Интеллектуальные сервисы защиты информации в критических инфраструктурах

ИВ Котенко, ИБ Саенко, ЕВ Дойникова, ЕС Новикова… - 2019 - elibrary.ru
В монографии рассмотрены ключевые вопросы, связанные с построением и
функционированием интеллектуальных сервисов защиты информации в критических …

An ontology-based storage of security information

I Kotenko, A Fedorchenko, E Doynikova… - … Technology and Control, 2018 - itc.ktu.lt
The paper suggests an ontology-based approach for design of security data storage. It
analyzes heterogeneous security information for construction of the storage and the statistics …

AI-and metrics-based vulnerability-centric cyber security assessment and countermeasure selection

I Kotenko, E Doynikova, A Chechulin… - Guide to Vulnerability …, 2018 - Springer
This chapter considers methods and techniques for analytical processing of cyber security
events and information. The approach suggested in the chapter is based on calculating a set …

Enhancing Trust–A Unified Meta-Model for Software Security Vulnerability Analysis

S Alqahtani - 2018 - spectrum.library.concordia.ca
Over the last decade, a globalization of the software industry has taken place which has
facilitated the sharing and reuse of code across existing project boundaries. At the same …

Determination of security threat classes on the basis of vulnerability analysis for automated countermeasure selection

E Doynikova, A Fedorchenko, I Kotenko - Proceedings of the 13th …, 2018 - dl.acm.org
Currently the task of automated security monitoring and responding to security incidents is
highly relevant. The authors propose an approach to determine weaknesses of the analyzed …