D Levshun, A Chechulin - 2023 33rd Conference of Open …, 2023 - ieeexplore.ieee.org
For many years, attack graphs have been one of the most popular approaches to model multistep attacks. This approach allows evaluating the possibility of each host in the system …
D Levshun - International Symposium on Intelligent and Distributed …, 2023 - Springer
Attack graphs have long been a favored method for modeling complex, multi-step cyber attacks. These graphs facilitate risk assessment, the evaluation of potential host …
D Levshun - … Conference on Intelligent Information Technologies for …, 2023 - Springer
One of the most effective approaches to network security analysis is using attack graphs that are based on vulnerabilities from open databases. In this case, the problem may arise that …
The paper is devoted to the actual topic of ensuring the information security of the Smart City. Particular attention is paid to its subsystem–the transport infrastructure. An aspect of …
K Matsuo, L Barolli - International Conference on Innovative Mobile and …, 2024 - Springer
Globally, there are many people with disabilities. Recently, a variety of facilities and equipment have been innovated, catering not only the disabled individuals but also the …
K Matsuo, L Barolli - Innovative Mobile and Internet Services in …, 2024 - books.google.com
Globally, there are many people with disabilities. Recently, a variety of facilities and equipment have been innovated, catering not only the disabled individuals but also the …
КЕ Израилов, АК Макарова… - Вопросы …, 2023 - cyberrus.info
Полученный результат: произведена систематизация основных способов кибератаки на VoIP и методов защиты от них, исходя из существующих Best Practices и научных …
PA Kurta - Proceedings of Telecommunication Universities, 2023 - journals.rcsi.science
The work solves the problem an analytical model constructing of the user interaction interface with an information system designed to provide information based on multi …