Edge computing for IoT security: integrating machine learning with key agreement

T Shen, L Ding, J Sun, C Jing, F Guo… - 2023 3rd International …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) is one of the most widely used technologies today, the number of
IoT connections growing by 18% to 14.4 Billion active endpoints globally. Thus, with such a …

NoSQL document data migration strategy in the context of schema evolution

S Fedushko, R Malyi, Y Syerov, P Serdyuk - Data & Knowledge …, 2024 - Elsevier
In Agile development, one approach cannot be chosen and used all the time. Constant
updates and strategy changes are necessary. We want to show that combining several …

Risk forecasting of data confidentiality breach using linear regression algorithm

О Korystin, S Nataliia, O Mitina - International Journal of …, 2022 - search.proquest.com
The paper focuses on the study of cyber security in Ukraine and creation of a predictive
model for reducing the risk of identified cyber threats. Forecasting is performed using a …

Industry-Specific Vulnerability Assessment

M Alkinoon, H Althebeiti, A Alkinoon… - … Conference on Web …, 2024 - Springer
Vulnerability databases are instrumental in tracking and understanding software security
threats. Among these, the National Vulnerability Database (NVD), maintained by the US …

[PDF][PDF] Comparative Risk Assessment of Cyber Threats Based on Average and Fuzzy Sets Theory

OE Korystin, O Korchenko, S Kazmirchuk, S Demediuk… - mecs-press.org
Applied results of scientific analysis should be the key focus of modern security research. A
comparative analysis of research results obtained using different methods, as an applied …