Aneta Coufalikova’s research while affiliated with Mendel University in Brno and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (9)


Categories of contributions
Automated Extraction of Structured Data from the Social Network Instagram
  • Article
  • Full-text available

June 2024

·

59 Reads

European Conference on Cyber Warfare and Security

Petr Frantis

·

Michal Bures

·

Aneta Coufalikova

·

The paper explores the extraction of structured information from the social network Instagram through a suitable application programming interface, namely the unofficial Instagram Private API. It focuses on creating a computer program that identifies which posts a user has tagged as "Likes" and then stores this information for profiling specific user profiles. The introduction of the paper highlights the general use of social media in modern society and the importance of personal data for these platforms. It specifies the aim of the study, which is to extract information from Instagram and then analyse it for user profiling. It then describes the evolution of the social network Instagram and key features such as different types of posts. This paper further focuses on the solution and implementation by using Python programming language to minimize the load on Instagram servers and reduce the risk of detection of automated processes. It describes the process of setting up new Instagram accounts, the obstacles in obtaining login credentials, and the need to simulate human behaviour to bypass the network's defence mechanisms. It then focuses on the actual retrieval of information such as the users followed, their posts and information about which posts the user has marked as favourites. It mentions that extracting data from closed profiles is difficult and elaborates on the technical challenges associated with this task. A significant part of this paper is a discussion of Instagram's defence mechanisms that respond to automated computer programs. It describes access denial, account blocking, and identity verification prompts such as CAPTCHA tests. Finally, the conclusion summarizes the results obtained, which indicate the acquisition of approximately 90,000 records for user profiling. It discusses the shortcomings of a fully automated solution due to Instagram's account creation conditions and defence mechanisms. It mentions the need for further research and highlights key gaps and challenges in this area. Overall, the study highlights the technical and security challenges in extracting information from Instagram and emphasises the need for further research and improvements in the technical procedures for extracting data from the platform.

Download

How to safely communicate with a phishing attacker by email?

June 2023

·

61 Reads

European Conference on Cyber Warfare and Security

The published study is a part of the long-term research of emails with phishing attacks against the article's author. In the previous three years, 3 experiments were carried out to analyze phishing emails. The result is their detailed classification. The subsequent experiment was focused on defense against phishing attacks using the rules of the MS Outlook email client. The last experiment, which is the article's content, is devoted to analyzing communications with phishing attackers. A fake identity was created for the experiment and security rules were set up. A total of 100 phishing emails were answered, with a preference for those whose content was not aimed at fulfilling any request; that was clarified during the communications. The conducted literature search confirmed the assumption that no one is engaged in similar research, so the results of the research may be more interesting for the cybersecurity community. The articles of the literary research are focused on the issue of social engineering from an interdisciplinary perspective. A great deal of attention has also been oriented on the influence of social networks on people information perception or on their exploitation in cyber-attacks. The result of the study is a statistical analysis of communications and a detailed analysis of its content. Out of 100 replies to the phishing email, 32 (32%) were answered by the phisher. The longest communications had 6 cycles. If the phisher insisted aggressively on personal information, the communications was terminated. From the content of the communications, the attacker's procedures and his argumentation to obtain the required information were primarily examined. A detailed analysis of the texts from the communications aimed to answer the question of whether the phisher is a robot or a person. Further considerations are being made within the team on how to continue researching phishing attacks.



The Future Possibilities and Security Challenges of City Digitalization

December 2022

·

275 Reads

·

8 Citations

Smart Cities

To adapt to current changes, such as globalization, climate change, and demographic growth, modern cities must embrace the digitalization of city management. In this paper, we examine a concept for digitalizing a city based on Rotterdam’s digital twin showcase. Data-processing frameworks for different sources of data are presented. Security risks and the potential of smart cities for military usage are discussed. Lastly, using an example of available datasets for air quality and public lighting consumption, functions of the Rotterdam digital twin are compared with the Brno city digital platform. It was found that every city has its approach to digitalization, and it is probably impossible to unify every city’s digitalization process. This means that the digitalization of the city is very individual. Both systems in their current form make it possible to visualize the collected data about the city. So far, however, these systems do not use advanced functions such as AI-assisted decision-making and prediction of various events in the city. Even so, they are a source of very interesting data that can be used by third parties.





Military optical tenchnology for transmission of microwave signals

November 2006

·

7 Reads

This work involves analysis, optimization and design principles for mathematical and engineering models of subsystem and system level development of linear fibreoptic products Ortel comp., routinely used for transporting high dynamic range RF and microwave signals, often over long distances. These signals may be from military or commercial communication satellites, modern tracking systems, wireless cellular networks, or a variety of other sources.


EUROPEAN ON-LINE COURSES – A STEP TO CLOSER CO-OPERATION IN EDUCATION

8 Reads

·

5 Citations

The authors of the contribution want to give some basic information about the new Czech version of the on-line course named Net-Trainers and to express their assessment to it. The paper is focused on a few interesting aspects of the course that can inspire people in the field of education. The specific points of view of every author are included.

Citations (4)


... • Lighting: The maintenance of an adequate level of illuminance on public land is required by the Italian D.lgs 81/08, and the recommended levels are expressed in national regulations. In addition to the evaluation of the maintenance of these levels, the proper management of lighting systems includes a reduction in energy consumption, allowing the lights to be switched off or dimmed according to the presence and activities carried out both indoors and outdoors [55][56][57]. The management and control of lighting systems can also reduce light pollution during nighttime. ...

Reference:

A Digital Twin Framework to Improve Urban Sustainability and Resiliency: The Case Study of Venice
The Future Possibilities and Security Challenges of City Digitalization

Smart Cities

... Cybersecurity becomes a very challenging issue and the occurrence of different cyber attacks is more frequent [1,2]. Detection of anomalies in computer networks has been the main goal of many research activities due to its potential in detecting new types of cyber attacks. ...

A Comparison of Cyber Security Reports for 2020 of Central European Countries
  • Citing Article
  • April 2022

Advances in Science Technology and Engineering Systems Journal

... A software supply chain refers to the collection of dependencies a software system relies on to operate [100]. A supply chain attack occurs when an attacker compromises this dependency network to control the operations of a target software [86]. Typically, supply chain attacks rely on abusing the trust of their downstream users, who use a software dependency controlled by the attacker [89]. ...

Complex strategy against supply chain attacks
  • Citing Conference Paper
  • June 2021

... Every student can evaluate every module of the course and @BULLET express his/her opinions or suggestions for the module content and the methods used. The high quality of the Czech version of the Net-Trainers course was appreciated and positively evaluated by its participants (Hrubý, Coufalíková and Smejkalová Mazálková, 2006). ...

EUROPEAN ON-LINE COURSES – A STEP TO CLOSER CO-OPERATION IN EDUCATION
  • Citing Article