Statistical techniques for detecting cyberattacks on computer networks based on an analysis of abnormal traffic behavior
Represented paper is currently topical, because of year on year increasing quantity and
diversity of attacks on computer networks that causes significant losses for companies. This …
diversity of attacks on computer networks that causes significant losses for companies. This …
A method of accuracy increment using segmented regression
The main purpose of mathematical model building while employing statistical data analysis
is to obtain high accuracy of approximation within the range of observed data and sufficient …
is to obtain high accuracy of approximation within the range of observed data and sufficient …
A concept of the architecture and creation for siem system in critical infrastructure
R Berdibayev, S Gnatyuk, Y Yevchenko… - Systems, Decision and …, 2021 - Springer
Energy sector is important unit of critical infrastructure and the protection of its ICT
infrastructure is essential for states. Cloud and other advanced technologies are …
infrastructure is essential for states. Cloud and other advanced technologies are …
[PDF][PDF] Shadow image processing of X-ray screening system for aviation security
M Zaliskyi, O Shcherbyna, L Tereshchenko… - … Journal of Image …, 2022 - mecs-press.org
The aviation security is an important component of aviation safety providing. One of the main
goals of aviation security service is to detect dangerous and prohibited objects during …
goals of aviation security service is to detect dangerous and prohibited objects during …
Models for early web-attacks detection and intruders identification based on fuzzy logic
Z Avkurova, S Gnatyuk, B Abduraimova… - Procedia Computer …, 2022 - Elsevier
Modern information and communication technologies are implemented in vatious spheres
(in particular, sectors of the critical infrastructute), but these technologies are vulnerable to …
(in particular, sectors of the critical infrastructute), but these technologies are vulnerable to …
Nonparametric change point detection algorithms in the monitoring data
I Prokopenko - Advances in Computer Science for Engineering and …, 2021 - Springer
Monitoring systems are used for a lot of applications: environment monitoring, reliability
monitoring, traffic monitoring in telecommunication systems etc. An important task in all …
monitoring, traffic monitoring in telecommunication systems etc. An important task in all …
[PDF][PDF] Detecting hidden information in FAT
K Shekhanin, A Kuznetsov, V Krasnobayev… - International Journal of …, 2020 - academia.edu
Various steganographic methods are used to hide information. Some of them allow you to
reliably hide the fact of storage and transmission of information data. This paper analysis the …
reliably hide the fact of storage and transmission of information data. This paper analysis the …
Cloud-Based Cyber Incidents Response System and Software Tools
S Gnatyuk, R Berdibayev, T Smirnova… - … on Information and …, 2021 - Springer
Cloud technologies and their applications are implementing in various ICT infrastructures.
Today cyber threats mitigation in clouds is hot topic and it has scientific interest. Authors …
Today cyber threats mitigation in clouds is hot topic and it has scientific interest. Authors …
[PDF][PDF] Information technologies of data processing for linear deterioration process during aviation equipment operation
M Zaliskyi, O Solomentsev, Z Poberezhna, OC Okoro… - intelligence, 2024 - ceur-ws.org
Aviation radio equipment is used for the information support of civil aviation flights. The
stability of information support is determined by the reliability and efficiency of operational …
stability of information support is determined by the reliability and efficiency of operational …
Analyzing the Behaviour of DDOS Cyber Attacks
The digital environment of cyber society is also being affected by intruders, cybercriminals,
and neighboring countries. Because of this, ongoing research in cybersecurity is playing an …
and neighboring countries. Because of this, ongoing research in cybersecurity is playing an …