{"id":"https://openalex.org/W2036502578","doi":"https://doi.org/10.1109/isias.2010.5604059","title":"Extending the definition of guesswork","display_name":"Extending the definition of guesswork","publication_year":2010,"publication_date":"2010-08-01","ids":{"openalex":"https://openalex.org/W2036502578","doi":"https://doi.org/10.1109/isias.2010.5604059","mag":"2036502578"},"language":"en","primary_location":{"id":"doi:10.1109/isias.2010.5604059","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isias.2010.5604059","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 Sixth International Conference on Information Assurance and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060418784","display_name":"Reine Lundin","orcid":null},"institutions":[{"id":"https://openalex.org/I43968019","display_name":"Karlstad University","ror":"https://ror.org/05s754026","country_code":"SE","type":"education","lineage":["https://openalex.org/I43968019"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Reine Lundin","raw_affiliation_strings":["Department of Computer Science, Karlstad University, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Karlstad University, Sweden","institution_ids":["https://openalex.org/I43968019"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072335797","display_name":"Stefan Lindskog","orcid":"https://orcid.org/0000-0003-0778-4736"},"institutions":[{"id":"https://openalex.org/I43968019","display_name":"Karlstad University","ror":"https://ror.org/05s754026","country_code":"SE","type":"education","lineage":["https://openalex.org/I43968019"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Stefan Lindskog","raw_affiliation_strings":["Department of Computer Science, Karlstad University, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Karlstad University, Sweden","institution_ids":["https://openalex.org/I43968019"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5060418784"],"corresponding_institution_ids":["https://openalex.org/I43968019"],"apc_list":null,"apc_paid":null,"fwci":0.23200942,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.56595543,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"191","last_page":"196"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.972000002861023,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.972000002861023,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9664999842643738,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9516000151634216,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/conditional-entropy","display_name":"Conditional entropy","score":0.6892755627632141},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.6752825379371643},{"id":"https://openalex.org/keywords/joint-entropy","display_name":"Joint entropy","score":0.6522321105003357},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4482111632823944},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.4367785155773163},{"id":"https://openalex.org/keywords/joint-probability-distribution","display_name":"Joint probability distribution","score":0.42209121584892273},{"id":"https://openalex.org/keywords/statistical-physics","display_name":"Statistical physics","score":0.4208940863609314},{"id":"https://openalex.org/keywords/principle-of-maximum-entropy","display_name":"Principle of maximum entropy","score":0.3314632773399353},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.20503196120262146},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.1788981556892395},{"id":"https://openalex.org/keywords/thermodynamics","display_name":"Thermodynamics","score":0.12995103001594543}],"concepts":[{"id":"https://openalex.org/C101721835","wikidata":"https://www.wikidata.org/wiki/Q813908","display_name":"Conditional entropy","level":3,"score":0.6892755627632141},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.6752825379371643},{"id":"https://openalex.org/C106752470","wikidata":"https://www.wikidata.org/wiki/Q1364826","display_name":"Joint entropy","level":3,"score":0.6522321105003357},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4482111632823944},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.4367785155773163},{"id":"https://openalex.org/C18653775","wikidata":"https://www.wikidata.org/wiki/Q1333358","display_name":"Joint probability distribution","level":2,"score":0.42209121584892273},{"id":"https://openalex.org/C121864883","wikidata":"https://www.wikidata.org/wiki/Q677916","display_name":"Statistical physics","level":1,"score":0.4208940863609314},{"id":"https://openalex.org/C9679016","wikidata":"https://www.wikidata.org/wiki/Q1417473","display_name":"Principle of maximum entropy","level":2,"score":0.3314632773399353},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.20503196120262146},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.1788981556892395},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.12995103001594543}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isias.2010.5604059","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isias.2010.5604059","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 Sixth International Conference on Information Assurance and Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320335322","display_name":"European Regional Development Fund","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W111010178","https://openalex.org/W1198752617","https://openalex.org/W1517112506","https://openalex.org/W1525709666","https://openalex.org/W1569584939","https://openalex.org/W1596255181","https://openalex.org/W1782534475","https://openalex.org/W1840884391","https://openalex.org/W1993575476","https://openalex.org/W2064553186","https://openalex.org/W2099111195","https://openalex.org/W2099775215","https://openalex.org/W2123097583","https://openalex.org/W2131814097","https://openalex.org/W2165203736","https://openalex.org/W2511778884","https://openalex.org/W6630912913","https://openalex.org/W6635519150"],"related_works":["https://openalex.org/W1550757207","https://openalex.org/W2133435412","https://openalex.org/W2168217509","https://openalex.org/W4300707824","https://openalex.org/W2147544021","https://openalex.org/W2003770568","https://openalex.org/W2950438842","https://openalex.org/W2167163570","https://openalex.org/W2053566994","https://openalex.org/W2186435021"],"abstract_inverted_index":{"To":[0],"be":[1],"able":[2],"to":[3,50,65,91,120],"perform":[4],"an":[5,39],"analytical":[6],"and":[7,52,69,95],"more":[8],"exact":[9],"description":[10],"of":[11,25,36,46],"security,":[12],"quantitative":[13,27],"security":[14,28],"measures":[15],"are":[16],"desirable.":[17],"In":[18],"this":[19,112],"paper,":[20],"we":[21],"continue":[22],"our":[23],"investigation":[24],"the":[26,33,66,77,92,106,124],"measure":[29],"guesswork,":[30],"which":[31],"gives":[32],"average":[34],"number":[35],"guesses":[37],"in":[38],"optimal":[40],"brute":[41],"force":[42],"attack.":[43],"The":[44],"definition":[45],"guesswork":[47,59,75,102],"is":[48,60,86,118],"extended":[49],"joint":[51,58,84,116],"conditional":[53,126],"guesswork.":[54,73],"We":[55],"show":[56],"that":[57,70,115],"always":[61,87],"at":[62,88],"least":[63,89],"equal":[64,90,119],"marginal":[67,93,121],"guessworks,":[68],"conditioning":[71,96],"reduces":[72,97],"Hence,":[74],"possesses":[76],"same":[78],"two":[79],"properties":[80],"as":[81],"entropy,":[82,101,111],"i.e.,":[83],"entropy":[85,117,122],"entropies,":[94],"entropy.":[98,127],"However,":[99],"unlike":[100],"does":[103],"not":[104],"possess":[105],"chain":[107],"rule":[108,113],"property.":[109],"For":[110],"states":[114],"plus":[123],"corresponding":[125]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
