И Котенко, СС Хмыров - Вопросы кибербезопасности, 2022 - cyberleninka.ru
Цель работы: анализ моделей и методик, используемых для атрибуции нарушителей кибербезопасности в интересах построения перспективной системы атрибуции при …
The notion of the attacker profile is often used in risk analysis tasks such as cyber attack forecasting, security incident investigations and security decision support. The attacker …
Modern information systems generate a lot of events. Analysis of the events allows detecting malicious activity within the system. There are a lot of event correlation techniques intended …
Machine learning (ML) models are used in many safety-and security-critical applications nowadays. It is therefore important to measure the security of a system that uses ML as a …
R Kryukov, EV Fedorchenko, I Kotenko… - Информационно …, 2024 - i-us.ru
Introduction: Security assessment of modern information systems is a challenging task. These systems incorporate heterogeneous objects, things, subjects and connections …
A Jha, ES Novikova, D Tokarev… - 2021 IV International …, 2021 - ieeexplore.ieee.org
Modern Industrial Automation & Control Systems (IACS) are essential part of the critical infrastructures and services. They are used in health, power, water, and transportation …
E Novikova, I Kotenko - Attacks and Defenses for the Internet-of-Things - Springer
Modern information systems generate a lot of events. Analysis of the events allows detecting malicious activity within the system. There are a lot of event correlation techniques intended …
И КОТЕНКО, ИБ Саенко, РИ Захарченко… - ВОПРОСЫ … - elibrary.ru
Цель работы: анализ моделей и методик, используемых для атрибуции нарушителей кибербезопасности в интересах построения перспективной системы атрибуции при …