Sd-abm-ism: An integrated system dynamics and agent-based modeling framework for information security management in complex information systems with multi …

N Aftabi, N Moradi, F Mahroo, F Kianfar - Expert Systems with Applications, 2025 - Elsevier
The increasing complexity and dynamic nature of modern Information Systems (IS) and
evolving cybersecurity threats pose significant challenges for organizations in managing …

Перспективные направления исследований в области компьютерной безопасности

ИВ Котенко, РМ Юсупов - Защита информации. Инсайд, 2006 - elibrary.ru
Одним из важнейших направлений исследований в области информационной
безопасности являются работы, связанные с изучением различных аспектов …

Software development kit for multi-agent systems design and implementation

V Gorodetski, O Karsayev, I Kotenko… - International Workshop of …, 2001 - Springer
The paper presents the developed technology and software tool for design and
implementation of knowledge-based multi-agent systems. The software tool comprises two …

A mobile agent approach to intrusion detection in network systems

G Kolaczek, A Pieczynska-Kuchtiak… - … Conference, KES 2005 …, 2005 - Springer
A major problem with current approaches to the automatic intrusion detection is that it is
difficult to make a difference between a normal user behaviour and potential attacker. In this …

Fast analytical computation of Richard's smooth molecular surface

A Varshney, FP Brooks - Proceedings Visualization'93, 1993 - ieeexplore.ieee.org
An algorithm for rapid computation of Richards's smooth molecular surface is described. The
entire surface is computed analytically, triangulated, and displayed at interactive rates. The …

[PDF][PDF] Integrating relational databases with support for updates

MS Gamal-Eldin, G Thomas, R Elmasri - DPDS, 1988 - scholar.archive.org
Most work on database integration has considered only support for data retrieval, not
support for updates, and often the use of a special semantically rich data model has been …

[PDF][PDF] Complex neural network model of user behavior in distributed systems

A Shelestov, S Skakun, O Kussul - Proc of XIII-th Int Conf Knowledge …, 2007 - foibg.com
We present a complex neural network model of user behavior in distributed systems. The
model reflects both dynamical and statistical features of user behavior and consists of three …

Anomaly detection in distributed computer communication systems

A Grzech - Cybernetics and Systems, 2006 - Taylor & Francis
Anomaly detection is a basic functionality of intrusion detection systems. The aim of such
systems in distributed computer communication systems is to recognize and notify about …

Attack pattern analysis framework for multiagent intrusion detection system

G Kolaczek, K Juszczyszyn - International Journal of …, 2008 - Taylor & Francis
The paper proposes the use of attack pattern ontology and formal framework for network
traffic anomalies detection within a distributed multiagent Intrusion Detection System …

[PDF][PDF] Combined neural network model for diagnosing computer incidents

V Avramenko, A Malikov, I Kotenko… - 2020 CEUR Workshop …, 2020 - ceur-ws.org
The basis for making a decision on responding to computer incidents is information about
characteristics of the identified security breach, the values of which are determined during …