Sd-abm-ism: An integrated system dynamics and agent-based modeling framework for information security management in complex information systems with multi …
The increasing complexity and dynamic nature of modern Information Systems (IS) and
evolving cybersecurity threats pose significant challenges for organizations in managing …
evolving cybersecurity threats pose significant challenges for organizations in managing …
Перспективные направления исследований в области компьютерной безопасности
ИВ Котенко, РМ Юсупов - Защита информации. Инсайд, 2006 - elibrary.ru
Одним из важнейших направлений исследований в области информационной
безопасности являются работы, связанные с изучением различных аспектов …
безопасности являются работы, связанные с изучением различных аспектов …
Software development kit for multi-agent systems design and implementation
V Gorodetski, O Karsayev, I Kotenko… - International Workshop of …, 2001 - Springer
The paper presents the developed technology and software tool for design and
implementation of knowledge-based multi-agent systems. The software tool comprises two …
implementation of knowledge-based multi-agent systems. The software tool comprises two …
A mobile agent approach to intrusion detection in network systems
G Kolaczek, A Pieczynska-Kuchtiak… - … Conference, KES 2005 …, 2005 - Springer
A major problem with current approaches to the automatic intrusion detection is that it is
difficult to make a difference between a normal user behaviour and potential attacker. In this …
difficult to make a difference between a normal user behaviour and potential attacker. In this …
Fast analytical computation of Richard's smooth molecular surface
A Varshney, FP Brooks - Proceedings Visualization'93, 1993 - ieeexplore.ieee.org
An algorithm for rapid computation of Richards's smooth molecular surface is described. The
entire surface is computed analytically, triangulated, and displayed at interactive rates. The …
entire surface is computed analytically, triangulated, and displayed at interactive rates. The …
[PDF][PDF] Integrating relational databases with support for updates
MS Gamal-Eldin, G Thomas, R Elmasri - DPDS, 1988 - scholar.archive.org
Most work on database integration has considered only support for data retrieval, not
support for updates, and often the use of a special semantically rich data model has been …
support for updates, and often the use of a special semantically rich data model has been …
[PDF][PDF] Complex neural network model of user behavior in distributed systems
A Shelestov, S Skakun, O Kussul - Proc of XIII-th Int Conf Knowledge …, 2007 - foibg.com
We present a complex neural network model of user behavior in distributed systems. The
model reflects both dynamical and statistical features of user behavior and consists of three …
model reflects both dynamical and statistical features of user behavior and consists of three …
Anomaly detection in distributed computer communication systems
A Grzech - Cybernetics and Systems, 2006 - Taylor & Francis
Anomaly detection is a basic functionality of intrusion detection systems. The aim of such
systems in distributed computer communication systems is to recognize and notify about …
systems in distributed computer communication systems is to recognize and notify about …
Attack pattern analysis framework for multiagent intrusion detection system
G Kolaczek, K Juszczyszyn - International Journal of …, 2008 - Taylor & Francis
The paper proposes the use of attack pattern ontology and formal framework for network
traffic anomalies detection within a distributed multiagent Intrusion Detection System …
traffic anomalies detection within a distributed multiagent Intrusion Detection System …
[PDF][PDF] Combined neural network model for diagnosing computer incidents
V Avramenko, A Malikov, I Kotenko… - 2020 CEUR Workshop …, 2020 - ceur-ws.org
The basis for making a decision on responding to computer incidents is information about
characteristics of the identified security breach, the values of which are determined during …
characteristics of the identified security breach, the values of which are determined during …