Detection of distributed denial of service attacks using snort rules in cloud computing & remote control systems

Z Hassan, R Odarchenko, S Gnatyuk… - 2018 IEEE 5th …, 2018 - ieeexplore.ieee.org
Cloud computing has the capability of sharing and retrieving data, remote controlling from
different locations, that is why many companies and organizations implement their …

Synergistic effects of information and cybernetic interaction in civil aviation

Y Danik, R Hryschuk, S Gnatyuk - Aviation, 2016 - Taylor & Francis
Scientific research on information and cybernetic influence on citizens, society and the
whole state is a hot topic of many famous worldwide scientific publications. These studies …

Security technique for authentication process in the cloud environment

O Oksiiuk, V Chaikovska… - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
Cloud technology is a prospective field of information technology. Moreover, this
development is always accompanied by a variety of vulnerabilities that are exploited by …

[PDF][PDF] Advisory and Accounting Tool for Safe and Economically Optimal Choice of Online Self-Education Services.

S Fedushko, Y Syerov, O Tesak, O Onyshchuk… - CMiGIN, 2019 - ceur-ws.org
This paper considers the review of three popular online educational platforms and their
comparative characteristics of receiving course certificates, multilingualism resource, a free …

Comprehensive mega network (CMN) platform: Korea MTS governance for CIS case study

Z Ashurova, S Myeong, A Tikhomirov… - … , Social Sphere and …, 2016 - atlantis-press.com
Medical tourism is one of the fastest growing sectors and has a serious economic potential
for Korean economy through expansion of Korean medical tourism service (MTS) network …

[PDF][PDF] Method of informational and psychological influence evaluation in social networks based on fuzzy logic

Z Hu, A Gizun - Proceedings of International Workshop on Control …, 2019 - ceur-ws.org
Recent years number of influences on the information environment of the states has been
increased by non-military methods, which is due to the high level of development of …

Modern method and software tool for guaranteed data deletion in advanced big data systems

S Gnatyuk, V Kinzeryavyy, T Sapozhnik… - Advances in Artificial …, 2020 - Springer
In today's digitally empowered world, confidential data protection is a bit difficult especially
when the user lacks knowledge about the importance of data sanitization before discarding …

Method for rules set forming of cyber incidents extrapolation in network-centric monitoring

Z Hu, A Gizun, V Gnatyuk… - 2017 4th International …, 2017 - ieeexplore.ieee.org
Cyber incidents can disrupt regular mode of information and telecommunication systems
functioning and to cause the substantial material and image losses for the company. One of …

Network-centric approach to destructive manipulative influence evaluation in social media

S Gnatyuk, Y Polishchuk, J Akhmetova… - CEUR Workshop …, 2019 - elibrary.ru
The mass media phenomena investigation are equipping a mankind with a broader and
deeper understanding of society and culture due to the fact that the texts produced by the …

Risk forecasting of data confidentiality breach using linear regression algorithm

О Korystin, S Nataliia, O Mitina - International Journal of …, 2022 - search.proquest.com
The paper focuses on the study of cyber security in Ukraine and creation of a predictive
model for reducing the risk of identified cyber threats. Forecasting is performed using a …