Development of sectoral intellectualized expert systems and decision making support systems in cybersecurity
B Akhmetov, V Lakhno, B Akhmetov… - Intelligent Systems in …, 2019 - Springer
The paper considers the prerequisites for the integration of various expert and decision
support systems for information security and cybersecurity. Analyzed the possibility of …
support systems for information security and cybersecurity. Analyzed the possibility of …
Genetic clustering algorithm
MA Anfyorov - Russian Technological Journal, 2020 - rtj-mirea.ru
The genetic algorithm of clustering of analysis objects in different data domains has been
offered within the hybrid concept of intelligent information technologies development aimed …
offered within the hybrid concept of intelligent information technologies development aimed …
Генетический алгоритм кластеризации
МА Анфёров - Russian Technological Journal, 2020 - rtj-mirea.ru
Аннотация В рамках гибридного подхода построения информационных
интеллектуальных технологий поддержки принятия решений предложен генетический …
интеллектуальных технологий поддержки принятия решений предложен генетический …
AUTOMATION OF THE CONTROL PROCESS OF THE MINING MACHINES BASED ON FUZZY LOGIC.
AV Bublikov, VV Tkachov - Scientific Bulletin of National …, 2019 - search.ebscohost.com
Purpose. To improve the efficiency of mining equipment functioning through the introduction
of fuzzy inference algorithms into the control of mining facilities being complex objects with …
of fuzzy inference algorithms into the control of mining facilities being complex objects with …
[PDF][PDF] Optimization of information and communication transport systems protection tasks
ABSTRACT A modified algorithm for estimating the limits of the dual problem solution with
the branching order determination for solving the tasks of providing cyber security and …
the branching order determination for solving the tasks of providing cyber security and …
[PDF][PDF] A model and algorithm for detecting spyware in medical information systems
V Lakhno, D Kasatkin, V Kozlovskyi… - International Journal of …, 2019 - academia.edu
The article outlines extensions to the model and algorithm of spyware detection procedures
which, in particular, presents a potential threat to medical information systems. The …
which, in particular, presents a potential threat to medical information systems. The …
Model of indicator of current risk of threats realization on the information communication system of transport
The paper proposed a model for estimating the quantitative indicator of current risks of
threats and cyberattacks realization on information communication systems of transport …
threats and cyberattacks realization on information communication systems of transport …
Modeling cyber security of information systems smart city based on the theory of games and markov processes
V Lakhno, D Kasatkin, A Blozva - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
The article considers some aspects of modeling information security circuits for information
and communication systems used in Smart City. As a basic research paradigm, the …
and communication systems used in Smart City. As a basic research paradigm, the …
Модель показника поточного ризику реалізації загроз інформаційно-комунікаційним системам
Анотація В статті запропонована модель для оцінювання кількісного показника
поточних ризиків реалізації загроз та кібератак на інформаційно-комунікаційні системи …
поточних ризиків реалізації загроз та кібератак на інформаційно-комунікаційні системи …
Computer support system for choosing the optimal managing strategy by the mutual investment procedure in smart city
Solutions support system model for mutual investment in Smart City (SmSy) technology is
considered. A mathematical solution is proposed. It is based on the consideration of a …
considered. A mathematical solution is proposed. It is based on the consideration of a …