-6202"},"institutions":[{"id":"https://openalex.org/I139322472","display_name":"Universiti Sains Malaysia","ror":"https://ror.org/02rgb2k63","country_code":"MY","type":"education","lineage":["https://openalex.org/I139322472"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Humaira Arshad","raw_affiliation_strings":["Security and Forensic Research Group (SFRG) Laboratory, School of Computer Sciences, Universiti Sains Malaysia, Penang, Malaysia"],"affiliations":[{"raw_affiliation_string":"Security and Forensic Research Group (SFRG) Laboratory, School of Computer Sciences, Universiti Sains Malaysia, Penang, Malaysia","institution_ids":["https://openalex.org/I139322472"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011652921","display_name":"Emmanuel Etuh","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Etuh Emmanuel","raw_affiliation_strings":["Department of Mathematics, Arthur Jarvis University, Calabar, Nigeria"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics, Arthur Jarvis University, Calabar, Nigeria","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5034530048"],"corresponding_institution_ids":["https://openalex.org/I139322472"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":3.0803,"has_fulltext":true,"cited_by_count":33,"citation_normalized_percentile":{"value":0.93370842,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"7","issue":null,"first_page":"100881","last_page":"100898"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.9250813722610474},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8450604677200317},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7948621511459351},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7368093132972717},{"id":"https://openalex.org/keywords/deception","display_name":"Deception","score":0.6165810227394104},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5879802703857422},{"id":"https://openalex.org/keywords/brute-force-attack","display_name":"Brute-force attack","score":0.48307302594184875},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.43014079332351685}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.9250813722610474},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8450604677200317},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7948621511459351},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7368093132972717},{"id":"https://openalex.org/C2779267917","wikidata":"https://www.wikidata.org/wiki/Q170028","display_name":"Deception","level":2,"score":0.6165810227394104},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5879802703857422},{"id":"https://openalex.org/C207468940","wikidata":"https://www.wikidata.org/wiki/Q869370","display_name":"Brute-force attack","level":3,"score":0.48307302594184875},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.43014079332351685},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2019.2928359","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2928359","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08760227.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:61b65d73f6264523b56f9daef1f3e0c0","is_oa":true,"landing_page_url":"https://doaj.org/article/61b65d73f6264523b56f9daef1f3e0c0","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 7, Pp 100881-100898 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2019.2928359","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2928359","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08760227.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7400000095367432,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2956698276.pdf","grobid_xml":"https://content.openalex.org/works/W2956698276.grobid-xml"},"referenced_works_count":60,"referenced_works":["https://openalex.org/W806478328","https://openalex.org/W1227551255","https://openalex.org/W1513904472","https://openalex.org/W1514887517","https://openalex.org/W1515595447","https://openalex.org/W1536598138","https://openalex.org/W1597582388","https://openalex.org/W1635919617","https://openalex.org/W1892454167","https://openalex.org/W2003043151","https://openalex.org/W2024592335","https://openalex.org/W2060783077","https://openalex.org/W2062293785","https://openalex.org/W2067549008","https://openalex.org/W2109394932","https://openalex.org/W2113430699","https://openalex.org/W2137147061","https://openalex.org/W2158139315","https://openalex.org/W2165294844","https://openalex.org/W2210387432","https://openalex.org/W2298330307","https://openalex.org/W2339450381","https://openalex.org/W2346187586","https://openalex.org/W2397711991","https://openalex.org/W2512094779","https://openalex.org/W2523738226","