The impacts of artificial intelligence techniques in augmentation of cybersecurity: a comprehensive review

B Naik, A Mehta, H Yagnik, M Shah - Complex & Intelligent Systems, 2022 - Springer
Given the prevailing state of cybersecurity, it is reasonable to understand why cybersecurity
experts are seriously considering artificial intelligence as a potential field that can aid …

Development of sectoral intellectualized expert systems and decision making support systems in cybersecurity

B Akhmetov, V Lakhno, B Akhmetov… - Intelligent Systems in …, 2019 - Springer
The paper considers the prerequisites for the integration of various expert and decision
support systems for information security and cybersecurity. Analyzed the possibility of …

Adaptive expert systems development for cyber attacks recognition in information educational systems on the basis of signs' clustering

V Lakhno, S Zaitsev, Y Tkach, T Petrenko - Advances in Computer …, 2019 - Springer
The article proposes a new approach to solving the issue of efficiency in systems of
cyberattacks intelligent recognition, anomalies and threats for the educational and …

[PDF][PDF] Developing of the cyber security system based on clustering and formation of control deviation signs

VA Lakhno, PU Kravchuk, VP Malyukov… - Journal of Theoretical …, 2017 - jatit.org
The cyber security (CS) adaptive system is developed. It is based on advanced algorithms of
anomalies signs space partitioning and attacks on clusters. A new approach of solving the …

[PDF][PDF] Management of information protection based on the integrated implementation of decision support systems

V Lakhno, V Kozlovskyi, Y Boiko… - Восточно …, 2017 - irbis-nbuv.gov.ua
Розроблені метод та модель управління кіберзахистом об'єкта інформатизації, які
базуються на комплексному впровадженні системи підтримки прийняття рішень у …

[PDF][PDF] Optimization of information and communication transport systems protection tasks

V Lakhno, S Tsiutsiura, Y Ryndych, A Blozva… - International Journal of …, 2019 - academia.edu
ABSTRACT A modified algorithm for estimating the limits of the dual problem solution with
the branching order determination for solving the tasks of providing cyber security and …

[PDF][PDF] A model and algorithm for detecting spyware in medical information systems

V Lakhno, D Kasatkin, V Kozlovskyi… - International Journal of …, 2019 - academia.edu
The article outlines extensions to the model and algorithm of spyware detection procedures
which, in particular, presents a potential threat to medical information systems. The …

[PDF][PDF] Development of a system for the detection of cyber attacks based on the clustering and formation of reference deviations of attributes

V Lakhno, V Malyukov, V Domrachev… - Восточно …, 2017 - irbis-nbuv.gov.ua
Розроблено адаптивну систему виявлення кібератак, яка базується на удосконалених
алгоритмах розбиття простору ознак на кластери. Удосконалена процедура …

A Hybrid Recommender for Cybersecurity Based on Rating Approach

C Ayala, K Jiménez, E Loza-Aguirre… - Advances in Cybersecurity …, 2021 - Springer
The main function of a security analyst is to protect and make the best decisions for
preserving the integrity of computer systems within an organization. Typically, to provide a …

Model of indicator of current risk of threats realization on the information communication system of transport

V Lakhno, V Matiievskyi, О Kryvoruchko, H Mohylnyi… - 2019 - dspace.luguniv.edu.ua
The paper proposed a model for estimating the quantitative indicator of current risks of
threats and cyberattacks realization on information communication systems of transport …