Statistical techniques for detecting cyberattacks on computer networks based on an analysis of abnormal traffic behavior

Z Hu, R Odarchenko, S Gnatyuk… - International …, 2020 - search.proquest.com
Represented paper is currently topical, because of year on year increasing quantity and
diversity of attacks on computer networks that causes significant losses for companies. This …

A method of accuracy increment using segmented regression

J Al-Azzeh, A Mesleh, M Zaliskyi, R Odarchenko… - Algorithms, 2022 - mdpi.com
The main purpose of mathematical model building while employing statistical data analysis
is to obtain high accuracy of approximation within the range of observed data and sufficient …

A concept of the architecture and creation for siem system in critical infrastructure

R Berdibayev, S Gnatyuk, Y Yevchenko… - Systems, Decision and …, 2021 - Springer
Energy sector is important unit of critical infrastructure and the protection of its ICT
infrastructure is essential for states. Cloud and other advanced technologies are …

[PDF][PDF] Shadow image processing of X-ray screening system for aviation security

M Zaliskyi, O Shcherbyna, L Tereshchenko… - … Journal of Image …, 2022 - mecs-press.org
The aviation security is an important component of aviation safety providing. One of the main
goals of aviation security service is to detect dangerous and prohibited objects during …

Models for early web-attacks detection and intruders identification based on fuzzy logic

Z Avkurova, S Gnatyuk, B Abduraimova… - Procedia Computer …, 2022 - Elsevier
Modern information and communication technologies are implemented in vatious spheres
(in particular, sectors of the critical infrastructute), but these technologies are vulnerable to …

Nonparametric change point detection algorithms in the monitoring data

I Prokopenko - Advances in Computer Science for Engineering and …, 2021 - Springer
Monitoring systems are used for a lot of applications: environment monitoring, reliability
monitoring, traffic monitoring in telecommunication systems etc. An important task in all …

[PDF][PDF] Detecting hidden information in FAT

K Shekhanin, A Kuznetsov, V Krasnobayev… - International Journal of …, 2020 - academia.edu
Various steganographic methods are used to hide information. Some of them allow you to
reliably hide the fact of storage and transmission of information data. This paper analysis the …

Cloud-Based Cyber Incidents Response System and Software Tools

S Gnatyuk, R Berdibayev, T Smirnova… - … on Information and …, 2021 - Springer
Cloud technologies and their applications are implementing in various ICT infrastructures.
Today cyber threats mitigation in clouds is hot topic and it has scientific interest. Authors …

[PDF][PDF] Information technologies of data processing for linear deterioration process during aviation equipment operation

M Zaliskyi, O Solomentsev, Z Poberezhna, OC Okoro… - intelligence, 2024 - ceur-ws.org
Aviation radio equipment is used for the information support of civil aviation flights. The
stability of information support is determined by the reliability and efficiency of operational …

Analyzing the Behaviour of DDOS Cyber Attacks

MA Raza, TFN Bukht, M Ali, AU Rehman… - Technical …, 2021 - tj.uettaxila.edu.pk
The digital environment of cyber society is also being affected by intruders, cybercriminals,
and neighboring countries. Because of this, ongoing research in cybersecurity is playing an …