{"id":"https://openalex.org/W4401409024","doi":"https://doi.org/10.1145/3674912.3674924","title":"Analysis of the Security Level of Information Systems and Methods for Detecting Network Anomalies","display_name":"Analysis of the Security Level of Information Systems and Methods for Detecting Network Anomalies","publication_year":2024,"publication_date":"2024-06-14","ids":{"openalex":"https://openalex.org/W4401409024","doi":"https://doi.org/10.1145/3674912.3674924"},"language":"en","primary_location":{"id":"doi:10.1145/3674912.3674924","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3674912.3674924","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3674912.3674924?download=true","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference on Computer Systems and Technologies 2024","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3674912.3674924?download=true","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5093315396","display_name":"Besik Beridze","orcid":"https://orcid.org/0009-0005-1511-7724"},"institutions":[{"id":"https://openalex.org/I12153360","display_name":"Batumi Shota Rustaveli State University","ror":"https://ror.org/0212gyx73","country_code":"GE","type":"education","lineage":["https://openalex.org/I12153360"]}],"countries":["GE"],"is_corresponding":true,"raw_author_name":"Besik O Beridze","raw_affiliation_strings":["Assistant Professor, Department Of Computer Sciences in Batumi Shota Rustaveli State University, Batumi, 6010, Georgia, Georgia"],"raw_orcid":"https://orcid.org/0009-0005-1511-7724","affiliations":[{"raw_affiliation_string":"Assistant Professor, Department Of Computer Sciences in Batumi Shota Rustaveli State University, Batumi, 6010, Georgia, Georgia","institution_ids":["https://openalex.org/I12153360"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036807634","display_name":"Mikheil Donadze","orcid":"https://orcid.org/0000-0003-4241-0254"},"institutions":[{"id":"https://openalex.org/I12153360","display_name":"Batumi Shota Rustaveli State University","ror":"https://ror.org/0212gyx73","country_code":"GE","type":"education","lineage":["https://openalex.org/I12153360"]}],"countries":["GE"],"is_corresponding":false,"raw_author_name":"Mikheil V Donadze","raw_affiliation_strings":["Associate Professor, Department Of Computer Sciences in Batumi Shota Rustaveli State University, Batumi, 6010, Georgia, Georgia"],"raw_orcid":"https://orcid.org/0000-0003-4241-0254","affiliations":[{"raw_affiliation_string":"Associate Professor, Department Of Computer Sciences in Batumi Shota Rustaveli State University, Batumi, 6010, Georgia, Georgia","institution_ids":["https://openalex.org/I12153360"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5093315396"],"corresponding_institution_ids":["https://openalex.org/I12153360"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13197884,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"10","last_page":"15"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6698863506317139},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4967108368873596},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.46428099274635315},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40962618589401245}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6698863506317139},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4967108368873596},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.46428099274635315},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40962618589401245}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3674912.3674924","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3674912.3674924","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3674912.3674924?download=true","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference on Computer Systems and Technologies 2024","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3674912.3674924","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3674912.3674924","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3674912.3674924?download=true","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference on Computer Systems and Technologies 2024","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4401409024.pdf","grobid_xml":"https://content.openalex.org/works/W4401409024.grobid-xml"},"referenced_works_count":8,"referenced_works":["https://openalex.org/W1966809779","https://openalex.org/W2080020722","https://openalex.org/W2104847067","https://openalex.org/W2162039156","https://openalex.org/W2278186031","https://openalex.org/W2584221784","https://openalex.org/W3099982709","https://openalex.org/W7067840353"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W4210648132","https://openalex.org/W2360633292"],"abstract_inverted_index":{"ABSTRACT:":[0],"The":[1,60],"paper":[2],"delves":[3],"into":[4],"the":[5,15,89,115,132,139],"fundamentals":[6],"of":[7,14,18,28,55,70,91,123,149],"information":[8,20,31,48,79,109],"systems":[9,32,41,80,110],"security,":[10],"providing":[11],"an":[12],"analysis":[13],"security":[16],"levels":[17],"both":[19],"and":[21,51,66],"network":[22,64,152],"resources.":[23],"It":[24],"describes":[25],"various":[26],"types":[27],"attacks":[29,77],"on":[30,43,78,106,119],"along":[33],"with":[34,138],"their":[35],"detection":[36,45,58,97],"methods.":[37],"Additionally,":[38],"it":[39],"characterizes":[40],"based":[42,105],"anomaly":[44],"methods":[46,74],"in":[47,108],"system":[49,133],"behaviors":[50],"outlines":[52],"key":[53],"aspects":[54],"constructing":[56],"attack":[57,71,96,150],"systems.":[59],"study":[61],"further":[62],"investigates":[63],"anomalies":[65,104],"provides":[67],"detailed":[68],"characterizations":[69],"types.":[72],"Novel":[73],"for":[75,95,102],"detecting":[76,103],"have":[81],"been":[82,112],"developed,":[83],"including":[84],"a":[85,100,121],"new":[86],"approach":[87],"involving":[88],"utilization":[90],"threat":[92],"expectation":[93],"reports":[94],"purposes.":[98],"Moreover,":[99],"method":[101],"behavior":[107],"has":[111],"devised.":[113],"Specifically,":[114],"presented":[116],"algorithm":[117],"focuses":[118],"establishing":[120],"model":[122],"regular":[124],"or":[125,151],"typical":[126],"system/user":[127],"functionality.":[128],"Through":[129],"this":[130],"approach,":[131],"compares":[134],"current":[135],"activity":[136,141],"rates":[137],"normal":[140],"profile,":[142],"identifying":[143],"significant":[144],"deviations":[145],"as":[146],"potential":[147],"sources":[148],"anomalies.":[153]},"counts_by_year":[],"updated_date":"2026-03-14T06:41:57.775601","created_date":"2025-10-10T00:00:00"}
