Проектирование безопасной среды передачи данных на примере протокола I2C

ДС Левшун, АА Чечулин, ИВ Котенко - Защита информации. Инсайд, 2018 - elibrary.ru
Протоколы передачи данных, применяемые для взаимодействия между устройствами
на основе микроконтроллеров, как правило, определяют только параметры …

Visualization-driven approach to fraud detection in the mobile money transfer services

E Novikova, I Kotenko - … , and Applications in Mobile Computing and …, 2019 - igi-global.com
Mobile money transfer services (MMTS) are widely spread in the countries lacking
conventional financial institutions. Like traditional financial systems they can be used to …

Interactive Machine Learning in Cybersecurity: Using Human Expertise More Effectively

MHM Chung - 2023 - search.proquest.com
Cybersecurity is increasingly important in a world where malicious actors seek to profit from
various forms of data exfiltration. In this dissertation I examine the potential for improving the …

Integrated visualization of network security metadata from heterogeneous data sources

V Ahlers, F Heine, B Hellmann, C Kleiner… - Graphical Models for …, 2016 - Springer
In computer networks many components produce valuable information about themselves or
other participants, especially security analysis relevant information. Although such …

Data Normalization models in the security event management systems

A Iskhakov, S Iskhakov - 2020 13th International Conference" …, 2020 - ieeexplore.ieee.org
The problems of data transformation in the security event management systems of robotic
complexes and their negative influence on the development of correlation methods in such …

[PDF][PDF] DualNetView: Dual Views for Visualizing the Dynamics of Networks.

V Pham, NVT Nguyen, T Dang, C Turkay… - EuroVA@ Eurographics …, 2020 - diglib.eg.org
The force-directed layout is a popular visual method for revealing network structures, such
as clusters and important vertices. However, it is not capable of representing temporal …

Visualization-Driven Approach to Anomaly Detection in the Movement of Critical Infrastructure

E Novikova, I Murenin - … Network Security: 7th International Conference on …, 2017 - Springer
Detection of anomalies in employees' movement represents an area of considerable interest
for cyber-physical security applications. In the paper the visual analytics approach to …

Analysis of the visual analytics techniques for monitoring heterogeneous data streams

MP Bestuzhev, ES Novikova… - 2020 IEEE Conference …, 2020 - ieeexplore.ieee.org
The efficiency of complex object monitoring as well as detection of anomalies in its behavior
strongly depends on automatic models used and the way how this information is presented …

Комбинирование технологий Hadoop и Snort для обнаружения сетевых атак

НА Комашинский - Известия высших учебных заведений …, 2018 - cyberleninka.ru
Исследуется метод обработки информации с целью обнаружения компьютерных атак
на основе технологий больших данных. Обоснована потребность создания …

Выявление аномальной активности в сервисах мобильных денежных переводов с помощью radviz-визуализации

ЕС Новикова, ИВ Котенко - Информатика и автоматизация, 2016 - ia.spcras.ru
Аннотация В настоящее время широкое распространение получили сервисы
мобильных денежных переводов (СМДП), в которых ключевая роль принадлежит …