Algorithm for Recognition of Network Traffic Anomalies Based on Artificial Intelligence

O Laptiev, A Musienko, V Nakonechnyi… - … Congress on Human …, 2023 - ieeexplore.ieee.org
Abnormalities in network traffic can be caused by malfunctioning network equipment,
accidental or intentional actions by users, or the actions of attackers. Thus, for reliable data …

[HTML][HTML] Models of socio-cyber-physical systems security

S Yevseiev, Y Khokhlachova, S Ostapov, O Laptiev… - 2023 - monograph.com.ua
The development of technologies and computing resources has not only expanded the
range of digital services in all spheres of human activity, but also determined the range of …

The method of managing man-generated risks of critical infrastructure systems based on ellipsoidal evaluation

V Pichkur, O Laptiev, I Polovinkin… - 2022 IEEE 4th …, 2022 - ieeexplore.ieee.org
The paper considers one of the possible formulations of the task of planning the operation of
controlled complex systems of responsible assignment of critical infrastructure, which arise …

The method of increasing the efficiency of signal processing due to the use of harmonic operators

I Zamrii, H Haidur, A Sobchuk… - 2022 IEEE 4th …, 2022 - ieeexplore.ieee.org
The construction of secure data transmission channels in information networks, the
development and implementation of switching technologies that increase the bandwidth and …

Evaluation of efficiency of application of functionally sustainable generalized information system of the enterprise

V Sobchuk, O Barabash, A Musienko… - … Congress on Human …, 2022 - ieeexplore.ieee.org
The paper evaluates the effectiveness of the use of functionally stable generalized
information system of the enterprise. Diagnosis of the system in general. The following …

[PDF][PDF] The Method of Construction of the Law of Safety Management of Critical Infrastructure Objects Under the Conditions of External Uncontrolled Influences.

O Laptiev, O Barabash, I Tsyganivska, D Obidin… - IT&I, 2023 - ceur-ws.org
The intensive development of information technologies with a high degree of autonomy
requires the development of autonomous management systems for optimal management …

Harmonic Operators in Mathematical Models of Sources of Detection of Unauthorized Access to Information

O Laptiev, V Sobchuk, A Ryzhov… - … Congress on Human …, 2024 - ieeexplore.ieee.org
Information is already the most modern weapon. The winner in the information war is the
one who knows how to protect important information and information in general. To obtain …

УДОСКОНАЛЕННЯ МЕТОДУ ВИЯВЛЕННЯ ТА КЛАСТЕРІЗАЦІЇ ДЖЕРЕЛ НЕПРАВДИВОЇ ІНФОРМАЦІЇ

V Nakonechnyi, O Barabash, T Lapteva… - Science-based …, 2022 - jrnl.nau.edu.ua
Останнім часом під час вирішення завдань комбінаторної оптимізації широко
використовують методи метаевристики, основа яких—процедура випадкового пошуку …

УДОСКОНАЛЕННЯ МЕТОДУ ВИЯВЛЕННЯ НЕПРАВДИВОЇ ІНФОРМАЦІЇ ЗА ДОПОМОГОЮ БАЙЕСОВСКОГО КЛАСИФІКАТОРА.

Н Лукова-Чуйко, Т Лаптєва - Ukrainian Scientific Journal of …, 2022 - search.ebscohost.com
У статті наведено аналіз рішень прикладних задач, що вирішуюся шляхом
застосування методів кластерного аналізу. Це і класичні задачі Data Mining …

Using of Chebyshev-Poisson's Orthogonal Operators in Signal Processing

A Mishchuk, D Shapovalov, M Voloshyn… - 2023 IEEE 7th …, 2023 - ieeexplore.ieee.org
The tasks of security, management and control of air traffic, identification and recognition of
moving objects are becoming increasingly important today. Efficiency and accuracy of …