Zobrazeno 1 - 10
of 54
pro vyhledávání: '"Nikolaj GORANIN"'
Publikováno v:
IEEE Access, Vol 12, Pp 97712-97725 (2024)
This paper proposes a new metric to compare artificial intelligence (AI) algorithms for malware detection using system calls. With the increasing complexity of malware and the proliferation of AI algorithms, there is a need for a comprehensive metric
Externí odkaz:
https://doaj.org/article/9c6beb7ac9b44a9689ac08781d2afd65
Publikováno v:
Sensors, Vol 24, Iss 16, p 5239 (2024)
This paper presents the methodology and outcomes of creating the Rail Vista dataset, designed for detecting defects on railway tracks using machine and deep learning techniques. The dataset comprises 200,000 high-resolution images categorized into 19
Externí odkaz:
https://doaj.org/article/aeda1fd6906e4ea3838161d1dab9bf03
Publikováno v:
Applied Sciences, Vol 14, Iss 7, p 2742 (2024)
Electronic voting, based on cryptographic protocols and blockchain technology, represents an advanced method for ensuring the security, transparency, and reliability of electoral processes. The scientific research presented in this article is devoted
Externí odkaz:
https://doaj.org/article/d4d84ade8e064e99a9dcb1cf51be4715
Publikováno v:
Applied Sciences, Vol 13, Iss 21, p 11908 (2023)
Malware poses a significant threat to computer systems and networks. This necessitates the development of effective detection mechanisms. Detection mechanisms dependent on signatures for attack detection perform poorly due to high false negatives. Th
Externí odkaz:
https://doaj.org/article/4038080383bd442da9943cffcf84e966
Autor:
Anastasiya Kurylets, Nikolaj Goranin
Publikováno v:
Applied Sciences, Vol 13, Iss 9, p 5568 (2023)
Robotic process automation (RPA)* based on the use of software robots has proven to be one of the most demanded technologies to emerge in recent years used for automating daily IT routines in many sectors, such as banking and finance. As with any new
Externí odkaz:
https://doaj.org/article/6d17618b725e4468b88786fc83671079
Autor:
Aleksandr Lapušinskij, Ivan Suzdalev, Nikolaj Goranin, Justinas Janulevičius, Simona Ramanauskaitė, Gintautas Stankūnavičius
Publikováno v:
Sensors, Vol 21, Iss 17, p 5821 (2021)
The increase in flying time of unmanned aerial vehicles (UAV) is a relevant and difficult task for UAV designers. It is especially important in such tasks as monitoring, mapping, or signal retranslation. While the majority of research is concentrated
Externí odkaz:
https://doaj.org/article/0229b27e2e4e4af7accef5119924b091
Autor:
Romualdas Jurevičius, Nikolaj Goranin, Justinas Janulevičius, Justas Nugaras, Ivan Suzdalev, Aleksandr Lapusinskij
Publikováno v:
Aviation, Vol 23, Iss 2 (2019)
Newly evolving threats to public safety and security, related to attacks in public spaces, are catching the attention of both law enforcement and the general public. Such threats range from the emotional misbehaviour of sports fans in sports venues t
Externí odkaz:
https://doaj.org/article/df010b1060114cc8a702ae99889c6d59
Publikováno v:
Mokslas: Lietuvos Ateitis, Vol 11 (2019)
Various countries apply different methodology for national critical infrastructure identification. MCDM method TOPSIS is extensively used in different areas of research such as logistics, health. The best alternative is based on all criteria, dependa
Externí odkaz:
https://doaj.org/article/eb11136053cc455783b876586b9b41c3
Publikováno v:
Applied Sciences, Vol 10, Iss 23, p 8423 (2020)
Information technology (IT) security risk analysis preventatively helps organizations in identifying their vulnerable systems or internal controls. Some researchers propose expert systems (ES) as the solution for risk analysis automation since risk a
Externí odkaz:
https://doaj.org/article/38983a04cb014364bf1ce67ef682b2fe
Autor:
Dainius Čeponis, Nikolaj Goranin
Publikováno v:
Applied Sciences, Vol 10, Iss 7, p 2373 (2020)
Intrusion and malware detection tasks on a host level are a critical part of the overall information security infrastructure of a modern enterprise. While classical host-based intrusion detection systems (HIDS) and antivirus (AV) approaches are based
Externí odkaz:
https://doaj.org/article/04db938172034b4596ef64036b62e941