{"id":"https://openalex.org/W4406892404","doi":"https://doi.org/10.1109/csnet64211.2024.10851773","title":"An Autonomic Chess Bot Detection &amp; Defeat System","display_name":"An Autonomic Chess Bot Detection &amp; Defeat System","publication_year":2024,"publication_date":"2024-12-04","ids":{"openalex":"https://openalex.org/W4406892404","doi":"https://doi.org/10.1109/csnet64211.2024.10851773"},"language":"en","primary_location":{"id":"doi:10.1109/csnet64211.2024.10851773","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csnet64211.2024.10851773","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 8th Cyber Security in Networking Conference (CSNet)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5116057013","display_name":"Andrew Bengtson","orcid":null},"institutions":[{"id":"https://openalex.org/I2802946424","display_name":"Johns Hopkins University Applied Physics Laboratory","ror":"https://ror.org/029pp9z10","country_code":"US","type":"facility","lineage":["https://openalex.org/I145311948","https://openalex.org/I2802946424"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Andrew Bengtson","raw_affiliation_strings":["Johns Hopkins University Applied Physics Laboratory &#x0026; JHU, Whiting School of Engineering"],"affiliations":[{"raw_affiliation_string":"Johns Hopkins University Applied Physics Laboratory &#x0026; JHU, Whiting School of Engineering","institution_ids":["https://openalex.org/I2802946424"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024816208","display_name":"Christopher Rouff","orcid":"https://orcid.org/0000-0002-8975-3898"},"institutions":[{"id":"https://openalex.org/I145311948","display_name":"Johns Hopkins University","ror":"https://ror.org/00za53h95","country_code":"US","type":"education","lineage":["https://openalex.org/I145311948"]},{"id":"https://openalex.org/I4210156583","display_name":"Laboratoire d'Informatique de Paris-Nord","ror":"https://ror.org/05g1zjw44","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I4210091279","https://openalex.org/I4210156583","https://openalex.org/I4210159245"]}],"countries":["FR","US"],"is_corresponding":false,"raw_author_name":"Christopher Rouff","raw_affiliation_strings":["Johns Hopkins University, Whiting School of Engineering,Computer Science Department"],"affiliations":[{"raw_affiliation_string":"Johns Hopkins University, Whiting School of Engineering,Computer Science Department","institution_ids":["https://openalex.org/I145311948","https://openalex.org/I4210156583"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001402484","display_name":"Ali Tekeoglu","orcid":"https://orcid.org/0000-0001-7638-0941"},"institutions":[{"id":"https://openalex.org/I145311948","display_name":"Johns Hopkins University","ror":"https://ror.org/00za53h95","country_code":"US","type":"education","lineage":["https://openalex.org/I145311948"]},{"id":"https://openalex.org/I114662689","display_name":"Leidos (United States)","ror":"https://ror.org/012cvds63","country_code":"US","type":"company","lineage":["https://openalex.org/I114662689"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ali Tekeoglu","raw_affiliation_strings":["Leidos Innovations Center &#x0026; Johns Hopkins University, Whiting School of Engineering"],"affiliations":[{"raw_affiliation_string":"Leidos Innovations Center &#x0026; Johns Hopkins University, Whiting School of Engineering","institution_ids":["https://openalex.org/I114662689","https://openalex.org/I145311948"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5116057013"],"corresponding_institution_ids":["https://openalex.org/I2802946424"],"apc_list":null,"apc_paid":null,"fwci":0.5499,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.69158496,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"222","last_page":"227"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11439","display_name":"Video Analysis and Summarization","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11439","display_name":"Video Analysis and Summarization","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9854000210762024,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.972000002861023,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5787118673324585},{"id":"https://openalex.org/keywords/autonomic-nervous-system","display_name":"Autonomic nervous system","score":0.456748366355896},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.36048203706741333},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.20576199889183044},{"id":"https://openalex.org/keywords/internal-medicine","display_name":"Internal medicine","score":0.17744547128677368},{"id":"https://openalex.org/keywords/blood-pressure","display_name":"Blood pressure","score":0.12848645448684692},{"id":"https://openalex.org/keywords/heart-rate","display_name":"Heart rate","score":0.1191895604133606}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5787118673324585},{"id":"https://openalex.org/C2777372248","wikidata":"https://www.wikidata.org/wiki/Q171064","display_name":"Autonomic nervous system","level":4,"score":0.456748366355896},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.36048203706741333},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.20576199889183044},{"id":"https://openalex.org/C126322002","wikidata":"https://www.wikidata.org/wiki/Q11180","display_name":"Internal medicine","level":1,"score":0.17744547128677368},{"id":"https://openalex.org/C84393581","wikidata":"https://www.wikidata.org/wiki/Q82642","display_name":"Blood pressure","level":2,"score":0.12848645448684692},{"id":"https://openalex.org/C2777953023","wikidata":"https://www.wikidata.org/wiki/Q1073121","display_name":"Heart rate","level":3,"score":0.1191895604133606}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csnet64211.2024.10851773","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csnet64211.2024.10851773","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 8th Cyber Security in Networking Conference (CSNet)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W1492847715","https://openalex.org/W1526852605","https://openalex.org/W1990911977","https://openalex.org/W2121276816","https://openalex.org/W4211215980","https://openalex.org/W4220848859","https://openalex.org/W6678632314"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Due":[0],"to":[1,49,51,65,120],"the":[2,7,99,103,115],"rise":[3],"of":[4,10,102],"online":[5],"chess,":[6],"increasing":[8],"dominance":[9],"automated":[11],"chess":[12,19],"bots,":[13],"and":[14,46],"high-profile":[15],"cheating":[16],"allegations":[17],"in":[18,27,36,80,118],"recently,":[20],"there":[21],"has":[22,57],"been":[23],"a":[24,77,94],"growing":[25],"interest":[26],"applying":[28],"bot":[29,82],"detection":[30,68,83],"for":[31,93],"chess.":[32],"The":[33],"existing":[34],"methods":[35,62],"this":[37,122],"field":[38],"primarily":[39],"rely":[40],"on":[41,87,98],"player":[42,90],"history,":[43],"anomaly":[44],"detection,":[45],"engine":[47,53],"analysis":[48,61],"attempt":[50],"identify":[52],"play":[54],"after":[55],"it":[56],"occurred.":[58],"These":[59],"post-facto":[60],"generalize":[63],"poorly":[64],"real-time":[66,72],"autonomy":[67],"domains":[69],"such":[70],"as":[71],"cybersecurity.":[73],"This":[74,105],"paper":[75,106],"suggests":[76],"new":[78],"challenge":[79],"which":[81,112],"must":[84],"be":[85],"done":[86],"an":[88,109],"opposing":[89],"mid-game,":[91],"allowing":[92],"dynamic":[95],"strategy":[96],"based":[97],"identification":[100],"made":[101],"opponent.":[104],"then":[107],"suggest":[108],"autonomic":[110],"system":[111],"could":[113],"use":[114],"self-chop":[116],"properties":[117],"order":[119],"meet":[121],"challenge.":[123]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
