A network security situation assessment method based on adversarial deep learning

H Yang, R Zeng, G Xu, L Zhang - Applied Soft Computing, 2021 - Elsevier
Aiming at the poor performance and flexibility of traditional assessment methods of network
security in dealing with a large number of network attack data, this paper proposes a …

Ontology of metrics for cyber security assessment

E Doynikova, A Fedorchenko, I Kotenko - Proceedings of the 14th …, 2019 - dl.acm.org
Development of metrics that are valuable for assessing security and decision making is an
important element of efficient counteraction to cyber threats. The paper proposes an …

A semantic model for security evaluation of information systems

E Doynikova, A Fedorchenko… - Journal of Cyber …, 2020 - journals.riverpublishers.com
Modern information systems are characterized by huge security related data streams. For
cyber security management in such systems, novel models and techniques for efficient …

Оценивание защищенности и выбор контрмер для управления кибербезопасностью

ЕВ Дойникова, ИВ Котенко - 2021 - elibrary.ru
Вопросы оценивания защищенности и выбора контрмер являются существенными для
управления кибербезопасностью и становятся все актуальнее с распространением …

Security situation assessment in UAV swarm networks using TransReSE: A Transformer-ResNeXt-SE based approach

D Zhao, P Shen, X Han, S Zeng - Vehicular Communications, 2024 - Elsevier
With the rapid development and extensive application of unmanned aerial vehicles (UAVs),
the issue of UAV swarm network security has become prominent. To protect the security of …

PatchesNet: PatchTST-based multi-scale network security situation prediction

H Yi, S Zhang, D An, Z Liu - Knowledge-Based Systems, 2024 - Elsevier
Abstract Internet of Things (IoT) technology increases connectivity between devices;
however, IoT device networks are less secure, making them highly susceptible to attack …

VTion-PatchTST: Elevated PatchTST model for network security situation prediction

S Zhang, H Yi, D An - Computers and Electrical Engineering, 2024 - Elsevier
The rapid development of network attack techniques increases the risk of the internet being
attacked, thus necessitating timely and effective network protection mechanisms. Network …

Интеллектуальные сервисы защиты информации в критических инфраструктурах

ИВ Котенко, ИБ Саенко, ЕВ Дойникова, ЕС Новикова… - 2019 - elibrary.ru
В монографии рассмотрены ключевые вопросы, связанные с построением и
функционированием интеллектуальных сервисов защиты информации в критических …

[PDF][PDF] Метод и алгоритмы управления рисками информационной безопасности АСУ ТП критических инфраструктур

АС Римша - 2021 - sut.ru
Актуальность темы исследования. Автоматизированная система управления (АСУ)
технологическими процессами (ТП)–это совокупность технических и программных …

AI-and metrics-based vulnerability-centric cyber security assessment and countermeasure selection

I Kotenko, E Doynikova, A Chechulin… - Guide to Vulnerability …, 2018 - Springer
This chapter considers methods and techniques for analytical processing of cyber security
events and information. The approach suggested in the chapter is based on calculating a set …