Systems and methods for detecting and thwarting attacks on an IT environment

M Mehrotra, V Borkar, VS Sandhu - US Patent 11,277,421, 2022 - Google Patents
Systems and methods for detecting and thwarting attacks on a computing system. The
methods comprise: collecting timestamped data from different software products compris ing …

Authentication model for mobile access subjects

AY Iskhakov, AO Iskhakova, RV Meshcheryakov… - IFAC-PapersOnLine, 2022 - Elsevier
The paper proposes a model for authenticating mobile access subjects in a critical system.
The incident detection mechanism is based on training and classification of the user activity …

CyberSec4Europe D3. 21-Framework to design and implement adaptive security systems

A Hassan, D Van Landuyt, L Pasquale, M Cheminod… - 2022 - hal.science
The research results presented in this document represent the deliverable D3.
21:“Framework to design and implement adaptive security systems” and are the continuation …

Proactive Detection of Attacks on APCS Accounts Based on Analysis of User Identification Graphical Attributes

A Salomatin, A Iskhakov… - 2022 International …, 2022 - ieeexplore.ieee.org
The study examines an approach for proactively detecting access subject account
compromise events through graphical attribute-based user digital footprint analysis for …