Zobrazeno 1 - 10
of 33
pro vyhledávání: '"Evgeny Pavlenko"'
Publikováno v:
Sensors, Vol 24, Iss 22, p 7116 (2024)
The paper proposes a technique for protecting reconfigurable networks that implements topology rebuilding, which combines immunization and network gaming methods, as a solution for maintaining cyber resilience. Immunization presumes an adaptive set o
Externí odkaz:
https://doaj.org/article/156e6ce5fde44f73a027dc6ef4874aeb
Autor:
Dmitry Zegzhda, Maxim Kalinin, Vasiliy Krundyshev, Daria Lavrova, Dmitry Moskvin, Evgeny Pavlenko
Publikováno v:
Информатика и автоматизация, Vol 20, Iss 4, Pp 820-844 (2021)
Функционал любой системы может быть представлен в виде совокупности команд, которые приводят к изменению состояния системы. Задача обн
Externí odkaz:
https://doaj.org/article/f9f50ff19fe5406fbcf6b62e2f6a8bda
Publikováno v:
Symmetry, Vol 13, Iss 12, p 2453 (2021)
This paper looks at the problem of cybersecurity in modern cyber-physical and information systems and proposes an immune-like approach to the information security of modern complex systems. This approach is based on the mathematical modeling in infor
Externí odkaz:
https://doaj.org/article/d13bf067fd5242b3825de23dd5fc4972
Publikováno v:
Cyber-Physical Systems and Control II ISBN: 9783031208744
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0a8f2c39608a564f579f37a1a64ee5c3
https://doi.org/10.1007/978-3-031-20875-1_40
https://doi.org/10.1007/978-3-031-20875-1_40
Publikováno v:
Symmetry, Vol 12, Iss 11, p 1931 (2020)
The paper looks at the problem of cybersecurity in modern cyber–physical systems and proposes an evolutionary model approach to counteract cyber attacks by self-regulating the structure of the system, as well as several evolutionary indicators to a
Externí odkaz:
https://doaj.org/article/47ecec7aef2b47c9a056014f87bac5af
Autor:
Maxim O. Kalinin, Vasiliy Krundyshev, Dmitry P. Zegzhda, Evgeny Pavlenko, Dmitry A. Moskvin, Daria S. Lavrova
Publikováno v:
Informatics and Automation. 20:820-844
The functionality of any system can be represented as a set of commands that lead to a change in the state of the system. The intrusion detection problem for signature-based intrusion detection systems is equivalent to matching the sequences of opera
Publikováno v:
Algorithms and Solutions Based on Computer Technology ISBN: 9783030938710
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::cb4b8d77b1c2391055187217284ca73f
https://doi.org/10.1007/978-3-030-93872-7_5
https://doi.org/10.1007/978-3-030-93872-7_5
Publikováno v:
The Economics of Digital Transformation ISBN: 9783030599584
This paper describes the challenge of ensuring the cybersecurity of modern digital systems. The development of intelligent information technologies has allowed to create systems that are able to implement physical and economic processes through infor
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::bb96a6dd0652a14ff0612c75772f91b7
https://doi.org/10.1007/978-3-030-59959-1_11
https://doi.org/10.1007/978-3-030-59959-1_11
Autor:
Maria A. Poltavtseva, Evgeny Pavlenko
Publikováno v:
Lecture Notes in Networks and Systems ISBN: 9783030644291
Digitalization, the development of sensor and cloud technologies, and the growing popularity of using the concept of the Internet of things have led to the transformation of the entire technological infrastructure. Modern industrial systems include a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c76f78542d7b3cf32be029e8360a2ac3
https://doi.org/10.1007/978-3-030-64430-7_1
https://doi.org/10.1007/978-3-030-64430-7_1
Publikováno v:
Symmetry; Volume 12; Issue 11; Pages: 1931
Symmetry, Vol 12, Iss 1931, p 1931 (2020)
Symmetry, Vol 12, Iss 1931, p 1931 (2020)
The paper looks at the problem of cybersecurity in modern cyber–physical systems and proposes an evolutionary model approach to counteract cyber attacks by self-regulating the structure of the system, as well as several evolutionary indicators to a