Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Kubrak, Volodymyr"'
Autor:
Kubrak Volodymyr Oleksandrovych, Fesokha Vitalii Viktorovich, Subach Ihor Yuriiovych, Korotaiev Stanislav Oleksandrovych, Mykytiuk Artem Viacheslavovych
Publikováno v:
The Austrian Journal of Technical and Natural Sciences. :8-13
Publikováno v:
Scopus-Elsevier
The method of applying a simulation model of a fuzzy cyberattack detection system is considered. The functional diagram of the simulation model is given. The block diagram of the simulation model is considered and the purpose of its elements is descr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::23be61e9250a9b3a22da19886ac3e05e
The process of designing a cybersecurity situational center as a complex organizational and technical system is considered. It is proposed to consider the problem of designing the cybersecurity situational center from a formal point of view, as a pro
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a01958dafae59b1beb2ea72922b2e1cb
Publikováno v:
Scopus-Elsevier
We consider the role of SIEM in the protection circuit of information and telecommunication system for proactive cyber incident management. We provide the main mechanisms of the process of correlation of events on the detection of cyber-attacks, mali
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7c7e83826511a48ef4e12b45f422c776
Publikováno v:
Збірник "Information Technology and Security"; Том 7, № 2 (2019): INFORMATION TECHNOLOGY AND SECURITY; 208-215
Сборник "Information Technology and Security"; Том 7, № 2 (2019); 208-215
Collection "Information technology and security"; Том 7, № 2 (2019): INFORMATION TECHNOLOGY AND SECURITY; 208-215
Сборник "Information Technology and Security"; Том 7, № 2 (2019); 208-215
Collection "Information technology and security"; Том 7, № 2 (2019): INFORMATION TECHNOLOGY AND SECURITY; 208-215
The article deals with the current, nowadays, issues of cyber defense of critical infrastructure, which are becoming increasingly important. Based on the analysis, it is concluded that the basis of building an effective cyber defense system is the us
Publikováno v:
Scopus-Elsevier
This article discusses the purpose, tasks and composition of the Operational Security Center (SOC). The basic technological tools which should include modern effective SOC are indicated. The focus is on the key role of the Information Security Incide
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d4caafcadd3594ce2d8a431bca81ce57
Publikováno v:
Information Technology and Security; Том 7 № 1 (2019); 14-24
Сборник "Information Technology and Security"; Том 7 № 1 (2019); 14-24
Information Technology and Security; Vol. 7 No. 1 (2019); 14-24
Сборник "Information Technology and Security"; Том 7 № 1 (2019); 14-24
Information Technology and Security; Vol. 7 No. 1 (2019); 14-24
The use of biometric characteristics to improve the efficiency of user authentication is considered. An identifier that uses biometric characteristics is inextricably linked to the user and is virtually impossible to use it unauthorized. According to