Information security governance metrics: a survey and taxonomy

V Anu - Information Security Journal: A Global Perspective, 2022 - Taylor & Francis
ABSTRACT Information Security Governance (ISG) is now considered a vital component of
any organization's Information Technology (IT) Governance. ISG consists of the processes …

[PDF][PDF] A visual analytics approach for the cyber forensics based on different views of the network traffic.

IV Kotenko, M Kolomeets, A Chechulin… - J. Wirel. Mob. Networks …, 2018 - academia.edu
Network forensics is based on the analysis of network traffic. Traffic analysis is a routine
procedure, but it allows one to not only identify the cause of the security breach, but also …

Методика выявления каналов распространения информации в социальных сетях

АА Проноза, ЛА Виткова, АА Чечулин… - Вестник Санкт …, 2018 - cyberleninka.ru
Целью работы является разработка методики выявления каналов распространения
информации в социальных сетях. Предложенная методика базируется на …

Модель человеко-машинного взаимодействия на основе сенсорных экранов для мониторинга безопасности компьютерных сетей

ИВ Котенко, МВ Коломеец, ВИ Комашинский… - 2018 - elibrary.ru
В работе предлагается модель человеко–машинного взаимодействия на основе
сенсорных экранов для мониторинга безопасности компьютерных сетей …

Extreme dimensionality reduction for network attack visualization with autoencoders

DC Ferreira, FI Vázquez, T Zseby - 2019 International Joint …, 2019 - ieeexplore.ieee.org
The visualization of network traffic flows is an open problem that affects the control and
administration of communication networks. Feature vectors used for representing traffic …

CPS security assessment using automatically generated attack trees

W Depamelaere, L Lemaire, J Vossaert… - … Symposium for ICS & …, 2018 - scienceopen.com
Over the last decades, cyber-physical systems have evolved from isolated to complex
interconnected systems that are remotely accessible. This made them easier to attack …

Graph Visualization: Alternative Models Inspired by Bioinformatics

M Kolomeets, V Desnitsky, I Kotenko, A Chechulin - Sensors, 2023 - mdpi.com
Currently, the methods and means of human–machine interaction and visualization as its
integral part are being increasingly developed. In various fields of scientific knowledge and …

Access control visualization using triangular matrices

M Kolomeets, A Chechulin, I Kotenko… - 2019 27th Euromicro …, 2019 - ieeexplore.ieee.org
The paper proposes an approach for visualization of access control systems based on
triangular matrices. The approach is used for visualization of access control security model …

Threats classification method for the transport infrastructure of a smart city

K Izrailov, A Chechulin, L Vitkova - 2020 IEEE 14th …, 2020 - ieeexplore.ieee.org
The concept of a Smart City is the forefront in the development of our near future. One of the
most important parts of such cities is the transport infrastructure. Threats implementation for …

Интеллектуальные сервисы защиты информации в критических инфраструктурах

ИВ Котенко, ИБ Саенко, ЕВ Дойникова, ЕС Новикова… - 2019 - elibrary.ru
В монографии рассмотрены ключевые вопросы, связанные с построением и
функционированием интеллектуальных сервисов защиты информации в критических …