February 2024
·
2 Reads
Scientific and technical journal of information technologies mechanics and optics
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
February 2024
·
2 Reads
Scientific and technical journal of information technologies mechanics and optics
February 2024
·
40 Reads
·
1 Citation
Doklady Mathematics
Numerical data retrieved from the accounts of users of a popular Russian-language online social network have been used to automate the prediction of the PEN test (temperament test) results. This study aims to automate the assessment of personality traits of online social network users by comparing the test results and the content posted by the user on his or her account, using machine learning methods. Classifiers are constructed with CatBoost and random forest models for predicting the scores of extraversion–introversion and neuroticism. The theoretical significance of this result is the development of an approach to automating the assessment of human personality traits. The practical significance is the development of a program module to create an automated system for assessing the human personality traits through online social networks.
June 2023
·
3 Reads
Международный журнал Программные продукты и системы
March 2023
·
19 Reads
·
2 Citations
Scientific and Technical Information Processing
October 2022
·
11 Reads
·
1 Citation
The subject of the research is the predictors of the intensity of interaction between users in online social networks, which can be formalized in probability estimate of the spread of multistep social engineering attacks. The research methodology is based on comparing, using the methods of statistical analysis, the observed online interaction of users and the fixed personal choice of friends in the proposed interviewing situation, simulating an example of the real social engineering attack. The main result is the identification of the predictors of the users’ interaction intensity. Based on the results of the analysis, the following predictors were identified: the number of mutual friends, the number of common communities, the number of likes and the number of gifts. The significance of the research is the development of an integrated approach to increase the level of organization’s security against the multistep social engineering attacks. This forms the basis for the timely identification of the most vulnerable parts of the information system, and indirectly serves as the basis for creating an intelligent decision support system.
May 2021
·
12 Reads
·
8 Citations
June 2020
·
8 Reads
·
9 Citations
Advances in Intelligent Systems and Computing
The goal of this article is to propose an approach to linguistic values quantification and to consider an example of its application to the relationship types between users in the popular social network in Russia “VK”. To achieve this aim, we used the results of a sociological survey, by which were found the frequency of the order, then the probability theory apparatus was used. This research can be useful in studying of the influence of the types of users’ relationships on the execution of requests, also finds its use in building social graph of the organization’s employees and indirectly in obtaining estimates of the success of multi-pass Social engineering attacks propagation.
... Social media data can potentially provide valuable insights into a person's interests, preferences, and behaviours, which could be used to generate personalized career recommendations. A user's VKontakte profile, for instance, can offer insights into their interests, values, and personality traits [4][5][6], which could inform career guidance recommendations. However, limited research has examined the relationship between a user's group subscriptions and their career preferences. ...
May 2021
... При этом нередко для достижения целей атаки в нее вовлекается сразу цепочка пользователей, то есть осуществляется многоходовая социоинженерная атака [4,5]. Между людьми она, как правило, распространяется с разными оценками вероятностей успеха [4,6,7]. В качестве источника информации, по которому могут быть построены такого рода оценки, часто выступают социальные сети [4,8,9]. ...
June 2020
Advances in Intelligent Systems and Computing