https://openalex.org/W2536059635","https://openalex.org/W2537286916","https://openalex.org/W2564435712","https://openalex.org/W2574703428","https://openalex.org/W2588619326","https://openalex.org/W2591863697","https://openalex.org/W2599557761","https://openalex.org/W2611805067","https://openalex.org/W2739686193","https://openalex.org/W2746495499","https://openalex.org/W2749131622","https://openalex.org/W2765635162","https://openalex.org/W2769315475","https://openalex.org/W2770560304","https://openalex.org/W2794071249","https://openalex.org/W2884962025","https://openalex.org/W2898087484","https://openalex.org/W2903044004","https://openalex.org/W2905177337","https://openalex.org/W2915063521","https://openalex.org/W2920687899","https://openalex.org/W2932459076","https://openalex.org/W3030363341","https://openalex.org/W4241366606","https://openalex.org/W4249961056","https://openalex.org/W4250739989","https://openalex.org/W4298107213","https://openalex.org/W6622787157","https://openalex.org/W6683557909","https://openalex.org/W6732185759","https://openalex.org/W6734071730","https://openalex.org/W6737447290","https://openalex.org/W6741906516","https://openalex.org/W6746073460"],"related_works":["https://openalex.org/W4387918499","https://openalex.org/W2772112465","https://openalex.org/W4386360526","https://openalex.org/W2368710903","https://openalex.org/W2158905603","https://openalex.org/W2766105476","https://openalex.org/W2735171729","https://openalex.org/W2769254131","https://openalex.org/W2091556092","https://openalex.org/W2729714903"],"abstract_inverted_index":{"Communication":[0],"security":[1],"deals":[2],"with":[3,115,126,175,215],"attributes":[4],"such":[5],"as":[6,82,219,252],"confidentiality,":[7],"integrity,":[8],"and":[9,51,76,108,193,204,213,230,249,259],"availability.":[10],"The":[11,68,238],"current":[12,172],"strategies":[13],"used":[14],"to":[15,53,145,153,169],"achieve":[16],"covertness":[17],"of":[18,70,96,157,165,222,232],"communication":[19],"employs":[20],"encryption.":[21],"Encryption":[22],"techniques":[23],"minimize":[24],"eavesdropping":[25,258],"on":[26,93,263],"the":[27,30,35,55,66,71,74,78,94,97,127,131,151,155,158,163,171,181,216,227,233,242],"conversation":[28],"between":[29],"conversing":[31],"parties":[32],"by":[33,63,189],"transforming":[34],"message":[36,79,103,188],"into":[37],"an":[38,111,253],"unreadable":[39],"form.":[40],"However,":[41],"it":[42],"does":[43,123],"not":[44,124],"prevent":[45],"or":[46,62],"discourage":[47],"eavesdroppers":[48],"from":[49,89,185,201],"stealing":[50,186],"attempting":[52],"decrypt":[54],"encrypted":[56,140,187,264],"messages":[57],"using":[58],"a":[59,86,102,116,146,176,220],"brute-force":[60,147,261],"attack":[61,262],"randomly":[64],"guessing":[65],"key.":[67],"probability":[69],"eavesdropper":[72,152,182],"acquiring":[73],"key":[75,88,118],"recovering":[77],"is":[80,100,168,183],"high":[81],"he/she":[83],"can":[84],"distinguish":[85],"correct":[87],"incorrect":[90],"keys":[91],"based":[92],"output":[95],"decryption.":[98],"This":[99],"because":[101],"has":[104],"some":[105],"structure-texts,":[106],"pictures,":[107],"videos.":[109],"Thus,":[110,149],"attempt":[112],"at":[113],"decrypting":[114],"wrong":[117],"yields":[119],"random":[120],"gibberish":[121],"that":[122,138,241],"comply":[125],"expected":[128],"structure.":[129],"Furthermore,":[130],"consistent":[132],"increase":[133],"in":[134],"computational":[135],"power":[136],"implies":[137],"stolen":[139],"data":[141],"may":[142],"gradually":[143],"debilitate":[144],"attack.":[148],"causing":[150],"learn":[154],"content":[156],"message.":[159],"To":[160],"this":[161,166],"end,":[162],"objective":[164],"research":[167],"reinforce":[170],"encryption":[173,247],"measures":[174],"decoy-based":[177],"deception":[178],"model":[179,197,218,235,244],"where":[180],"discouraged":[184],"confounding":[190],"his":[191],"resources":[192],"time.":[194],"Our":[195],"proposed":[196,217,234,243],"leverages":[198],"its":[199],"foundation":[200],"decoys,":[202],"deception,":[203],"artificial":[205],"intelligence.":[206],"An":[207],"instant":[208],"messaging":[209],"application":[210],"was":[211],"developed":[212],"integrated":[214],"proof":[221],"concept.":[223],"Further":[224],"details":[225],"regarding":[226],"design,":[228],"analysis,":[229],"implementation":[231],"are":[236],"substantiated.":[237],"result":[239],"shows":[240],"reinforces":[245],"state-of-the-art":[246],"schemes":[248],"will":[250],"serve":[251],"effective":[254],"component":[255],"for":[256],"discouraging":[257],"curtailing":[260],"messages.":[265]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
