{"id":"https://openalex.org/W2801185314","doi":"https://doi.org/10.23919/icitst.2017.8356342","title":"Reveal false names of accounts as a result of hackers attacks: Security systems with heightened safety of information","display_name":"Reveal false names of accounts as a result of hackers attacks: Security systems with heightened safety of information","publication_year":2017,"publication_date":"2017-12-01","ids":{"openalex":"https://openalex.org/W2801185314","doi":"https://doi.org/10.23919/icitst.2017.8356342","mag":"2801185314"},"language":"en","primary_location":{"id":"doi:10.23919/icitst.2017.8356342","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icitst.2017.8356342","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080585412","display_name":"Desislav Andreev","orcid":"https://orcid.org/0000-0001-5313-6313"},"institutions":[{"id":"https://openalex.org/I31151848","display_name":"Technical University of Sofia","ror":"https://ror.org/052prhs50","country_code":"BG","type":"education","lineage":["https://openalex.org/I31151848"]}],"countries":["BG"],"is_corresponding":true,"raw_author_name":"Desislav Andreev","raw_affiliation_strings":["Dep. Computer Systems, Technical University of Sofia, Sofia, Bulgaria"],"affiliations":[{"raw_affiliation_string":"Dep. Computer Systems, Technical University of Sofia, Sofia, Bulgaria","institution_ids":["https://openalex.org/I31151848"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041837616","display_name":"Simona Filipova-Petrakieva","orcid":"https://orcid.org/0000-0001-6430-2698"},"institutions":[{"id":"https://openalex.org/I31151848","display_name":"Technical University of Sofia","ror":"https://ror.org/052prhs50","country_code":"BG","type":"education","lineage":["https://openalex.org/I31151848"]}],"countries":["BG"],"is_corresponding":false,"raw_author_name":"Simona Petrakieva","raw_affiliation_strings":["Dep. Computer Systems, Technical University of Sofia, Sofia, Bulgaria"],"affiliations":[{"raw_affiliation_string":"Dep. Computer Systems, Technical University of Sofia, Sofia, Bulgaria","institution_ids":["https://openalex.org/I31151848"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030297802","display_name":"Ina Taralova","orcid":null},"institutions":[{"id":"https://openalex.org/I4210117005","display_name":"Laboratoire des Sciences du Num\u00e9rique de Nantes","ror":"https://ror.org/02snf8m58","country_code":"FR","type":"facility","lineage":["https://openalex.org/I100445878","https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I205703379","https://openalex.org/I4210117005","https://openalex.org/I4210124215","https://openalex.org/I4210127572","https://openalex.org/I4210139971","https://openalex.org/I97188460","https://openalex.org/I97188460"]},{"id":"https://openalex.org/I100445878","display_name":"\u00c9cole Centrale de Nantes","ror":"https://ror.org/03nh7d505","country_code":"FR","type":"education","lineage":["https://openalex.org/I100445878","https://openalex.org/I97188460"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Ina Taralova","raw_affiliation_strings":["Laboratoire des Sciences du Numerique de Nantes Ecole Centrale de Nantes, Nantes, France"],"affiliations":[{"raw_affiliation_string":"Laboratoire des Sciences du Numerique de Nantes Ecole Centrale de Nantes, Nantes, France","institution_ids":["https://openalex.org/I4210117005","https://openalex.org/I100445878"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5080585412"],"corresponding_institution_ids":["https://openalex.org/I31151848"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.31226684,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"39","last_page":"42"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9696000218391418,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9696000218391418,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9649999737739563,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9348999857902527,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.9048628807067871},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7620287537574768},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6796582937240601},{"id":"https://openalex.org/keywords/voting","display_name":"Voting","score":0.5982051491737366},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4188120663166046},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.33329319953918457}],"concepts":[{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.9048628807067871},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7620287537574768},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6796582937240601},{"id":"https://openalex.org/C520049643","wikidata":"https://www.wikidata.org/wiki/Q189760","display_name":"Voting","level":3,"score":0.5982051491737366},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4188120663166046},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.33329319953918457},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/icitst.2017.8356342","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icitst.2017.8356342","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Reduced inequalities","score":0.6000000238418579,"id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W204891295","https://openalex.org/W2039001182","https://openalex.org/W2063685463","https://openalex.org/W2096629688","https://openalex.org/W2111303611","https://openalex.org/W2124394116","https://openalex.org/W2416004429","https://openalex.org/W3104379172","https://openalex.org/W4244948002","https://openalex.org/W6608375628","https://openalex.org/W6785618632","https://openalex.org/W6827276163"],"related_works":["https://openalex.org/W2921504876","https://openalex.org/W2183730421","https://openalex.org/W1982580243","https://openalex.org/W2725637128","https://openalex.org/W2897593657","https://openalex.org/W2294330327","https://openalex.org/W3006507989","https://openalex.org/W4251184983","https://openalex.org/W2371430952","https://openalex.org/W4210648132"],"abstract_inverted_index":{"The":[0,18,37,63],"aim":[1],"of":[2,10,15,65,80,97,102,121,149,156],"the":[3,78,85,93,107,119,122,142,150],"paper":[4],"is":[5,29,67,127],"to":[6,23,60,68,83,89],"reveal":[7],"false":[8,26,86],"names":[9],"accounts":[11,103,126,155],"as":[12,43],"a":[13,20,44,55,73],"result":[14],"hackers":[16],"attacks.":[17],"probability":[19,57],"given":[21,157],"account":[22,39],"be":[24,41,52,61,133],"either":[25],"or":[27],"actual":[28],"calculated":[30],"using":[31],"methods":[32],"for":[33,138],"machine":[34],"learning":[35],"analysis.":[36],"suspected":[38],"will":[40,51],"used":[42,134],"pattern":[45],"and":[46,88],"by":[47,145],"classification":[48],"techniques":[49],"clusters":[50],"formed":[53],"with":[54,106],"respective":[56],"this":[58],"name":[59],"false.":[62],"purpose":[64],"investigation":[66],"determine":[69],"if":[70,99],"there":[71],"exists":[72],"trend,":[74],"which":[75],"arises":[76],"during":[77],"creation":[79],"new":[81],"accounts,":[82],"detect":[84],"ones":[87,95],"discriminate":[90],"them":[91],"from":[92],"real":[94],"independently":[96],"that":[98],"two":[100],"types":[101],"are":[104,113],"generated":[105],"same":[108],"speed.":[109],"These":[110],"security":[111,120],"systems":[112],"applied":[114],"in":[115,124,135,140,147,152],"different":[116,153],"areas,":[117],"where":[118],"data":[123],"users'":[125],"required.":[128],"For":[129],"example,":[130],"they":[131],"can":[132],"on-line":[136],"voting":[137],"balloting,":[139],"studying":[141],"social":[143],"opinion":[144],"inquiries,":[146],"protection":[148],"information":[151],"user":[154],"system":[158],"etc.":[159]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
