{"id":"https://openalex.org/W4403446666","doi":"https://doi.org/10.1109/acit62333.2024.10712505","title":"A Method of Detecting Anomalies in IP Phone Traffic based on Ontology of Voip Messages","display_name":"A Method of Detecting Anomalies in IP Phone Traffic based on Ontology of Voip Messages","publication_year":2024,"publication_date":"2024-09-19","ids":{"openalex":"https://openalex.org/W4403446666","doi":"https://doi.org/10.1109/acit62333.2024.10712505"},"language":"en","primary_location":{"id":"doi:10.1109/acit62333.2024.10712505","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit62333.2024.10712505","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 14th International Conference on Advanced Computer Information Technologies (ACIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101743756","display_name":"Andriy Melnyk","orcid":"https://orcid.org/0000-0001-7799-9877"},"institutions":[{"id":"https://openalex.org/I160977438","display_name":"West Ukrainian National University","ror":"https://ror.org/047988g19","country_code":"UA","type":"education","lineage":["https://openalex.org/I160977438"]}],"countries":["UA"],"is_corresponding":true,"raw_author_name":"Andriy Melnyk","raw_affiliation_strings":["Ukrainian National University,Department of Computer Science West,Ternopil,Ukraine"],"affiliations":[{"raw_affiliation_string":"Ukrainian National University,Department of Computer Science West,Ternopil,Ukraine","institution_ids":["https://openalex.org/I160977438"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045605427","display_name":"Ruslan Shevchuk","orcid":"https://orcid.org/0000-0001-5381-9528"},"institutions":[{"id":"https://openalex.org/I160977438","display_name":"West Ukrainian National University","ror":"https://ror.org/047988g19","country_code":"UA","type":"education","lineage":["https://openalex.org/I160977438"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Ruslan Shevchuk","raw_affiliation_strings":["Ukrainian National University,Department of Computer Science West,Ternopil,Ukraine"],"affiliations":[{"raw_affiliation_string":"Ukrainian National University,Department of Computer Science West,Ternopil,Ukraine","institution_ids":["https://openalex.org/I160977438"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031652899","display_name":"Ihor Romanets","orcid":"https://orcid.org/0000-0002-7061-6527"},"institutions":[{"id":"https://openalex.org/I160977438","display_name":"West Ukrainian National University","ror":"https://ror.org/047988g19","country_code":"UA","type":"education","lineage":["https://openalex.org/I160977438"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Ihor Romanets","raw_affiliation_strings":["Ukrainian National University,Department of Cyber Security West,Ternopil,Ukraine"],"affiliations":[{"raw_affiliation_string":"Ukrainian National University,Department of Cyber Security West,Ternopil,Ukraine","institution_ids":["https://openalex.org/I160977438"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110731390","display_name":"Ihor Yakymenko","orcid":null},"institutions":[{"id":"https://openalex.org/I160977438","display_name":"West Ukrainian National University","ror":"https://ror.org/047988g19","country_code":"UA","type":"education","lineage":["https://openalex.org/I160977438"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Ihor Yakymenko","raw_affiliation_strings":["Ukrainian National University,Department of Computer Science West,Ternopil,Ukraine"],"affiliations":[{"raw_affiliation_string":"Ukrainian National University,Department of Computer Science West,Ternopil,Ukraine","institution_ids":["https://openalex.org/I160977438"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037420951","display_name":"Serhiy Voznyak","orcid":null},"institutions":[{"id":"https://openalex.org/I160977438","display_name":"West Ukrainian National University","ror":"https://ror.org/047988g19","country_code":"UA","type":"education","lineage":["https://openalex.org/I160977438"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Serhiy Voznyak","raw_affiliation_strings":["Ukrainian National University,Department of Cyber Security West,Ternopil,Ukraine"],"affiliations":[{"raw_affiliation_string":"Ukrainian National University,Department of Cyber Security West,Ternopil,Ukraine","institution_ids":["https://openalex.org/I160977438"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5114286019","display_name":"Vasyl Luchyk","orcid":null},"institutions":[{"id":"https://openalex.org/I4210120219","display_name":"Kharkiv National University of Internal Affairs","ror":"https://ror.org/02pkshz09","country_code":"UA","type":"education","lineage":["https://openalex.org/I4210120219"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Vasyl Luchyk","raw_affiliation_strings":["Kharkiv National University of Internal Affairs,Department of Cybercrime Counteraction,Kharkiv,Ukraine"],"affiliations":[{"raw_affiliation_string":"Kharkiv National University of Internal Affairs,Department of Cybercrime