{"id":"https://openalex.org/W2004098526","doi":"https://doi.org/10.1109/isias.2011.6122810","title":"Guesswork changes in multi-processor attacks","display_name":"Guesswork changes in multi-processor attacks","publication_year":2011,"publication_date":"2011-12-01","ids":{"openalex":"https://openalex.org/W2004098526","doi":"https://doi.org/10.1109/isias.2011.6122810","mag":"2004098526"},"language":"en","primary_location":{"id":"doi:10.1109/isias.2011.6122810","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isias.2011.6122810","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 7th International Conference on Information Assurance and Security (IAS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060418784","display_name":"Reine Lundin","orcid":null},"institutions":[{"id":"https://openalex.org/I43968019","display_name":"Karlstad University","ror":"https://ror.org/05s754026","country_code":"SE","type":"education","lineage":["https://openalex.org/I43968019"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Reine Lundin","raw_affiliation_strings":["Department of Computer Science, Karlstad University, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Karlstad University, Sweden","institution_ids":["https://openalex.org/I43968019"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072335797","display_name":"Stefan Lindskog","orcid":"https://orcid.org/0000-0003-0778-4736"},"institutions":[{"id":"https://openalex.org/I43968019","display_name":"Karlstad University","ror":"https://ror.org/05s754026","country_code":"SE","type":"education","lineage":["https://openalex.org/I43968019"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Stefan Lindskog","raw_affiliation_strings":["Department of Computer Science, Karlstad University, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Karlstad University, Sweden","institution_ids":["https://openalex.org/I43968019"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5060418784"],"corresponding_institution_ids":["https://openalex.org/I43968019"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13482102,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"6","issue":null,"first_page":"145","last_page":"150"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8151455521583557},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7829174995422363},{"id":"https://openalex.org/keywords/brute-force-attack","display_name":"Brute-force attack","score":0.6424915790557861},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.570640504360199},{"id":"https://openalex.org/keywords/alphabet","display_name":"Alphabet","score":0.47327494621276855},{"id":"https://openalex.org/keywords/measure","display_name":"Measure (data warehouse)","score":0.4350746273994446},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3747929334640503},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.20600804686546326}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8151455521583557},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7829174995422363},{"id":"https://openalex.org/C207468940","wikidata":"https://www.wikidata.org/wiki/Q869370","display_name":"Brute-force attack","level":3,"score":0.6424915790557861},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.570640504360199},{"id":"https://openalex.org/C112876837","wikidata":"https://www.wikidata.org/wiki/Q837518","display_name":"Alphabet","level":2,"score":0.47327494621276855},{"id":"https://openalex.org/C2780009758","wikidata":"https://www.wikidata.org/wiki/Q6804172","display_name":"Measure (data warehouse)","level":2,"score":0.4350746273994446},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3747929334640503},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.20600804686546326},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isias.2011.6122810","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isias.2011.6122810","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 7th International Conference on Information Assurance and Security (IAS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Quality Education","score":0.6100000143051147,"id":"https://metadata.un.org/sdg/4"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320335322","display_name":"European Regional Development Fund","ror":"https://ror.org/00k4n6c32"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W349523793","https://openalex.org/W619926356","https://openalex.org/W1198752617","https://openalex.org/W1517112506","https://openalex.org/W1569584939","https://openalex.org/W1596255181","https://openalex.org/W1968909445","https://openalex.org/W1993575476","https://openalex.org/W2050104152","https://openalex.org/W2099111195","https://openalex.org/W2099775215","https://openalex.org/W2123097583","https://openalex.org/W2132704120","https://openalex.org/W2157554212","https://openalex.org/W2511778884","https://openalex.org/W2574026370","https://openalex.org/W6611793781","https://openalex.org/W6619562786","https://openalex.org/W6630912913"],"related_works":["https://openalex.org/W4255837520","https://openalex.org/W2074481494","https://openalex.org/W4250156143","https://openalex.org/W2387011115","https://openalex.org/W4247156967","https://openalex.org/W4239207432","https://openalex.org/W2100090372","https://openalex.org/W4361205702","https://openalex.org/W4234808182","https://openalex.org/W82848659"],"abstract_inverted_index":{"More":[0],"and":[1,34,51,105,148],"more":[2,47],"effort":[3],"is":[4,24,62,88,137],"being":[5],"spent":[6],"on":[7,139],"security":[8,22,40,53,60],"improvements":[9],"in":[10,44,71,116,132],"today's":[11],"computer":[12,21,55],"networking":[13],"environments.":[14,56],"However,":[15,102],"due":[16],"to":[17,46,118,152],"the":[18,66,82,91,143,146,149],"nature":[19],"of":[20,28,38,54,69,85],"there":[23],"still":[25],"a":[26,72,94],"lack":[27],"good":[29],"quantitative":[30,59],"assessment":[31],"methods.":[32],"Inventing":[33],"developing":[35],"new":[36],"ways":[37],"measuring":[39],"are":[41],"therefore":[42],"needed":[43],"order":[45],"exact":[48],"describe,":[49],"assess,":[50],"improve":[52],"One":[57],"existing":[58],"measure":[61],"guesswork.":[63],"Guesswork":[64],"gives":[65],"average":[67],"number":[68],"guesses":[70],"brute":[73],"force":[74],"attack":[75],"when":[76,97],"breaking":[77,98],"an":[78,99,103,120],"encrypted":[79,100,121],"message.":[80,101,122],"In":[81],"current":[83],"definition":[84],"guesswork":[86,128],"it":[87],"assumed":[89],"that":[90,113],"attacker":[92,107],"uses":[93],"single":[95],"processor":[96],"intelligent":[104],"motivated":[106],"will":[108],"likely":[109],"use":[110],"several":[111],"processors":[112],"can":[114],"work":[115],"parallel":[117],"break":[119],"This":[123],"paper":[124],"formally":[125],"investigates":[126],"how":[127],"changes":[129],"over":[130],"time":[131],"multi-processor":[133],"attacks.":[134],"The":[135],"result":[136],"applied":[138],"three":[140],"probability":[141],"distributions,":[142],"English":[144],"alphabet,":[145],"geometric,":[147],"truncated":[150],"geometric":[151],"illustrate":[153],"some":[154],"behaviors.":[155]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
