{"id":"https://openalex.org/W3209288078","doi":"https://doi.org/10.1109/ewdts52692.2021.9581049","title":"About the Method of Protecting Information in Financial Portals based on Neural Networks","display_name":"About the Method of Protecting Information in Financial Portals based on Neural Networks","publication_year":2021,"publication_date":"2021-09-10","ids":{"openalex":"https://openalex.org/W3209288078","doi":"https://doi.org/10.1109/ewdts52692.2021.9581049","mag":"3209288078"},"language":"en","primary_location":{"id":"doi:10.1109/ewdts52692.2021.9581049","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ewdts52692.2021.9581049","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE East-West Design &amp; Test Symposium (EWDTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067983050","display_name":"Zurab Meskhidze","orcid":"https://orcid.org/0009-0005-2159-7090"},"institutions":[{"id":"https://openalex.org/I131762061","display_name":"Georgian Technical University","ror":"https://ror.org/00aamz256","country_code":"GE","type":"education","lineage":["https://openalex.org/I131762061"]}],"countries":["GE"],"is_corresponding":true,"raw_author_name":"Zurab Meskhidze","raw_affiliation_strings":["Department of Computer Engineering (Doctoral Study), Georgian Technical University, Tbilisi, Georgia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering (Doctoral Study), Georgian Technical University, Tbilisi, Georgia","institution_ids":["https://openalex.org/I131762061"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036807634","display_name":"Mikheil Donadze","orcid":"https://orcid.org/0000-0003-4241-0254"},"institutions":[{"id":"https://openalex.org/I12153360","display_name":"Batumi Shota Rustaveli State University","ror":"https://ror.org/0212gyx73","country_code":"GE","type":"education","lineage":["https://openalex.org/I12153360"]}],"countries":["GE"],"is_corresponding":false,"raw_author_name":"Mikheil Donadze","raw_affiliation_strings":["Department of Computer Sciences, Batumi Shota Rustaveli State University, Batumi, Georgia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Sciences, Batumi Shota Rustaveli State University, Batumi, Georgia","institution_ids":["https://openalex.org/I12153360"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5067983050"],"corresponding_institution_ids":["https://openalex.org/I131762061"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.15539164,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T14420","display_name":"Advanced Research in Systems and Signal Processing","score":0.9434999823570251,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T14420","display_name":"Advanced Research in Systems and Signal Processing","score":0.9434999823570251,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13181","display_name":"Economic and Technological Systems Analysis","score":0.9337999820709229,"subfield":{"id":"https://openalex.org/subfields/1405","display_name":"Management of Technology and Innovation"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6837754845619202},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.6814026236534119},{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.6245218515396118},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6071755886077881},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.5674650073051453},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.5211867690086365},{"id":"https://openalex.org/keywords/security-controls","display_name":"Security controls","score":0.4992365837097168},{"id":"https://openalex.org/keywords/information-system","display_name":"Information system","score":0.4943568706512451},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.48370105028152466},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.45546019077301025},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4463709890842438},{"id":"https://openalex.org/keywords/information-security-standards","display_name":"Information security standards","score":0.4158358573913574},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.330263614654541},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.2554120421409607},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.24946796894073486},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.17721688747406006},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10491004586219788},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09471401572227478}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6837754845619202},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.6814026236534119},{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.6245218515396118},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6071755886077881},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.5674650073051453},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.5211867690086365},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.4992365837097168},{"id":"https://openalex.org/C180198813","wikidata":"https://www.wikidata.org/wiki/Q121182","display_name":"Information system","level":2,"score":0.4943568706512451},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.48370105028152466},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.45546019077301025},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4463709890842438},{"id":"https://openalex.org/C139547956","wikidata":"https://www.wikidata.org/wiki/Q6031202","display_name":"Information security standards","level":5,"score":0.4158358573913574},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.330263614654541},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.2554120421409607},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.24946796894073486},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.17721688747406006},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10491004586219788},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09471401572227478},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ewdts52692.2021.9581049","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ewdts52692.2021.9581049","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE East-West Design &amp; Test Symposium (EWDTS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W9690362","https://openalex.org/W1569512666","https://openalex.org/W2340689446"],"related_works":["https://openalex.org/W2033357182","https://openalex.org/W2376792395","https://openalex.org/W2394290376","https://openalex.org/W2380188265","https://openalex.org/W2370581992","https://openalex.org/W2800653357","https://openalex.org/W820134910","https://openalex.org/W2397926003","https://openalex.org/W2387034603","https://openalex.org/W2066297175"],"abstract_inverted_index":{"The":[0,50,71,93,103],"paper":[1,51],"discusses":[2],"the":[3,21,61,65,77,80,87,128,133,138,142,144,147,152,166,170,176,179],"security":[4,46,62,72,145],"aspects":[5],"of":[6,64,68,79,82,89,111,135,146,164],"financial":[7,25,69],"portal":[8],"information,":[9],"and":[10,47,158],"proposes":[11],"a":[12,83,90,98,162],"mechanism":[13],"for":[14,137],"creating":[15],"an":[16,53],"information":[17,22,33,45,66,112,119,177],"protection":[18,34],"module":[19],"in":[20,24,108,169],"system":[23,35,67,85,148,171],"institutions":[26],"based":[27,96,123],"on":[28,97,124,141],"artificial":[29],"neural":[30],"networks.":[31],"An":[32],"with":[36,178],"adaptive":[37],"features":[38],"needs":[39],"to":[40,43,59,86,117,154,175],"be":[41,57],"developed":[42],"ensure":[44],"rapid":[48],"response.":[49],"presents":[52],"approach":[54,105],"that":[55],"can":[56],"used":[58],"assess":[60],"level":[63,73,134],"portals.":[70],"is":[74,95,106,149],"defined":[75],"as":[76,114,161],"ratio":[78],"risks":[81,88,130],"protected":[84],"vulnerable":[91],"system.":[92],"methodology":[94],"systems":[99],"risk":[100],"assessment":[101],"approach.":[102],"risk-based":[104],"implemented":[107],"many":[109],"areas":[110],"security,":[113],"it":[115],"allows":[116],"describe":[118],"resources":[120],"more":[121],"accurately,":[122],"their":[125,183],"characteristic":[126],"weaknesses,":[127],"value,":[129],"and,":[131],"consequently,":[132],"criticality":[136],"organization's":[139],"activities.Based":[140],"approach,":[143],"determined":[150],"by":[151],"ability":[153],"use":[155],"access":[156,174],"control":[157],"management":[159],"tools,":[160],"result":[163],"which,":[165],"user":[167],"registered":[168],"will":[172],"have":[173],"necessary":[180],"restrictions":[181],"ensuring":[182],"unconditional":[184],"use.":[185]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
