Comparison of hybrid intrusion detection system

AN Cahyo, AK Sari… - 2020 12th international …, 2020 - ieeexplore.ieee.org
IDS have an important role in dispelling and preventing an intrusion or abuse of access
rights. In its development, research on IDS is growing. IDS consist of several detection …

Secure hash function constructing for future communication systems and networks

S Gnatyuk, V Kinzeryavyy, K Kyrychenko… - Advances in Artificial …, 2020 - Springer
The application of Web technologies and forms of electronic document circulation in the
process of information exchange between users though simplifies this process. However …

[PDF][PDF] Technologies ensuring the sustainability of information security of the formation of the digital economy and their perspective development directions

AG Aliyev - International Journal of Information Engineering and …, 2022 - mecs-press.net
The article is devoted to the technologies to ensure the sustainability of information security
in the formation of the digital economy and their prospects. It has been shown that the digital …

Detection of distributed denial of service attacks using snort rules in cloud computing & remote control systems

Z Hassan, R Odarchenko, S Gnatyuk… - 2018 IEEE 5th …, 2018 - ieeexplore.ieee.org
Cloud computing has the capability of sharing and retrieving data, remote controlling from
different locations, that is why many companies and organizations implement their …

A concept of the architecture and creation for siem system in critical infrastructure

R Berdibayev, S Gnatyuk, Y Yevchenko… - Systems, Decision and …, 2021 - Springer
Energy sector is important unit of critical infrastructure and the protection of its ICT
infrastructure is essential for states. Cloud and other advanced technologies are …

Method of searching birationally equivalent Edwards curves over binary fields

Z Hu, S Gnatyuk, M Kovtun, N Seilova - Advances in Computer Science for …, 2019 - Springer
This paper is devoted to increasing of performance of digital signature algorithms based on
elliptic curves over binary fields. Group operations complexity on Edwards curves are less …

Optimization of convolutional neural network structure for biometric authentication by face geometry

Z Hu, I Tereykovskiy, Y Zorin, L Tereykovska… - Advances in Computer …, 2019 - Springer
The article presents development of the methodology of using a convolutional neural
network for biometric authentication based on the analysis of the user face geometry. The …

[PDF][PDF] Studies on Cloud-based Cyber Incidents Detection and Identification in Critical Infrastructure.

S Gnatyuk, R Berdibayev, Z Avkurova, O Verkhovets… - CPITS I, 2021 - ceur-ws.org
Cloud and other advanced technologies are implementing in various ICT infrastructures. It
has led to increased attention to the problems of cyber threats, the growth of which is …

[PDF][PDF] Energy consumption in mobile phones

A Javed, MA Shahid, M Sharif… - International Journal of …, 2017 - mecs-press.net
As the mobile devices are widely used in this world. With the increasing number of users, the
numbers of customized applications are also introduced for these users according to their …

Deobfuscation of computer virus malware code with value state dependence graph

I Dychka, I Tereikovskyi, L Tereikovska… - … on Computer Science …, 2018 - Springer
This paper deals with improvement of malware protection efficiency. The analysis of applied
scientific research on malware protection development has shown that improvement of the …