Fuzzy cognitive mapping as a scenario approach for information security risk analysis
S Shevchenko, Y Zhdanova… - … in Information and …, 2024 - elibrary.kubg.edu.ua
To avoid damaging their reputation in the field of information and cyber security, companies
tend to keep incidents and attacks that affect their operations under wraps. Insufficient …
tend to keep incidents and attacks that affect their operations under wraps. Insufficient …
Using Mathematical Optimization Methods to Maximize Audience Reach with Budget Constraints
H Shevchenko, N Dakhno… - 2022 IEEE 4th …, 2022 - ieeexplore.ieee.org
So-called simulation models are used. They are based on the processing of real data on the
level of audience coverage. These data are the result of statistical studies of potential …
level of audience coverage. These data are the result of statistical studies of potential …
Information Security Risk Management using Cognitive Modeling
S Shevchenko, Y Zhdanova… - CEUR Workshop …, 2023 - eprints.oa.edu.ua
Making decisions by an individual is an element of managing any process in society;
therefore, theories of cognitive science are applicable in various fields, including information …
therefore, theories of cognitive science are applicable in various fields, including information …
[PDF][PDF] Risk Assessment Information System of Enterprise Business Processes
E Tereshchenko, O Sosnovska, N Ushenko… - 2022 - ceur-ws.org
The paper substantiates the feasibility of forming and implementing a comprehensive
information system for assessing the risks of business processes at the enterprise. The …
information system for assessing the risks of business processes at the enterprise. The …
Mathematical methods in cybersecurity: catastrophe theory
СМ Шевченко, ЮД Жданова… - … освіта, наука, техніка, 2023 - elibrary.kubg.edu.ua
The improvement of protection systems is based on the introduction and use of a
mathematical apparatus. Ensuring the confidentiality, integrity and availability of information …
mathematical apparatus. Ensuring the confidentiality, integrity and availability of information …
Оцінювання ризиків інформаційної безпеки з використанням методів математичної статистики.
Інформаційна безпека підприємств для забезпечення конфіденційності, цілісності та
доступності інформації є невід'ємною частиною успішної бізнес-діяльності …
доступності інформації є невід'ємною частиною успішної бізнес-діяльності …
Математичні методи в кібербезпеці: теорія катастроф
S Shevchenko, Y Zhdanovа… - … : освіта, наука, техніка …, 2023 - csecurity.kubg.edu.ua
Анотація Удосконалення систем захисту інформації базується на впровадженні і
застосуванні математичного апарату. Забезпечення конфіденційності, цілісності і …
застосуванні математичного апарату. Забезпечення конфіденційності, цілісності і …
Methods of Modeling Database System Security
S Rzaieva, D Rzaiev, Y Kostyuk… - … in Information and …, 2024 - elibrary.kubg.edu.ua
Ensuring the protection of information stored in databases from unauthorized access, loss,
and damages, as well as ensuring the confidentiality, integrity, and availability of data is a …
and damages, as well as ensuring the confidentiality, integrity, and availability of data is a …
Protection System for Analysis of External Link Placing
I Liminovych, V Poltorak, N Kushnir… - … in Information and …, 2024 - elibrary.kubg.edu.ua
In the rapidly evolving digital landscape, effective Internet marketing strategies, particularly
Search Engine Optimization (SEO), have become crucial for businesses. A novel system for …
Search Engine Optimization (SEO), have become crucial for businesses. A novel system for …
[PDF][PDF] Association Rule System for Effective Risk Management of a Cinema Chain.
The object of research is risk management in the activity of a cinema chain. The solution to
the tasks set in the research requires a scientific systematic approach using modern data …
the tasks set in the research requires a scientific systematic approach using modern data …