A Novel Dynamic Watermarking for Secure Data Protection from Cyber Theft Based on Artificial Intelligence Supervision

R Madala, R Monica, SS Malwade… - 2023 Eighth …, 2023 - ieeexplore.ieee.org
One of the centre innovations of the Fourth Modern Insurgency (otherwise called Industry
4.0) is artificial intelligence (computer based intelligence), which can be utilized to shield …

Malware detection using artificial neural networks

I Dychka, D Chernyshev, I Tereikovskyi… - … on Computer Science …, 2019 - Springer
This paper deals with improvement of malware protection efficiency. The analysis of applied
scientific researches devoted to creation of malware protection systems suggests that the …

A Model for Managing the Procedure of Continuous Mutual Financial Investment in Cybersecurity for the Case with Fuzzy Information

B Akhmetov, V Lakhno, V Malyukov… - … : Proceedings of ICSCN …, 2022 - Springer
The paper looks at the development of a mathematical model of the process of continuous
mutual investment of projects in the sphere of information security and information protection …

[PDF][PDF] Методи розпізнавання кібератак: розпізнавання комп'ютерних вірусів

ІА Терейковський, ОГ Корченко, ВВ Погорелов - 2022 - ela.kpi.ua
Навчальний посібник містить матеріали для самостійної роботи здобувачів ступеня
бакалавр за освітньою програмою «Системне програмування та спеціалізовані …

[PDF][PDF] Analysis of technical indicators of efficiency and quality of intelligent systems

O Kryvoruchko, Y Kostiuk, A Desiatko… - Journal of Theoretical …, 2023 - jatit.org
The efficiency of intelligent systems refers to their ability to achieve set goals and perform
tasks with high quality and efficiency. It is determined by the effectiveness of the system in …

[PDF][PDF] Optimization of information and communication transport systems protection tasks

V Lakhno, S Tsiutsiura, Y Ryndych, A Blozva… - International Journal of …, 2019 - academia.edu
ABSTRACT A modified algorithm for estimating the limits of the dual problem solution with
the branching order determination for solving the tasks of providing cyber security and …

[PDF][PDF] A model and algorithm for detecting spyware in medical information systems

V Lakhno, D Kasatkin, V Kozlovskyi… - International Journal of …, 2019 - academia.edu
The article outlines extensions to the model and algorithm of spyware detection procedures
which, in particular, presents a potential threat to medical information systems. The …

Model of indicator of current risk of threats realization on the information communication system of transport

V Lakhno, V Matiievskyi, О Kryvoruchko, H Mohylnyi… - 2019 - dspace.luguniv.edu.ua
The paper proposed a model for estimating the quantitative indicator of current risks of
threats and cyberattacks realization on information communication systems of transport …

Towards Data Science for Cybersecurity: Machine Learning Advances as Glowing Perspective

MI Mihailescu, SL Nita - Proceedings of SAI Intelligent Systems …, 2022 - Springer
The current computing context has developed important opportunities and challenges by the
new attacks that occurred recently due to the pandemic situation (COVID-19), cybersecurity …

Method and model of analysis of possible threats in user authentication in electronic information educational environment of the university

VA Lakhno, DY Kasatkin, AI Blozva… - … Conference on Computer …, 2019 - Springer
The article presents the research results of the development of a method and mathematical
model of subject authentication in the electronic information educational environment of …