{"id":"https://openalex.org/W4391889578","doi":"https://doi.org/10.1109/comsnets59351.2024.10427503","title":"Selection of Machine Learning Methods for Keylogger Detection Based on Network Activity","display_name":"Selection of Machine Learning Methods for Keylogger Detection Based on Network Activity","publication_year":2024,"publication_date":"2024-01-03","ids":{"openalex":"https://openalex.org/W4391889578","doi":"https://doi.org/10.1109/comsnets59351.2024.10427503"},"language":"en","primary_location":{"id":"doi:10.1109/comsnets59351.2024.10427503","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comsnets59351.2024.10427503","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 16th International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089591173","display_name":"Dmitry Levshun","orcid":"https://orcid.org/0000-0003-1898-6624"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Dmitry Levshun","raw_affiliation_strings":["SPC RAS,Laboratory of Computer Security Problems,St. Petersburg,Russia","Laboratory of Computer Security Problems, SPC RAS, St. Petersburg, Russia"],"raw_orcid":"https://orcid.org/0000-0003-1898-6624","affiliations":[{"raw_affiliation_string":"SPC RAS,Laboratory of Computer Security Problems,St. Petersburg,Russia","institution_ids":[]},{"raw_affiliation_string":"Laboratory of Computer Security Problems, SPC RAS, St. Petersburg, Russia","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014369213","display_name":"Diana Levshun","orcid":"https://orcid.org/0000-0002-5266-8649"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Diana Levshun","raw_affiliation_strings":["SPC RAS,Laboratory of Computer Security Problems,St. Petersburg,Russia","Laboratory of Computer Security Problems, SPC RAS, St. Petersburg, Russia"],"raw_orcid":"https://orcid.org/0000-0002-5266-8649","affiliations":[{"raw_affiliation_string":"SPC RAS,Laboratory of Computer Security Problems,St. Petersburg,Russia","institution_ids":[]},{"raw_affiliation_string":"Laboratory of Computer Security Problems, SPC RAS, St. Petersburg, Russia","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5089591173"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.6728,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.67558215,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"19","last_page":"24"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.745984673500061},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.7099828720092773},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.583810567855835},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5071446895599365}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.745984673500061},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.7099828720092773},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.583810567855835},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5071446895599365}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/comsnets59351.2024.10427503","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comsnets59351.2024.10427503","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 16th International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2767354816","https://openalex.org/W2799758613","https://openalex.org/W2891815839","https://openalex.org/W2928477808","https://openalex.org/W2964022491","https://openalex.org/W2981152860","https://openalex.org/W3026882057","https://openalex.org/W3041102382","https://openalex.org/W3122864121","https://openalex.org/W4313644131","https://openalex.org/W4319083919","https://openalex.org/W4328010969","https://openalex.org/W4365788250","https://openalex.org/W4366180244","https://openalex.org/W4383747489","https://openalex.org/W4386763789","https://openalex.org/W4388857841","https://openalex.org/W6750729320"],"related_works":["https://openalex.org/W2961085424","https://openalex.org/W4306674287","https://openalex.org/W3046775127","https://openalex.org/W3107602296","https://openalex.org/W4394896187","https://openalex.org/W3170094116","https://openalex.org/W4386462264","https://openalex.org/W4364306694","https://openalex.org/W4312192474","https://openalex.org/W4283697347"],"abstract_inverted_index":{"A":[0],"keylogger":[1,117],"is":[2,37],"a":[3,11,57,121],"technology":[4],"that":[5,63],"secretly":[6],"tracks":[7],"user":[8],"input":[9],"into":[10],"system.":[12],"Attackers":[13],"use":[14],"it":[15,65],"to":[16,52,67,112],"steal":[17],"personal":[18],"information":[19,45],"and":[20,25,30,84,94,106],"credentials,":[21],"such":[22],"as":[23],"logins":[24],"passwords":[26],"on":[27,56],"banking":[28],"websites":[29],"electronic":[31],"payment":[32],"systems.":[33],"Therefore,":[34],"detecting":[35,53],"keyloggers":[36,54],"one":[38],"of":[39,59,88],"the":[40,80,85,89,114],"priority":[41],"tasks":[42],"for":[43,92],"ensuring":[44],"security.":[46],"This":[47,109],"paper":[48],"presents":[49],"an":[50],"approach":[51],"based":[55],"set":[58],"artificial":[60],"intelligence":[61],"methods":[62],"make":[64],"possible":[66],"identify":[68],"implicit":[69],"patterns.":[70],"We":[71,96],"are":[72],"also":[73],"experimentally":[74],"evaluating":[75],"machine":[76],"learning":[77],"models":[78,119],"using":[79],"same":[81,86],"software,":[82],"hardware":[83],"subsets":[87],"Keylogger":[90],"dataset":[91],"training":[93],"testing.":[95],"compare":[97],"ten":[98],"intelligent":[99],"models,":[100],"including":[101],"gradient":[102],"boosting,":[103],"decision":[104],"trees,":[105],"k-nearest":[107],"neighbors.":[108],"allows":[110],"us":[111],"determine":[113],"most":[115],"suitable":[116],"detection":[118],"in":[120],"single":[122],"environment.":[123]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
