[HTML][HTML] Attacker behaviour forecasting using methods of intelligent data analysis: A comparative review and prospects

E Doynikova, E Novikova, I Kotenko - Information, 2020 - mdpi.com
Early detection of the security incidents and correct forecasting of the attack development is
the basis for the efficient and timely response to cyber threats. The development of the attack …

[PDF][PDF] A Semantic Model for Security Evaluation of Information Systems.

E Doynikova, A Fedorchenko, IV Kotenko - J. Cyber Secur. Mobil., 2020 - researchgate.net
Modern information systems are characterized by huge security related data streams. For
cyber security management in such systems, novel models and techniques for efficient …

[HTML][HTML] Handling user-oriented cyber-attacks: STRIM, a user-based security training model

A Hamoud, E Aïmeur - Frontiers in Computer Science, 2020 - frontiersin.org
Privacy is an increasingly rare commodity. Once personal information is entered into a social
network, it is no longer private. Such networks have become an incubation environment and …

Augmented reality for visualizing security data for cybernetic and cyberphysical systems

M Kolomeets, A Chechulin, K Zhernova… - 2020 28th Euromicro …, 2020 - ieeexplore.ieee.org
The paper discusses the use of virtual (VR) and augmented (AR) reality for visual analytics
in information security. Paper answers two questions:“In which areas of information security …

Revisión sobre propagación de ransomware en sistemas operativos Windows

J Moreno, C Rodriguez, I Leguias - I+ D Tecnológico, 2020 - revistas.utp.ac.pa
El ransomware es una de las nuevas amenazas a las que estamos expuestos, enfocándose
principalmente en los sistemas operativos de escritorio Windows, sin dejar de lado a los …

[HTML][HTML] The visual analytics approach for analyzing trajectories of critical infrastructure employers

E Novikova, I Kotenko, I Murenin - Energies, 2020 - mdpi.com
Employees of different critical infrastructures, including energy systems, are considered to
be a security resource, and understanding their behavior patterns may leverage user and …

Graph-based evaluation of probability of disclosing the network structure by targeted attacks

A Privalov, E Skudneva, I Kotenko… - NOMS 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
Protecting data transmission networks from targeted attacks is currently a priority cyber
security goal in critical infrastructures. The paper considers the approach to the evaluation of …

Physical layer security of cognitive IoT networks

GK Kurt, Ö Cepheli - Towards Cognitive IoT Networks, 2020 - Springer
Abstract Internet of Things (IoT) networks have the potential to drastically change our daily
lives with a diverse set of applications. Healthcare, manufacturing, transportation and …

Optimizing secure information interaction in distributed computing systems by the sequential concessions method

I Kotenko, Y Sineshchuk… - 2020 28th Euromicro …, 2020 - ieeexplore.ieee.org
The paper proposes a new approach to multicriteria optimization of the structure of secure
information interaction in distributed computing systems. A distinguishing feature of the …

[PDF][PDF] Review on propagation of ransomware in windows operating systems

J Moreno, C Rodriguez, I Leguias - 2020 - core.ac.uk
Ransomware is one of the new threats to which we are exposed, focusing mainly on
Windows operating systems, without neglecting mobile devices and microcomputers that are …