{"id":"https://openalex.org/W4385482248","doi":"https://doi.org/10.1109/ecai58194.2023.10193949","title":"Preliminary Architecture and a Pilot Implementation for a Malicious Emails Detection Solution","display_name":"Preliminary Architecture and a Pilot Implementation for a Malicious Emails Detection Solution","publication_year":2023,"publication_date":"2023-06-29","ids":{"openalex":"https://openalex.org/W4385482248","doi":"https://doi.org/10.1109/ecai58194.2023.10193949"},"language":"en","primary_location":{"id":"doi:10.1109/ecai58194.2023.10193949","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ecai58194.2023.10193949","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 15th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071210963","display_name":"Cosmina Stalidi","orcid":null},"institutions":[{"id":"https://openalex.org/I61641377","display_name":"Universitatea Na\u021bional\u0103 de \u0218tiin\u021b\u0103 \u0219i Tehnologie Politehnica Bucure\u0219ti","ror":"https://ror.org/0558j5q12","country_code":"RO","type":"education","lineage":["https://openalex.org/I61641377"]}],"countries":["RO"],"is_corresponding":true,"raw_author_name":"Cosmina Stalidi","raw_affiliation_strings":["POLITEHNICA University of Bucharest, BEIA Consult International,Faculty of Electronics, Telecommunications, and Information Technology,Telecommunications Dept., R&#x0026;D Department,Bucharest,Romania"],"affiliations":[{"raw_affiliation_string":"POLITEHNICA University of Bucharest, BEIA Consult International,Faculty of Electronics, Telecommunications, and Information Technology,Telecommunications Dept., R&#x0026;D Department,Bucharest,Romania","institution_ids":["https://openalex.org/I61641377"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020246714","display_name":"Eduard-Cristian Popovici","orcid":null},"institutions":[{"id":"https://openalex.org/I61641377","display_name":"Universitatea Na\u021bional\u0103 de \u0218tiin\u021b\u0103 \u0219i Tehnologie Politehnica Bucure\u0219ti","ror":"https://ror.org/0558j5q12","country_code":"RO","type":"education","lineage":["https://openalex.org/I61641377"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Eduard-Cristian Popovici","raw_affiliation_strings":["POLITEHNICA University of Bucharest Project Manager MICRO ART CONSULT SRL,Faculty of Electronics, Telecommunications, and Information Technology,Telecommunications Dept.,Bucharest,Romania","Telecommunications Dept., Faculty of Electronics, Telecommunications, and Information Technology, POLITEHNICA University of Bucharest Project Manager MICRO ART CONSULT SRL, Bucharest, Romania"],"affiliations":[{"raw_affiliation_string":"POLITEHNICA University of Bucharest Project Manager MICRO ART CONSULT SRL,Faculty of Electronics, Telecommunications, and Information Technology,Telecommunications Dept.,Bucharest,Romania","institution_ids":["https://openalex.org/I61641377"]},{"raw_affiliation_string":"Telecommunications Dept., Faculty of Electronics, Telecommunications, and Information Technology, POLITEHNICA University of Bucharest Project Manager MICRO ART CONSULT SRL, Bucharest, Romania","institution_ids":["https://openalex.org/I61641377"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074589620","display_name":"George Suciu","orcid":"https://orcid.org/0000-0001-8455-6177"},"institutions":[{"id":"https://openalex.org/I61641377","display_name":"Universitatea Na\u021bional\u0103 de \u0218tiin\u021b\u0103 \u0219i Tehnologie Politehnica Bucure\u0219ti","ror":"https://ror.org/0558j5q12","country_code":"RO","type":"education","lineage":["https://openalex.org/I61641377"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"George Suciu","raw_affiliation_strings":["POLITEHNICA University of Bucharest, BEIA Consult International,Faculty of Electronics, Telecommunications, and Information Technology,Telecommunications Dept., R&#x0026;D Department,Bucharest,Romania"],"affiliations":[{"raw_affiliation_string":"POLITEHNICA University of Bucharest, BEIA Consult International,Faculty of Electronics, Telecommunications, and Information Technology,Telecommunications Dept., R&#x0026;D Department,Bucharest,Romania","institution_ids":["https://openalex.org/I61641377"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5071210963"],"corresponding_institution_ids":["https://openalex.org/I61641377"],"apc_list":null,"apc_paid":null,"fwci":0.4589,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.67373351,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"abs 1602 6561","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7349387407302856},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.6993229985237122},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4274401366710663},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.34879374504089355}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7349387407302856},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.6993229985237122},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4274401366710663},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.34879374504089355},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ecai58194.2023.10193949","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ecai58194.2023.10193949","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 15th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W79289736","https://openalex.org/W145450961","https://openalex.org/W177994846","https://openalex.org/W2074346829","https://openalex.org/W2103441516","https://openalex.org/W2138621811","https://openalex.org/W2150120952","https://openalex.org/W2962711740","https://openalex.org/W2998313947","https://openalex.org/W3068123808","https://openalex.org/W3102969158","https://openalex.org/W3146709735","https://openalex.org/W3193944778","https://openalex.org/W4285723986","https://openalex.org/W4292158486","https://openalex.org/W6605907934","https://openalex.org/W6607341298","https://openalex.org/W6675720042","https://openalex.org/W6694732770","https://openalex.org/W6745537798","https://openalex.org/W6754929296","https://openalex.org/W6761150088"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W4402327032","https://openalex.org/W2382290278"],"abstract_inverted_index":{"Cyber-attacks":[0],"are":[1,29,117],"one":[2],"of":[3,15,26,33,62,120,126,130,152],"the":[4,13,75,79,87,107,114,135,150],"most":[5],"common":[6],"and":[7,42,81,105,138],"dangerous":[8],"actions":[9],"that":[10,50,86,116],"can":[11],"affect":[12],"activity":[14],"a":[16,39,43,48,60,118,123],"small":[17,153],"business,":[18],"when":[19],"personal":[20],"data":[21],"or":[22],"any":[23],"other":[24],"type":[25],"sensitive":[27],"information":[28],"stolen.":[30],"The":[31,54,95,128],"aim":[32],"this":[34],"paper":[35],"is":[36,57],"to":[37,58,68,73,82,91,112,140],"present":[38],"preliminary":[40],"architecture":[41],"pilot":[44,96],"implementation,":[45],"created":[46],"around":[47],"plug-in,":[49],"detects":[51],"malicious":[52,66,93,104],"emails.":[53,94],"main":[55],"idea":[56],"collect":[59],"series":[61],"emails":[63,102,115],"with":[64,122],"suspected":[65],"content,":[67],"use":[69,90,141],"text":[70],"mining":[71],"techniques":[72],"identify":[74],"essential":[76],"words":[77],"in":[78,134,149],"emails,":[80],"create":[83],"classification":[84],"models":[85],"plug-in":[88,109],"could":[89],"detect":[92],"implementation":[97],"was":[98],"tested":[99],"on":[100,144],"several":[101],"both":[103],"clean,":[106],"include":[108],"being":[110],"able":[111],"distinguish":[113],"source":[119],"infection":[121],"high":[124],"degree":[125],"accuracy.":[127],"novelty":[129],"our":[131],"work":[132],"consists":[133],"resulting":[136],"efficient":[137],"easy":[139],"tool,":[142],"based":[143],"Machine":[145],"Learning":[146],"algorithms,":[147],"appropriate":[148],"environment":[151],"enterprises.":[154]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-24T23:09:58.560324","created_date":"2025-10-10T00:00:00"}
