Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Anna Korchenko"'
Autor:
Serhii Yevseiev, Yevgen Melenti, Oleksandr Voitko, Vitalii Hrebeniuk, Anna Korchenko, Serhii Mykus, Oleksandr Milov, Oleksandr Prokopenko, Оleksandr Sievierinov, Dmytro Chopenko
Publikováno v:
Eastern-European Journal of Enterprise Technologies, Vol 3, Iss 9(111), Pp 63-83 (2021)
To effectively protect critical infrastructure facilities (CIF), it is important to understand the focus of cybersecurity efforts. The concept of building security systems based on a variety of models describing various CIF functioning aspects is pre
Autor:
Anna Korchenko, Vladyslav Breslavskyi, Serhii Yevseiev, Nazym Zhumangalieva, Anatolii Zvarych, Svitlana Kazmirchuk, Oleg Kurchenko, Oleksandr Laptiev, Оleksand Sievierinov, Sirhii Tkachuk
Publikováno v:
Eastern-European Journal of Enterprise Technologies, Vol 1, Iss 2 (109), Pp 14-23 (2021)
One of the pressing areas that is developing in the field of information security is associated with the use of Honeypots (virtual decoys, online traps), and the selection of criteria for determining the most effective Honeypots and their further cla
MODELING THE PROTECTION OF PERSONAL DATA FROM TRUST AND THE AMOUNT OF INFORMATION ON SOCIAL NETWORKS
Publikováno v:
EUREKA: Physics and Engineering, Iss 1, Pp 24-31 (2021)
The article analyzes the parameters of social networks. The analysis is performed to identify critical threats. Threats may lead to leakage or damage to personal data. The complexity of this issue lies in the ever-increasing volume of data. Analysts
Autor:
Nazym Zhumangalieva, Anna Korchenko
Publikováno v:
THE BULLETIN. 5:16-24
Nowadays, one of the relevant areas that is developing in the field of information security is associated with the use of Honeypot (virtual lures, online traps), and the selection of criteria for determination of the most effective Honeypot and their
Autor:
Aliya Doszhanova, Nazym Kenzhegaliyevna Zhumangaliyeva, Anna Korchenko, Kazakhstan Telecommunications
Publikováno v:
THE BULLETIN. 6:6-23
Publikováno v:
Вестник КазНУ. Серия математика, механика, информатика, Vol 103, Iss 3, Pp 55-74 (2019)
With the development of information technologies, the amount of vulnerabilities and threats to various data processing systems is increasing, therefore specialized means of security are required to ensure their normal operation and to prevent intrusi
Publikováno v:
Advances in Computer Science for Engineering and Education III ISBN: 9783030555054
The article deals with improvement of personality and emotion recognizers based on the keystroke pattern. The article shows that improvement of those recognizers can be implemented using neural network solutions. Based on the analysis of literature s
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a16395a5ee772fdd4f292e8176bebbdc
https://doi.org/10.1007/978-3-030-55506-1_45
https://doi.org/10.1007/978-3-030-55506-1_45
Publikováno v:
IDAACS
Intensive development of information systems has led to an increase in malicious software, which is associated with the emergence of new types of cyber attacks. Expanding impact of cyber attacks aimed at a variety of resources information system init
Publikováno v:
IDAACS
The unauthorized access to information systems resources, for instants cyberattacks, can impact on its surrounding area, causing the certain anomalies. Mostly this area is not formalizing and not clearly defined. To detect cyberattacks required speci
Autor:
Аnna Tereshchuk, Anton Pereverzev, Mazin Al Hadidi, Yasir Khalil Ibrahim, Valeriy Lakhno, Anna Korchenko
Publikováno v:
International Review on Computers and Software (IRECOS). 11:1167