Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Igor Vitalievich Kotenko"'
Autor:
Dmitry Sergeevich Levshun, Diana Albertovna Gaifulina, Andrey Alexeevich Chechulin, Igor Vitalievich Kotenko
Publikováno v:
Информатика и автоматизация, Vol 19, Iss 5, Pp 1050-1088 (2020)
Представляются анализ и систематизация современных исследований в области обеспечения информационной безопасности киберфизических с
Externí odkaz:
https://doaj.org/article/6410916ce494425c8da5a30cdaa0a529
Publikováno v:
Информатика и автоматизация, Vol 18, Iss 5, Pp 1182-1211 (2019)
Цель исследования заключается в разработке методики автоматизированного выделения активов информационной системы и сравнительной оц
Externí odkaz:
https://doaj.org/article/c30b2111e18c4838b28870ec8b8fce62
Publikováno v:
Безопасность информационных технологий, Vol 20, Iss 1, Pp 21-24 (2013)
In the paper the usage of the ontological approach, description logics and logical inference to the design of the data model of computer vulnerabilities and attacks is suggested. The challenge of construction of ontological models is discussed, and a
Externí odkaz:
https://doaj.org/article/11d3b533e1204a33bb63c759e71204b9
Publikováno v:
Безопасность информационных технологий, Vol 22, Iss 4 (2015)
The paper is devoted to the investigation of open vulnerability databases and methods of their integration for construction of an integrated security information repository. The novelty of the present work lies in the proposed process model of reposi
Externí odkaz:
https://doaj.org/article/e6659445621346c2b2dec6782b7ecf35
Publikováno v:
Безопасность информационных технологий, Vol 22, Iss 3 (2015)
The paper suggests an approach to the security assessment of computer networks. The approach is based on attack graphs and intended for Security Information and Events Management systems (SIEM-systems). Key feature of the approach consists in the app
Externí odkaz:
https://doaj.org/article/9a3ba96e5ede4ffdb64267d83fb2a0c4
Publikováno v:
Безопасность информационных технологий, Vol 21, Iss 3 (2014)
The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the d
Externí odkaz:
https://doaj.org/article/3ada2590edb64128a7e48eb7b3eccf73
Publikováno v:
Vestnik of Astrakhan State Technical University. Series: Management, computer science and informatics. 2022:33-40
The object of the research is a new methodological approach to solving the problem of interval analysis of the security of information and telecommunication resources of critical infrastructures. This approach is one of the variants of practising the
Publikováno v:
Vestnik of Astrakhan State Technical University. Series: Management, computer science and informatics. 2021:7-15
The object of the study is methodological approaches to solving the problems of constructing membership functions in the application to decision-making procedures (decision support) for the fuzzy management of information and security events of moder
Publikováno v:
Vestnik of Astrakhan State Technical University. Series: Management, computer science and informatics. 2020:84-94
The article is focused on the development of a mathematical model of functioning the security information and event management system known as the SIEM system. This model is a formalized analytical description (in terms of a Markov chain in the form
Publikováno v:
Vestnik of Astrakhan State Technical University. Series: Management, computer science and informatics. :7-15
The object of study is adaptive monitoring for solving problems of counteraction to complex security threats to "Smart City. The studies were carried out within the framework of developing the conceptual model of adaptive monitoring. The model is a g