{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T18:41:30Z","timestamp":1751568090786,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031354663"},{"type":"electronic","value":"9783031354670"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-35467-0_37","type":"book-chapter","created":{"date-parts":[[2023,6,17]],"date-time":"2023-06-17T05:02:04Z","timestamp":1686978124000},"page":"619-634","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Developing Security Recommender System Using Content-Based Filtering Mechanisms"],"prefix":"10.1007","author":[{"given":"Maksim","family":"Iavich","sequence":"first","affiliation":[]},{"given":"Giorgi","family":"Iashvili","sequence":"additional","affiliation":[]},{"given":"Roman","family":"Odarchenko","sequence":"additional","affiliation":[]},{"given":"Sergiy","family":"Gnatyuk","sequence":"additional","affiliation":[]},{"given":"Avtandil","family":"Gagnidze","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,18]]},"reference":[{"key":"37_CR1","doi-asserted-by":"publisher","first-page":"202671","DOI":"10.1109\/access.2020.3031811","volume":"8","author":"X Wang","year":"2020","unstructured":"Wang, X., Li, Z., Yang, Y.: Deep learning based side-channel analysis: a survey. IEEE Access 8, 202671\u2013202694 (2020). https:\/\/doi.org\/10.1109\/access.2020.3031811","journal-title":"IEEE Access"},{"issue":"8","key":"37_CR2","doi-asserted-by":"publisher","first-page":"1229","DOI":"10.1109\/JPROC.2014.2334493","volume":"102","author":"S Bhunia","year":"2014","unstructured":"Bhunia, S., Hsiao, M.S., Narasimhan, S.: Hardware Trojan attacks: threat analysis and countermeasures. Proc. IEEE 102(8), 1229\u20131247 (2014). https:\/\/doi.org\/10.1109\/JPROC.2014.2334493","journal-title":"Proc. IEEE"},{"key":"37_CR3","doi-asserted-by":"publisher","unstructured":"Moradi, A., Kuhn, M.G., Paar, C.: Hash function design strategies for counteracting side-channel attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2011(4), 87\u2013108 (2011). https:\/\/doi.org\/10.1007\/978-3-642-23822-2_6","DOI":"10.1007\/978-3-642-23822-2_6"},{"key":"37_CR4","doi-asserted-by":"crossref","unstructured":"Abomhara, M., K\u00f8ien, G.M.: Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. J. Cyber Secur. Mobil. 4(1), 65\u201368 (2015)","DOI":"10.13052\/jcsm2245-1439.414"},{"issue":"5","key":"37_CR5","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/MDAT.2017.2729398","volume":"34","author":"H Wang","year":"2017","unstructured":"Wang, H., Forte, D., Tehranipoor, M.M., Shi, Q.: Probing attacks on integrated circuits: challenges and research opportunities. IEEE Des. Test 34(5), 63\u201371 (2017). https:\/\/doi.org\/10.1109\/MDAT.2017.2729398","journal-title":"IEEE Des. Test"},{"key":"37_CR6","unstructured":"Dan, P.: Theoretical use of cache memory as a cryptanalytic side-channel. IACR Cryptology ePrint Archive, vol. 169, pp. 170\u2013184 (2002)"},{"key":"37_CR7","doi-asserted-by":"publisher","unstructured":"Samer, M., Fayez, G., Aaron, G.T.: Hardware attacks: an algebraic approach. J. Cryptogr. Eng. 6, 325\u2013337 (2006). https:\/\/doi.org\/10.1007\/s13389-016-0117-6","DOI":"10.1007\/s13389-016-0117-6"},{"key":"37_CR8","doi-asserted-by":"publisher","unstructured":"Samer, M., Gebali, F., Gulliver, T., et al.: Hardware attack risk assessment. In: ICES, vol. 1109 (2015). https:\/\/doi.org\/10.1109\/ICCES.2015.7393073","DOI":"10.1109\/ICCES.2015.7393073"},{"issue":"1","key":"37_CR9","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/MDAT.2018.2871403","volume":"36","author":"M Imani","year":"2019","unstructured":"Imani, M., Shirani-Mehr, H., Naderi, H., Tehranipoor, M.: A survey of hardware Trojan taxonomy and detection. IEEE Des. Test 36(1), 55\u201373 (2019). https:\/\/doi.org\/10.1109\/MDAT.2018.2871403","journal-title":"IEEE Des. Test"},{"key":"37_CR10","doi-asserted-by":"publisher","unstructured":"Austin, T.: Hardware security: an overview of the state of the art. In: IEEE Security & Privacy, vol. 13, no. 4, pp. 24\u201329, July-Aug. 2015. https:\/\/doi.org\/10.1109\/MSP.2015.78","DOI":"10.1109\/MSP.2015.78"},{"key":"37_CR11","doi-asserted-by":"publisher","first-page":"10796","DOI":"10.1109\/ACCESS.2020.2965016","volume":"8","author":"Z