{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T11:11:11Z","timestamp":1726053071707},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030322571"},{"type":"electronic","value":"9783030322588"}],"license":[{"start":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T00:00:00Z","timestamp":1569974400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-32258-8_32","type":"book-chapter","created":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T05:31:35Z","timestamp":1569907895000},"page":"272-277","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Soft Estimates for Social Engineering Attack Propagation Probabilities Depending on Interaction Rates Among Instagram Users"],"prefix":"10.1007","author":[{"given":"Anastasiia O.","family":"Khlobystova","sequence":"first","affiliation":[]},{"given":"Maxim V.","family":"Abramov","sequence":"additional","affiliation":[]},{"given":"Alexander L.","family":"Tulupyev","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,2]]},"reference":[{"key":"32_CR1","unstructured":"Abramov, M.V., Tulupyeva, T.V., Tulupyev, A.L.: Social engineering attacks: social networks and user security estimates, 266 p. SUAI, St. Petersburg (2018)"},{"issue":"7","key":"32_CR2","doi-asserted-by":"publisher","first-page":"2296","DOI":"10.1177\/1461444818795487","volume":"20","author":"MA Beam","year":"2017","unstructured":"Beam, M.A., Child, J.T., Hutchens, M.J., Hmielowski, J.D.: Context collapse and privacy management: diversity in facebook friends increases online news reading and sharing. New Media Soc. 20(7), 2296\u20132314 (2017). \n                    https:\/\/doi.org\/10.1177\/1461444818795487","journal-title":"New Media Soc."},{"issue":"4","key":"32_CR3","first-page":"577","volume":"15","author":"Z Cai","year":"2018","unstructured":"Cai, Z., He, Z., Guan, X., Li, Y.: Collective data-sanitization for preventing sensitive information inference attacks in social networks. IEEE Trans. Dependable Secure Comput. 15(4), 577\u2013590 (2018)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"1","key":"32_CR4","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1109\/TDSC.2016.2613521","volume":"5","author":"HT Chang","year":"2016","unstructured":"Chang, H.T., Li, Y.W., Mishra, N.: mCAF: a multi-dimensional clustering algorithm for friends of social network services. SpringerPlus 5(1), 757 (2016). \n                    https:\/\/doi.org\/10.1109\/TDSC.2016.2613521","journal-title":"SpringerPlus"},{"key":"32_CR5","unstructured":"Cybersecurity threatscape: Q2 2018. Positive Technologies. \n                    https:\/\/www.ptsecurity.com\/upload\/corporate\/ww-en\/analytics\/Cybersecurity-threatscape-2018-Q2-eng.pdf\n                    \n                  . Accessed 15 Dec 2018"},{"key":"32_CR6","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.cose.2016.12.013","volume":"69","author":"M Edwards","year":"2017","unstructured":"Edwards, M., Larson, R., Green, B., Rashid, A., Baron, A.: Panning for gold: automatically analysing online social engineering attack surfaces. Comput. Secur. 69, 18\u201334 (2017). \n                    https:\/\/doi.org\/10.1016\/j.cose.2016.12.013","journal-title":"Comput. Secur."},{"key":"32_CR7","unstructured":"High-Tech Crime Trends 2018. Group-IB. \n                    https:\/\/www.group-ib.com\/resources\/threat-research\/2018-report.html\n                    \n                  . Accessed 26 Dec 2018"},{"issue":"3","key":"32_CR8","doi-asserted-by":"publisher","first-page":"857","DOI":"10.1016\/j.ejor.2007.11.018","volume":"195","author":"N Hovanov","year":"2009","unstructured":"Hovanov, N., Yudaeva, M., Hovanov, K.: Multicriteria estimation of probabilities on basis of expert non-numeric, non-exact and non-complete knowledge. Eur. J. Oper. Res. 195(3), 857\u2013863 (2009). \n                    https:\/\/doi.org\/10.1016\/j.ejor.2007.11.018","journal-title":"Eur. J. Oper. Res."