{"id":"https://openalex.org/W3128013847","doi":"https://doi.org/10.1109/csit49958.2020.9321897","title":"Analysis of the attack vectors used by threat actors during the pandemic","display_name":"Analysis of the attack vectors used by threat actors during the pandemic","publication_year":2020,"publication_date":"2020-09-23","ids":{"openalex":"https://openalex.org/W3128013847","doi":"https://doi.org/10.1109/csit49958.2020.9321897","mag":"3128013847"},"language":"en","primary_location":{"id":"doi:10.1109/csit49958.2020.9321897","is_oa":true,"landing_page_url":"https://doi.org/10.1109/csit49958.2020.9321897","pdf_url":"https://ieeexplore.ieee.org/ielx7/9321836/9321872/09321897.pdf","source":{"id":"https://openalex.org/S4306498651","display_name":"2020 IEEE 15th International Conference on Computer Sciences and Information Technologies (CSIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 15th International Conference on Computer Sciences and Information Technologies (CSIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://ieeexplore.ieee.org/ielx7/9321836/9321872/09321897.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001015755","display_name":"\u0412\u0456\u0442\u0430\u043b\u0456\u0439 \u0421\u0443\u0441\u0443\u043a\u0430\u0439\u043b\u043e","orcid":"https://orcid.org/0000-0003-4431-9964"},"institutions":[{"id":"https://openalex.org/I98435010","display_name":"Lviv Polytechnic National University","ror":"https://ror.org/0542q3127","country_code":"UA","type":"education","lineage":["https://openalex.org/I98435010"]}],"countries":["UA"],"is_corresponding":true,"raw_author_name":"Vitalii Susukailo","raw_affiliation_strings":["Department of Information Security, Lviv Polytechnic National University, Lviv, Ukraine"],"affiliations":[{"raw_affiliation_string":"Department of Information Security, Lviv Polytechnic National University, Lviv, Ukraine","institution_ids":["https://openalex.org/I98435010"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007976499","display_name":"\u0406van \u041epirskyy","orcid":"https://orcid.org/0000-0002-8461-8996"},"institutions":[{"id":"https://openalex.org/I98435010","display_name":"Lviv Polytechnic National University","ror":"https://ror.org/0542q3127","country_code":"UA","type":"education","lineage":["https://openalex.org/I98435010"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Ivan Opirskyy","raw_affiliation_strings":["Department of Information Security, Lviv Polytechnic National University, Lviv, Ukraine"],"affiliations":[{"raw_affiliation_string":"Department of Information Security, Lviv Polytechnic National University, Lviv, Ukraine","institution_ids":["https://openalex.org/I98435010"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090506941","display_name":"Sviatoslav Vasylyshyn","orcid":"https://orcid.org/0000-0003-1944-2979"},"institutions":[{"id":"https://openalex.org/I98435010","display_name":"Lviv Polytechnic National University","ror":"https://ror.org/0542q3127","country_code":"UA","type":"education","lineage":["https://openalex.org/I98435010"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Sviatoslav Vasylyshyn","raw_affiliation_strings":["Department of Information Security, Lviv Polytechnic National University, Lviv, Ukraine"],"affiliations":[{"raw_affiliation_string":"Department of Information Security, Lviv Polytechnic National University, Lviv, Ukraine","institution_ids":["https://openalex.org/I98435010"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5001015755"],"corresponding_institution_ids":["https://openalex.org/I98435010"],"apc_list":null,"apc_paid":null,"fwci":2.777,"has_fulltext":true,"cited_by_count":20,"citation_normalized_percentile":{"value":0.92102759,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"261","last_page":"264"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.906499981880188,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.906499981880188,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/pandemic","display_name":"Pandemic","score":0.7213699817657471},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.549404501914978},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4941604435443878},{"id":"https://openalex.org/keywords/coronavirus-disease-2019","display_name":"Coronavirus disease 2019 (COVID-19)","score":0.3477495312690735},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.11306625604629517}],"concepts":[{"id":"https://openalex.org/C89623803","wikidata":"https://www.wikidata.org/wiki/Q12184","display_name":"Pandemic","level":5,"score":0.7213699817657471},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.549404501914978},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4941604435443878},{"id":"https://openalex.org/C3008058167","wikidata":"https://www.wikidata.org/wiki/Q84263196","display_name":"Coronavirus disease 2019 (COVID-19)","level":4,"score":0.3477495312690735},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.11306625604629517},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C2779134260","wikidata":"https://www.wikidata.org/wiki/Q12136","display_name":"Disease","level":2,"score":0.0},{"id":"https://openalex.org/C524204448","wikidata":"https://www.wikidata.org/wiki/Q788926","display_name":"Infectious disease (medical specialty)","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csit49958.2020.9321897","is_oa":true,"landing_page_url":"https://doi.org/10.1109/csit49958.2020.9321897","pdf_url":"https://ieeexplore.ieee.org/ielx7/9321836/9321872/09321897.pdf","source":{"id":"https://openalex.org/S4306498651","display_name":"2020 IEEE 15th International Conference on Computer Sciences and Information Technologies (CSIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 15th International Conference on Computer Sciences and Information Technologies (CSIT)","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1109/csit49958.2020.9321897","is_oa":true,"landing_page_url":"https://doi.org/10.1109/csit49958.2020.9321897","pdf_url":"https://ieeexplore.ieee.org/ielx7/9321836/9321872/09321897.pdf","source":{"id":"https://openalex.org/S4306498651","display_name":"2020 IEEE 15th International Conference on Computer Sciences and Information Technologies (CSIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 15th International Conference on Computer Sciences and Information Technologies (CSIT)","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.8399999737739563,"display_name":"Good health and well-being","id":"https://metadata.un.org/sdg/3"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3128013847.pdf","grobid_xml":"https://content.openalex.org/works/W3128013847.grobid-xml"},"referenced_works_count":1,"referenced_works":["https://openalex.org/W2944677183"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4205698903","https://openalex.org/W4400613637","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W3046517191"],"abstract_inverted_index":{"This":[0],"article":[1,28],"describes":[2],"attacks":[3],"methods,":[4],"vectors":[5],"and":[6,24,32,36],"technics":[7],"used":[8],"by":[9],"threat":[10,22],"actors":[11,23],"during":[12],"pandemic":[13],"situations":[14],"in":[15,38],"the":[16],"world.":[17],"Identifies":[18],"common":[19],"targets":[20],"of":[21],"cyber-attack":[25],"tactics.":[26],"The":[27],"analyzes":[29],"cybersecurity":[30,41],"challenges":[31],"specifies":[33],"possible":[34],"solutions":[35],"improvements":[37],"cybersecurity.":[39],"Defines":[40],"controls,":[42],"which":[43],"should":[44],"be":[45],"taken":[46],"against":[47],"analyzed":[48],"attack":[49],"vectors.":[50]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
