Methodology for management of the protection system of smart power supply networks in the context of cyberattacks

I Kotenko, I Saenko, O Lauta, M Karpov - Energies, 2021 - mdpi.com
This paper examines an approach that allows one to build an efficient system for protecting
the information resources of smart power supply networks from cyberattacks based on the …

Blockchain-based security in smart grid network

S Mishra - International Journal of Communication …, 2022 - inderscienceonline.com
The cybersecurity threats in the smart grid network are prominent with conventional
approaches providing integrated security control and communication protection for smart …

The Method for Identifying the Scope of Cyberattack Stages in Relation to Their Impact on Cyber-Sustainability Control over a System

Š Grigaliūnas, R Brūzgienė, A Venčkauskas - Electronics, 2023 - mdpi.com
Industry X. 0 is the new age of digitization, when information and communication systems
are strongly linked to other systems and processes and are accessed remotely from …

Ensuring the survivability of embedded computer networks based on early detection of cyber attacks by integrating fractal analysis and statistical methods

I Kotenko, I Saenko, O Lauta, A Kribel - Microprocessors and Microsystems, 2022 - Elsevier
The paper discusses a method for ensuring the survivability of embedded computer
networks in conditions of cyber attacks, based on identifying anomalies in network traffic by …

Enhanced CNN-LSTM deep learning for scada IDS featuring hurst parameter self-similarity

A Balla, MH Habaebi, EAA Elsheikh, MR Islam… - IEEE …, 2024 - ieeexplore.ieee.org
Supervisory Control and Data Acquisition (SCADA) systems are crucial for modern industrial
processes and securing them against increasing cyber threats is a significant challenge …

An approach to modeling of the security system of intelligent transport systems based on the use of flat graphs

I Kotenko, I Saenko, O Lauta, M Karpov… - Proceedings of the Fifth …, 2022 - Springer
The paper examines an approach that allows one to build an efficient model of the
information security system for intelligent transport systems. The possibility of using flat …

Evaluating the functioning quality of data transmission networks in the context of cyberattacks

A Privalov, I Kotenko, I Saenko, N Evglevskaya, D Titov - Energies, 2021 - mdpi.com
Cyberattacks against the elements of technological data transmission networks represent a
rather significant threat of disrupting the management of regional electric power complexes …

Fractal characteristics of network traffic and its correlation with network security

C Ding, Y Chen, Z Liu, AM Alshehri, T Liu - Fractals, 2022 - World Scientific
Based on the analysis of the self-similarity of network traffic, a network anomaly detection
technology is proposed by combining with the fuzzy logic so as to explore the fractal …

Anomaly and cyber attack detection technique based on the integration of fractal analysis and machine learning methods

IV Kotenko, IB Saenko, OS Lauta… - Informatics and …, 2022 - journals.rcsi.science
In modern data transmission networks, in order to constantly monitor network traffic and
detect abnormal activity in it, as well as identify and classify cyber attacks, it is necessary to …

Методика обнаружения аномалий и кибератак на основе интеграции методов фрактального анализа и машинного обучения

ИВ Котенко, ИБ Саенко, ОС Лаута… - Информатика и …, 2022 - mathnet.ru
В современных сетях передачи данных для постоянного мониторинга сетевого
трафика и обнаружения в нем аномальной активности, а также идентификации и …