},{"key":"32_CR9","unstructured":"Kharitonov, N., Zolotin, A., Tulupyev, A.: Software implementation of algebraic Bayesian networks consistency algorithms. In: 2017 XX IEEE International Conference on Soft Computing and Measurements (SCM), pp. 8\u201310 (2017)"},{"issue":"9","key":"32_CR10","doi-asserted-by":"publisher","first-page":"834","DOI":"10.1023\/B:METE.0000008440.41847.c7","volume":"46","author":"NV Khovanov","year":"2003","unstructured":"Khovanov, N.V.: Measurement of a discrete indicator utilizing nonnumerical, inaccurate, and incomplete information. Measur. Tech. 46(9), 834\u2013838 (2003). \n                    https:\/\/doi.org\/10.1023\/B:METE.0000008440.41847.c7","journal-title":"Measur. Tech."},{"key":"32_CR11","doi-asserted-by":"publisher","first-page":"74","DOI":"10.31799\/1684-8853-2018-6-74-81","volume":"6","author":"AO Khlobystova","year":"2018","unstructured":"Khlobystova, A.O., Abramov, M.V., Tulupyev, A.L., Zolotin, A.A.: Search for the shortest trajectory of a social engineering attack between a pair of users in a graph with transition probabilities. Inf. Control Syst. 6, 74\u201381 (2018). \n                    https:\/\/doi.org\/10.31799\/1684-8853-2018-6-74-81","journal-title":"Inf. Control Syst."},{"issue":"3","key":"32_CR12","doi-asserted-by":"publisher","first-page":"655","DOI":"10.17559\/TV-20170124144723","volume":"25","author":"S Krakan","year":"2018","unstructured":"Krakan, S., Humski, L., Sko\u010dir, Z.: Determination of friendship intensity between online social network users based on their interaction. Tehni\u010dki vjesnik 25(3), 655\u2013662 (2018). \n                    https:\/\/doi.org\/10.17559\/TV-20170124144723","journal-title":"Tehni\u010dki vjesnik"},{"key":"32_CR13","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/978-3-319-75408-6_20","volume-title":"Recent Developments and the New Direction in Soft-Computing Foundations and Applications","author":"Nicolas Madrid","year":"2018","unstructured":"Madrid, N., Perfilieva, I., Kreinovich, V.: How to describe measurement uncertainty and uncertainty of expert estimates? In: Zadeh, L., Yager, R., Shahbazova, S., Reformat, M., Kreinovich, V. (eds.) Recent Developments and the New Direction in Soft-Computing Foundations and Applications. Studies in Fuzziness and Soft Computing, vol. 361, pp. 247\u2013257. Springer, Cham (2018)"},{"issue":"5","key":"32_CR14","doi-asserted-by":"publisher","first-page":"630","DOI":"10.1108\/JEIM-10-2014-0105","volume":"29","author":"A Maiz","year":"2016","unstructured":"Maiz, A., Arranz, N., Fdez de Arroyabe, J.C.: Factors affecting social interaction on social network sites: the Facebook case. J. Enterpr. Inf. Manag. 29(5), 630\u2013649 (2016). \n                    https:\/\/doi.org\/10.1108\/JEIM-10-2014-0105","journal-title":"J. Enterpr. Inf. Manag."},{"issue":"1","key":"32_CR15","doi-asserted-by":"publisher","first-page":"9349","DOI":"10.1038\/s41598-018-27290-8","volume":"8","author":"H Mattie","year":"2018","unstructured":"Mattie, H., Engo-Monsen, K., Ling, R., Onnela, J.P.: Understanding tie strength in social networks using a local \u201cbow tie\u201d framework. Sci. Rep. 8(1), 9349 (2018). \n                    https:\/\/doi.org\/10.1038\/s41598-018-27290-8","journal-title":"Sci. Rep."}],"container-title":["Studies in Computational Intelligence","Intelligent Distributed Computing XIII"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-32258-8_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T05:35:19Z","timestamp":1569908119000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-32258-8_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,2]]},"ISBN":["9783030322571","9783030322588"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-32258-8_32","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2019,10,2]]},"assertion":[{"value":"2 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IDC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Intelligent and Distributed Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"idc2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/idc2019.ru\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}