{"id":"https://openalex.org/W3041156250","doi":"https://doi.org/10.1145/3404663.3406874","title":"Analysis of Fuel Pump Skimming Devices","display_name":"Analysis of Fuel Pump Skimming Devices","publication_year":2020,"publication_date":"2020-05-15","ids":{"openalex":"https://openalex.org/W3041156250","doi":"https://doi.org/10.1145/3404663.3406874","mag":"3041156250"},"language":"en","primary_location":{"id":"doi:10.1145/3404663.3406874","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3404663.3406874","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 the 4th International Conference on Information System and Data Mining","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004150809","display_name":"Charles Begian","orcid":null},"institutions":[{"id":"https://openalex.org/I125467818","display_name":"Dakota State University","ror":"https://ror.org/016yv6y68","country_code":"US","type":"education","lineage":["https://openalex.org/I125467818"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Charles Begian","raw_affiliation_strings":["The Beacom College of Computer and Cyber Sciences, Dakota State University, Madison, South Dakota, USA"],"affiliations":[{"raw_affiliation_string":"The Beacom College of Computer and Cyber Sciences, Dakota State University, Madison, South Dakota, USA","institution_ids":["https://openalex.org/I125467818"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012471223","display_name":"Houssain Kettani","orcid":null},"institutions":[{"id":"https://openalex.org/I125467818","display_name":"Dakota State University","ror":"https://ror.org/016yv6y68","country_code":"US","type":"education","lineage":["https://openalex.org/I125467818"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Houssain Kettani","raw_affiliation_strings":["The Beacom College of Computer and Cyber Sciences, Dakota State University, Madison, South Dakota, USA"],"affiliations":[{"raw_affiliation_string":"The Beacom College of Computer and Cyber Sciences, Dakota State University, Madison, South Dakota, USA","institution_ids":["https://openalex.org/I125467818"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5004150809"],"corresponding_institution_ids":["https://openalex.org/I125467818"],"apc_list":null,"apc_paid":null,"fwci":1.0676,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.83523906,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"14","issue":null,"first_page":"157","last_page":"162"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/payment-card","display_name":"Payment card","score":0.7650343179702759},{"id":"https://openalex.org/keywords/payment","display_name":"Payment","score":0.7276960611343384},{"id":"https://openalex.org/keywords/debit-card","display_name":"Debit card","score":0.6673710346221924},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48833438754081726},{"id":"https://openalex.org/keywords/bluetooth","display_name":"Bluetooth","score":0.4543572664260864},{"id":"https://openalex.org/keywords/smart-card","display_name":"Smart card","score":0.44279366731643677},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.43629175424575806},{"id":"https://openalex.org/keywords/credit-card","display_name":"Credit card","score":0.40558922290802},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.33610719442367554},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.27297139167785645},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.26288825273513794},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.1753656268119812},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.1619071364402771}],"concepts":[{"id":"https://openalex.org/C21021354","wikidata":"https://www.wikidata.org/wiki/Q1207171","display_name":"Payment card","level":3,"score":0.7650343179702759},{"id":"https://openalex.org/C145097563","wikidata":"https://www.wikidata.org/wiki/Q1148747","display_name":"Payment","level":2,"score":0.7276960611343384},{"id":"https://openalex.org/C2777303138","wikidata":"https://www.wikidata.org/wiki/Q13499","display_name":"Debit card","level":4,"score":0.6673710346221924},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48833438754081726},{"id":"https://openalex.org/C546215728","wikidata":"https://www.wikidata.org/wiki/Q39531","display_name":"Bluetooth","level":3,"score":0.4543572664260864},{"id":"https://openalex.org/C110406131","wikidata":"https://www.wikidata.org/wiki/Q41349","display_name":"Smart card","level":2,"score":0.44279366731643677},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.43629175424575806},{"id":"https://openalex.org/C2983355114","wikidata":"https://www.wikidata.org/wiki/Q161380","display_name":"Credit card","level":3,"score":0.40558922290802},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.33610719442367554},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.27297139167785645},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.26288825273513794},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.1753656268119812},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.1619071364402771}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3404663.3406874","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3404663.3406874","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 the 4th International Conference on Information System and Data Mining","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7200000286102295,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W34175895","https://openalex.org/W1896190268","https://openalex.org/W2973938224"],"related_works":["https://openalex.org/W4372347231","https://openalex.org/W4389146244","https://openalex.org/W4234755516","https://openalex.org/W3121451588","https://openalex.org/W24230350","https://openalex.org/W2034011091","https://openalex.org/W2245344613","https://openalex.org/W2994136439","https://openalex.org/W2972173583","https://openalex.org/W3210722202"],"abstract_inverted_index":{"Payment":[0],"card":[1,14,76,86,120],"fraud":[2],"is":[3],"a":[4,36,63],"growing":[5],"problem":[6],"in":[7,35,78,105],"the":[8,43,52,117,130,134,146],"United":[9],"States.":[10],"Credit":[11],"and":[12,30,136],"debit":[13],"numbers":[15],"are":[16,127],"harvested":[17,101],"from":[18,102],"automated":[19],"devices":[20],"such":[21],"as":[22,39,59],"fuel":[23,90,103,147],"dispensers,":[24],"Point":[25],"of":[26,45,62,74,124,133],"Sale":[27],"(POS)":[28],"terminals,":[29],"Automated":[31],"Teller":[32],"Machines":[33],"(ATMs)":[34],"process":[37],"known":[38],"\"skimming\".":[40],"Skimming":[41],"requires":[42],"installation":[44],"malicious":[46],"hardware":[47],"on":[48],"(or":[49],"inside":[50],"of)":[51],"targeted":[53],"device.":[54],"As":[55],"such,":[56],"it":[57],"serves":[58],"an":[60,72],"example":[61],"physical":[64],"cyber":[65],"threat.":[66],"In":[67],"this":[68],"paper,":[69],"we":[70],"provide":[71],"overview":[73],"payment":[75,85,119],"skimming":[77,87],"general,":[79],"before":[80],"narrowing":[81],"our":[82,125],"focus":[83],"to":[84,115,128,150],"occurring":[88],"at":[89],"pumps.":[91],"We":[92,107],"then":[93],"reverse":[94],"engineer":[95],"skimmers":[96,111,135],"which":[97,112],"law":[98],"enforcement":[99],"has":[100],"pumps":[104],"Florida.":[106],"consider":[108],"only":[109],"those":[110],"use":[113],"Bluetooth":[114],"exfiltrate":[116],"\"skimmed\"":[118],"data.":[121],"The":[122],"goals":[123],"research":[126],"analyze":[129],"internal":[131],"operation":[132],"determine":[137],"if":[138],"they":[139],"can":[140],"be":[141,151],"disabled":[142],"wirelessly,":[143],"without":[144],"requiring":[145],"pump":[148],"cabinet":[149],"opened.":[152]},"counts_by_year":[{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
