Аннотация В статье рассматриваются основные методологические примитивы на примере поэтапного построения модели визуализации с заранее подготовленными …
T Marwala - Artificial intelligence, game theory and mechanism …, 2023 - Springer
This chapter delves into the delicate confluence between cybersecurity and politics, a topic of rising importance in the digital age. Cybersecurity is no more a standalone concern; it has …
I Kotenko, A Chechulin - Journal of Cyber Security and …, 2014 - journals.riverpublishers.com
The paper suggests an approach to network attack modeling and security evaluation which is realized in advanced Security Information and Event Management (SIEM) systems. It is …
E Novikova, I Kotenko - Availability, Reliability, and Security in Information …, 2014 - Springer
Mobile money transfer services (MMTS) are currently being deployed in many markets across the world and are widely used for domestic and international remittances. However …
In cyber crimes, attackers are becoming more inventive with their exploits and use more sophisticated techniques to bypass the deployed security system. These attacks are targeted …
This thesis examines the cybersecurity incident response problem using a socio-technical approach. The motivation of this work is the need to bridge the knowledge and practise gap …
The paper considers common methodological primitives for phased construction of data visualization models, which will help to create new graphical models of data security …
Security incidents detected by information technology-dependent organisations are escalating in both scale and complexity. As a result, security incident response has become …