{"id":"https://openalex.org/W3191936624","doi":"https://doi.org/10.1134/s0361768821040058","title":"Model of Pseudo-Random Sequences Generated by Encryption and Compression Algorithms","display_name":"Model of Pseudo-Random Sequences Generated by Encryption and Compression Algorithms","publication_year":2021,"publication_date":"2021-07-01","ids":{"openalex":"https://openalex.org/W3191936624","doi":"https://doi.org/10.1134/s0361768821040058","mag":"3191936624"},"language":"en","primary_location":{"id":"doi:10.1134/s0361768821040058","is_oa":false,"landing_page_url":"https://doi.org/10.1134/s0361768821040058","pdf_url":null,"source":{"id":"https://openalex.org/S150218641","display_name":"Programming and Computer Software","issn_l":"0361-7688","issn":["0361-7688","1608-3261"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320267","host_organization_name":"Pleiades Publishing","host_organization_lineage":["https://openalex.org/P4310320267","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Pleiades Publishing","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Programming and Computer Software","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071833882","display_name":"A. V. Kozachok","orcid":"https://orcid.org/0000-0002-6501-2008"},"institutions":[{"id":"https://openalex.org/I4210135223","display_name":"Academy of Federal Security Guard Service of Russian Federation","ror":"https://ror.org/02wbhea49","country_code":"RU","type":"education","lineage":["https://openalex.org/I4210135223"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"A. V. Kozachok","raw_affiliation_strings":["Academy of Federal Guard Service of the Russian Federation, ul. Priborostroitel\u2019naya 35, Orel, Russia"],"affiliations":[{"raw_affiliation_string":"Academy of Federal Guard Service of the Russian Federation, ul. Priborostroitel\u2019naya 35, Orel, Russia","institution_ids":["https://openalex.org/I4210135223"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013232287","display_name":"A. A. Spirin","orcid":"https://orcid.org/0000-0002-7231-5728"},"institutions":[{"id":"https://openalex.org/I4210135223","display_name":"Academy of Federal Security Guard Service of Russian Federation","ror":"https://ror.org/02wbhea49","country_code":"RU","type":"education","lineage":["https://openalex.org/I4210135223"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"A. A. Spirin","raw_affiliation_strings":["Academy of Federal Guard Service of the Russian Federation, ul. Priborostroitel\u2019naya 35, Orel, Russia"],"affiliations":[{"raw_affiliation_string":"Academy of Federal Guard Service of the Russian Federation, ul. Priborostroitel\u2019naya 35, Orel, Russia","institution_ids":["https://openalex.org/I4210135223"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5071833882"],"corresponding_institution_ids":["https://openalex.org/I4210135223"],"apc_list":null,"apc_paid":null,"fwci":0.2882,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.55328431,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"47","issue":"4","first_page":"249","last_page":"260"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6758657097816467},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5959659218788147},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5855189561843872},{"id":"https://openalex.org/keywords/compression","display_name":"Compression (physics)","score":0.5478239059448242},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3268551230430603},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.11705318093299866},{"id":"https://openalex.org/keywords/materials-science","display_name":"Materials science","score":0.06058743596076965}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6758657097816467},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5959659218788147},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5855189561843872},{"id":"https://openalex.org/C180016635","wikidata":"https://www.wikidata.org/wiki/Q2712821","display_name":"Compression (physics)","level":2,"score":0.5478239059448242},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3268551230430603},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.11705318093299866},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.06058743596076965},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1134/s0361768821040058","is_oa":false,"landing_page_url":"https://doi.org/10.1134/s0361768821040058","pdf_url":null,"source":{"id":"https://openalex.org/S150218641","display_name":"Programming and Computer Software","issn_l":"0361-7688","issn":["0361-7688","1608-3261"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320267","host_organization_name":"Pleiades Publishing","host_organization_lineage":["https://openalex.org/P4310320267","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Pleiades