Development of the model of the antagonistic agents behavior under a cyber conflict

OV Milov, S Yevseiev, Y Ivanchenko, SV Milevskyi… - 2019 - repository.hneu.edu.ua
The results of the development of the model of the antagonistic agents behavior in a cyber
conflict are presented. It is shown that the resulting model can be used to analyze invest¬ …

Analysis of the attack vectors used by threat actors during the pandemic

V Susukailo, I Opirskyy… - 2020 IEEE 15th …, 2020 - ieeexplore.ieee.org
This article describes attacks methods, vectors and technics used by threat actors during
pandemic situations in the world. Identifies common targets of threat actors and cyber-attack …

Analysis of the use of software baits as a means of ensuring information security

S Vasylyshyn, I Opirskyy… - 2020 IEEE 15th …, 2020 - ieeexplore.ieee.org
this article analyses the usage of software baits as an information security asset. They
provided close research about honeypot types, their advantages and disadvantages …

Comparative analysis of the efficiency of modern fake detection algorithms in scope of information warfare

Y Shtefaniuk, I Opirskyy - 2021 11th IEEE International …, 2021 - ieeexplore.ieee.org
The problem of detecting fake (false) information passing through various channels of the
Internet is becoming increasingly important task. One of the most dangerous types of such …

Security Evaluation of Situational Awareness in Cyberspace Based on Artificial Neural Network‐Back Propagation

W Han, HMJ Nazir, S Li - Wireless Communications and …, 2022 - Wiley Online Library
Computer network security has become increasingly controversial among many businesses
as a result of the rise in cyber threats. Artificial neural network (ANN) is mature research in …

The synthesis of strategies for the efficient performance of sophisticated technological complexes based on the cognitive simulation modelling

NA Zaiets, OV Savchuk, VM Shtepa, NM Lutska… - 2021 - rep.polessu.by
Purpose. Improving the productivity and energy efficiency of complex technological
complexes through the development and use of scenariocognitive modeling in control …

Проблематика побудови концепції «Розумного міста»

ІР Опірський, ОЮ Тютіков - Ukrainian Information Security …, 2020 - jrnl.nau.edu.ua
Використання штучного інтелекту дозволяє максимально автоматизувати усі процеси,
які керують системами розумного міста. Використання такої системи виключає …

Evaluation of the Possibility of Realizing the Crime of the Information System at Different Stages of TCP/IP

I Opirskyy, I Tyshyk, V Susukailo - 2021 IEEE 4th International …, 2021 - ieeexplore.ieee.org
The article presents the main classical models of information systems security. It gives them
a description—a statistical analysis of attempts to implement information threats in …

Development and analysis of game-theoretical models of security systems agents interaction

S Yevseiev, O Milov, S Milevskyi, O Voitko… - … -European Journal of …, 2020 - papers.ssrn.com
A game-theoretic approach is presented, which claims to be a universal method for solving
most problems in the field of cybersecurity. As arguments to confirm the superiority of game …

[PDF][PDF] Cybercrimes investigation via honeypots in cloud environments

V Susukailo, S Vasylyshyn, I Opirskyy… - … Proceedingsthis link is …, 2021 - academia.edu
This article explores the capabilities of honeypots in cloud environments. Analyses the
problem of cybercrimes investigation in cloud environments. Defines and examines …