Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Research › peer-review
Approaches to development of models for text analysis of information in social network profiles in order to evaluate user's vulnerabilities profile. / Bagretsov, Georgiy I.; Shindarev, Nikita A.; Abramov, Maksim V.; Tulupyeva, Tatyana V.
Proceedings of 2017 20th IEEE International Conference on Soft Computing and Measurements, SCM 2017. ed. / S. Shaposhnikov. Institute of Electrical and Electronics Engineers Inc., 2017. p. 93-95 7970505.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Research › peer-review
}
TY - GEN
T1 - Approaches to development of models for text analysis of information in social network profiles in order to evaluate user's vulnerabilities profile
AU - Bagretsov, Georgiy I.
AU - Shindarev, Nikita A.
AU - Abramov, Maksim V.
AU - Tulupyeva, Tatyana V.
N1 - Bagretsov G.I., Shindarev N.A., Abramov M.V., Tulupyeva T.V. Approaches to development of models for text analysis of information in social network profiles in order to evaluate user’s vulnerabilities profile // Soft Computing and Measurements (SCM), 2017 XX IEEE International Conference on. IEEE, 2017. P. 93–95.
PY - 2017/7/6
Y1 - 2017/7/6
N2 - Nowadays, information systems protection against social engineering attacks is one of the main issues in the field of informational security. Intruders often refer to publicly available sources where users place personal information of various types. This information makes it possible for an intruder to determine the most effective way to attack user. In this paper we discuss one of the approaches to search and collect user's public information in an automated fashion on the example of social network VK.com. Besides, prototyping of the software for text information analysis for evaluation degrees of vulnerabilities included into the user's vulnerabilities profile was presented.
AB - Nowadays, information systems protection against social engineering attacks is one of the main issues in the field of informational security. Intruders often refer to publicly available sources where users place personal information of various types. This information makes it possible for an intruder to determine the most effective way to attack user. In this paper we discuss one of the approaches to search and collect user's public information in an automated fashion on the example of social network VK.com. Besides, prototyping of the software for text information analysis for evaluation degrees of vulnerabilities included into the user's vulnerabilities profile was presented.
KW - information protect
KW - information security
KW - profile of psychological characteristics
KW - social engineering attacks
KW - text data analysis
KW - user's protect
KW - user's vulnerabilities profile
KW - social engineering attacks
KW - information security
KW - user’s protect
KW - information protect
KW - text data analysis
KW - user’s vulnerabilities profile
KW - profile of psychological characteristics
UR - http://www.scopus.com/inward/record.url?scp=85027178796&partnerID=8YFLogxK
U2 - 10.1109/SCM.2017.7970505
DO - 10.1109/SCM.2017.7970505
M3 - Conference contribution
AN - SCOPUS:85027178796
SP - 93
EP - 95
BT - Proceedings of 2017 20th IEEE International Conference on Soft Computing and Measurements, SCM 2017
A2 - Shaposhnikov, S.
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 20th IEEE International Conference on Soft Computing and Measurements, SCM 2017
Y2 - 24 May 2017 through 26 May 2017
ER -
ID: 36752461