Исследуются методики визуального анализа защищенности компьютерных сетей. Описывается компонент визуализации системы оценки защищенности компьютерной …
I Kotenko, A Chechulin, M Bulgakov - … for Industry”(IITI'17) Volume 2, 2018 - Springer
To increase the level of security in control systems for railway infrastructure the paper proposes to use the intelligent methods of security analysis based on analytic modeling of …
Y Liao - Scalable Computing: Practice and Experience, 2024 - scpe.org
Insufficient communication attack defense capabilities within industrial control networks is a serious problem that is addressed in this study. The author proposes a methodology that …
I Kotenko, E Doynikova - 2014 IEEE Intl Conf on High …, 2014 - ieeexplore.ieee.org
The paper considers techniques for measurement and calculation of security metrics taking into account attack graphs and service dependencies. The techniques are based on several …
Our lives depend on automotive cybersecurity, which protects us inside vehicles as well as near them. If vehicles go rogue, they can operate against the driver's will and potentially …
Performing security analytics on modern networks is a difficult task. As networks grow larger and more complex, the models become more difficult to accurately create. The potential …
J Magott, M Woda - 2008 Third International Conference on …, 2008 - ieeexplore.ieee.org
First, different security metrics are presented. A proposal of risk assessment for service oriented architecture (SOA) is given. This proposal is based on service availability metrics …
In today's companies, business processes and information technology are interwoven. Old and new systems as well as off-the-shelf products and tailored solutions are used. This …