Huang","year":"2020","unstructured":"Huang, Z., Wang, Q., Chen, Y., Jiang, X.: A survey on machine learning against hardware Trojan attacks: recent advances and challenges. IEEE Access 8, 10796\u201310826 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2965016","journal-title":"IEEE Access"},{"key":"37_CR12","unstructured":"Iavich, M., Iashvili, G., Gagnidze, A., et al.: Lattice based Merkle. In: IVUS 2019, Kaunas 25 April 2019: Proceedings. - CEUR-WS \u2013 2019, vol. 2470, pp. 13\u201316 (2019)"},{"key":"37_CR13","doi-asserted-by":"publisher","unstructured":"Calero Valdez, A., Ziefle, M., Verbert, K.: HCI for recommender systems: the past, the present and the future. In: Proceedings of the 10th ACM Conference on Recommender Systems (RecSys 2016). Association for Computing Machinery, New York, NY, USA, pp. 123\u2013126 (2016). https:\/\/doi.org\/10.1145\/2959100.2959158","DOI":"10.1145\/2959100.2959158"},{"key":"37_CR14","doi-asserted-by":"crossref","unstructured":"Bhunia, S., Abramovici, M., Agrawal, D., et al.: Protection against hardware Trojan attacks: towards a comprehensive solution. IEEE Des. Test 30, 6\u201317 (2013)","DOI":"10.1109\/MDT.2012.2196252"},{"key":"37_CR15","unstructured":"Gagnidze, A., Iavich, M., Iashvili, G.: Novel version of Merkle cryptosystem. Bull. Georgian Natl. Acad. Sci. 11(4), 28\u201333 (2017)"},{"key":"37_CR16","doi-asserted-by":"publisher","unstructured":"Nawir, M., Amir, A., Yaakob, N., Lynn, O.B.: Internet of things (IoT): taxonomy of security attacks. In: 2016 3rd International Conference on Electronic Design (ICED), Phuket, Thailand, 2016, pp. 321\u2013326 (2016). https:\/\/doi.org\/10.1109\/ICED.2016.7804660","DOI":"10.1109\/ICED.2016.7804660"},{"key":"37_CR17","doi-asserted-by":"crossref","unstructured":"Ronen, E., Shamir, A.: Extended functionality attacks on IoT devices: the case of smart lights. In: European Symposium on Security and Privacy, Saarbr\u00fccken 21\u201324 March 2016: Proceedings, pp. 3\u201312. IEEE (2016)","DOI":"10.1109\/EuroSP.2016.13"},{"key":"37_CR18","unstructured":"Iashvili, G., Iavich, M., Gagnidze, A., Gnatyuk, S.: Increasing usability of TLS certificate generation process using secure design. In: CEUR Workshop Proceedings, vol. 2698, pp. 35\u201341 (2020)"},{"key":"37_CR19","doi-asserted-by":"publisher","unstructured":"Gao, P., et al.: Enabling efficient cyber threat hunting with cyber threat intelligence. In: 2021 IEEE 37th International Conference on Data Engineering (ICDE), Chania, Greece, 2021, pp. 193\u2013204 (2021). https:\/\/doi.org\/10.1109\/ICDE51399.2021.00024","DOI":"10.1109\/ICDE51399.2021.00024"},{"key":"37_CR20","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"580","DOI":"10.1007\/978-3-030-75075-6_47","volume-title":"Advanced Information Networking and Applications","author":"M Iavich","year":"2021","unstructured":"Iavich, M., Gnatyuk, S., Odarchenko, R., Bocu, R., Simonov, S.: The novel system of attacks detection in 5G. In: Barolli, L., Woungang, I., Enokido, T. (eds.) AINA 2021. LNNS, vol. 226, pp. 580\u2013591. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-75075-6_47"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Information Technology for Education, Science, and Technics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-35467-0_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,17]],"date-time":"2023-06-17T05:07:08Z","timestamp":1686978428000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-35467-0_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031354663","9783031354670"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-35467-0_37","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"18 June 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ITEST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Scientific-Practical Conference \"Information Technology for Education, Science and Technics\"","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cherkasy","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ukraine","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"itest2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/itest.chdtu.edu.ua\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}