Counteraction,Kharkiv,Ukraine","institution_ids":["https://openalex.org/I4210120219"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101743756"],"corresponding_institution_ids":["https://openalex.org/I160977438"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.19846154,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":null,"first_page":"485","last_page":"489"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9904000163078308,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9904000163078308,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9182999730110168,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14470","display_name":"Advanced Data Processing Techniques","score":0.9046000242233276,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/voice-over-ip","display_name":"Voice over IP","score":0.9075936675071716},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7272651195526123},{"id":"https://openalex.org/keywords/phone","display_name":"Phone","score":0.5621375441551208},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5484541058540344},{"id":"https://openalex.org/keywords/ontology","display_name":"Ontology","score":0.510010838508606},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3362465500831604},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.23771950602531433},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.19078600406646729}],"concepts":[{"id":"https://openalex.org/C171246234","wikidata":"https://www.wikidata.org/wiki/Q81945","display_name":"Voice over IP","level":3,"score":0.9075936675071716},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7272651195526123},{"id":"https://openalex.org/C2778707766","wikidata":"https://www.wikidata.org/wiki/Q202064","display_name":"Phone","level":2,"score":0.5621375441551208},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5484541058540344},{"id":"https://openalex.org/C25810664","wikidata":"https://www.wikidata.org/wiki/Q44325","display_name":"Ontology","level":2,"score":0.510010838508606},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3362465500831604},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.23771950602531433},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.19078600406646729},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/acit62333.2024.10712505","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit62333.2024.10712505","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 14th International Conference on Advanced Computer Information Technologies (ACIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1946102884","https://openalex.org/W1977172269","https://openalex.org/W2032778106","https://openalex.org/W2095953397","https://openalex.org/W2138221155","https://openalex.org/W2580000344","https://openalex.org/W2613092987","https://openalex.org/W2793685934","https://openalex.org/W2797328866","https://openalex.org/W2963341071","https://openalex.org/W3048576163","https://openalex.org/W3089028909","https://openalex.org/W3090047425","https://openalex.org/W3090170701","https://openalex.org/W3180418185","https://openalex.org/W3202006703","https://openalex.org/W4213245394","https://openalex.org/W4243552704","https://openalex.org/W4286217670","https://openalex.org/W4304814785","https://openalex.org/W4306766256","https://openalex.org/W4311153855","https://openalex.org/W4361224004","https://openalex.org/W6631943919","https://openalex.org/W6783610666","https://openalex.org/W6852891625"],"related_works":["https://openalex.org/W2084179496","https://openalex.org/W2103238357","https://openalex.org/W2741704743","https://openalex.org/W2262810789","https://openalex.org/W4386040921","https://openalex.org/W2749819919","https://openalex.org/W2993764333","https://openalex.org/W2977917096","https://openalex.org/W2914904360","https://openalex.org/W1550211622"],"abstract_inverted_index":{"The":[0,92],"increased":[1],"use":[2],"of":[3,18,44,56,111,121],"VoIP":[4,21,75,105],"technology":[5],"heightens":[6],"the":[7,16,25,42,54,112,119,131],"potential":[8],"threats":[9],"to":[10,41],"ordinary":[11],"users.":[12],"This":[13],"study":[14],"examines":[15],"peculiarities":[17],"implementing":[19],"corporate":[20,136],"telephony":[22,77,100,138],"systems,":[23,33],"identifies":[24],"main":[26,82],"problems":[27],"in":[28,74,98,118,134],"protecting":[29],"information":[30],"within":[31],"such":[32],"and":[34,49,59,66,87],"suggests":[35],"solutions.":[36],"Special":[37],"attention":[38],"is":[39,79],"given":[40],"development":[43],"methods":[45],"for":[46,62,71,95,125],"speech":[47],"analysis":[48],"natural":[50],"language":[51],"processing,":[52],"enabling":[53],"creation":[55],"more":[57],"accurate":[58],"effective":[60],"systems":[61,78],"detecting":[63,96,126],"anomalous":[64,127],"traffic":[65,101],"potentially":[67],"hazardous":[68],"communications.An":[69],"ontology":[70],"describing":[72],"messages":[73,106,128],"IP":[76,99,137],"proposed,":[80],"formalizing":[81],"concepts":[83],"as":[84],"separate":[85],"entities":[86],"detailing":[88],"connections":[89],"between":[90],"them.":[91],"suggested":[93],"method":[94],"anomalies":[97],"relies":[102],"on":[103,130],"grouping":[104],"through":[107],"context-frequency":[108],"analysis.Experimental":[109],"studies":[110],"proposed":[113],"approaches":[114],"were":[115],"conducted,":[116],"resulting":[117],"implementation":[120],"a":[122],"software":[123],"subsystem":[124],"based":[129],"ontological":[132],"approach":[133],"current":[135],"systems.":[139]},"counts_by_year":[],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
