Network forensics is based on the analysis of network traffic. Traffic analysis is a routine procedure, but it allows one to not only identify the cause of the security breach, but also …
A Pronoza, L Vitkova, A Chechulin… - Proceedings of the Third …, 2019 - Springer
The paper presents an approach to a visual analysis of links in social networks for obtaining information on channels of inappropriate information dissemination. The offered approach is …
The paper proposes an approach for visualization of access control systems based on triangular matrices. The approach is used for visualization of access control security model …
This thesis examines the cybersecurity incident response problem using a socio-technical approach. The motivation of this work is the need to bridge the knowledge and practise gap …
The development of social networks made it possible to form very complex structures of users and their content. As new services are added for users, the number of vertex types and …
The Intelligent Human Computer Interaction conferences bring together scientists, engineers, computer users, and students to exchange and share their experiences, new …
The CAN bus protocol is used in modern vehicles to control dozens of devices. It is simple enough, but this protocol lacks security mechanisms, and that is one of the main reasons …
M Kolomeets, K Zhernova, A Chechulin - … " ER (ZR) 2020, Ufa, Russia, 15 …, 2020 - Springer
Unmanned private and public transport may be susceptible to attacks through various interfaces including networks and physical sensors. With the spread of smart transport and …