Publishing","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Programming and Computer Software","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W2272516773","https://openalex.org/W2465142808","https://openalex.org/W2513529237","https://openalex.org/W2518866423","https://openalex.org/W2605422749","https://openalex.org/W2623711236","https://openalex.org/W2751253404","https://openalex.org/W2766400810","https://openalex.org/W2767177879","https://openalex.org/W2786677948","https://openalex.org/W2788571554","https://openalex.org/W2796263526","https://openalex.org/W2801973044","https://openalex.org/W2885747332","https://openalex.org/W2913856735","https://openalex.org/W2917586021","https://openalex.org/W2920797253","https://openalex.org/W2942125153","https://openalex.org/W2942239200","https://openalex.org/W2953225812","https://openalex.org/W2963320092","https://openalex.org/W2965124710","https://openalex.org/W2971435671","https://openalex.org/W2982387504","https://openalex.org/W2998646525","https://openalex.org/W3000429356","https://openalex.org/W3026902724","https://openalex.org/W3037889891","https://openalex.org/W3039619812","https://openalex.org/W3042433202","https://openalex.org/W3045016378","https://openalex.org/W3088560833","https://openalex.org/W3098497145","https://openalex.org/W3099803329","https://openalex.org/W3109213232","https://openalex.org/W3120667117","https://openalex.org/W3128652290","https://openalex.org/W3134627716"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2051487156","https://openalex.org/W2073681303","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W2350741829"],"abstract_inverted_index":{"Classification":[0],"of":[1,7,14,24,42,56,61,63,72,83,131,138,145,161,165,178,184,192,202,210,228,232,234,245,262,294,307,334],"high-entropy":[2],"data":[3,67,100,114,150,170,327],"sources":[4],"is":[5,205,219,255],"one":[6],"the":[8,12,40,43,54,59,84,93,124,128,139,166,179,185,190,200,246,251,260,263,287,292,305,308,313],"key":[9],"problems":[10],"in":[11,39,58,102,113,199,250,286,312],"field":[13,60,201],"information":[15,37,203],"security.":[16],"Currently,":[17],"there":[18],"are":[19,280,300,318],"many":[20],"methods":[21,94],"for":[22,95,194,258,303],"classification":[23,62,193,316],"encrypted":[25,64,73,97,195,270,324],"and":[26,65,68,74,98,152,174,196,216,230,271,325],"compressed":[27,66,75,99,197,272,326],"sequences;":[28],"however,":[29],"they":[30],"mostly":[31],"use":[32],"digital":[33],"signatures":[34],"or":[35,48,118,135],"service":[36],"found":[38],"headers":[41,277],"containers":[44],"used":[45,101,249,285,311],"to":[46,90,122,328],"store":[47],"transfer":[49],"data.":[50],"This":[51],"paper":[52],"analyzes":[53],"state":[55],"research":[57,140,167,180],"develops":[69],"a":[70,80,132,143,239,266],"model":[71,144,209,254,314],"sequences.":[76,163],"Our":[77],"experiments":[78],"demonstrate":[79],"high":[81],"accuracy":[82,317,333],"proposed":[85,321],"approach,":[86],"which":[87,237],"allows":[88,323],"us":[89],"conclude":[91],"that":[92,155],"classifying":[96],"our":[103],"study":[104],"have":[105],"been":[106],"improved.":[107],"The":[108,243,283,320],"approach":[109,322],"can":[110],"be":[111,329],"implemented":[112],"leak":[115],"prevention":[116],"systems":[117,121],"corporate":[119],"email":[120],"analyze":[123],"attachments":[125],"sent":[126],"outside":[127],"controlled":[129],"perimeter":[130],"government":[133],"agency":[134],"enterprise.":[136],"Purpose":[137],"\u2013":[141,168,181],"develop":[142],"pseudo-random":[146,211,252,288,295],"sequences":[147,198,212,296],"generated":[148,213,268],"by":[149,214],"encryption":[151,215],"compression":[153,217],"algorithms":[154,218],"most":[156],"accurately":[157],"reflects":[158],"statistical":[159,169,225,247,309],"properties":[160],"these":[162],"Methods":[164],"analysis,":[171],"mathematical":[172],"statistics,":[173],"machine":[175],"learning.":[176],"Result":[177],"An":[182],"analysis":[183],"studies":[186],"aimed":[187],"at":[188],"solving":[189],"problem":[191],"security":[204],"carried":[206,281],"out.":[207,282],"A":[208],"developed":[220],"taking":[221,275],"into":[222,278],"account":[223,279],"their":[224,276],"features:":[226],"distribution":[227,231],"bytes":[229],"subsequences":[233],"limited":[235],"length,":[236],"constitute":[238],"new":[240],"probabilistic":[241],"space.":[242],"choice":[244],"features":[248,310],"sequence":[253,289],"justified.":[256],"Experiments":[257,302],"determining":[259,304],"hyperparameters":[261],"classifier":[264],"on":[265,315],"dataset":[267],"from":[269],"files":[273],"without":[274],"constraints":[284],"model,":[290],"namely,":[291],"length":[293],"(approximately":[297],"600":[298],"Kb),":[299],"defined.":[301],"effect":[306],"conducted.":[319],"classified":[330],"with":[331],"an":[332],"0.97.":[335]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
