|
|
|
Siti Noorsuriani Maon,Naffisah Mohd Hassan,Noorain Mohamad Yunus,Sri Fatiany Syed Abdul Kader Jailani,Erne Suzila Kassim
Pág. pp. 73 - 84
Digital technologies have become powerful tools in today society in many aspects. However, without proper knowledge and guidance, youth is being challenged with potential hazards of cybercrimes. Hence, the purpose of this study was to compare...
ver más
|
|
|
|
|
|
Serhii Yevseiev,Oleksandr Milov,Stanislav Milevskyi,Oleksandr Voitko,Maksym Kasianenko,Yevgen Melenti,Serhii Pohasii,Hrygorii Stepanov,Oleksandr Turinskyi,Serhii Faraon
Pág. 15 - 29
A game-theoretic approach is presented, which claims to be a universal method for solving most problems in the field of cybersecurity. As arguments to confirm the superiority of game theory, mathematical validity and provability of the optimality of deci...
ver más
|
|
|
|
|
|
Llanos Tobarra, Antonio Robles-Gómez, Rafael Pastor, Roberto Hernández, Andrés Duque and Jesús Cano
Presently, the ever-increasing use of new technologies helps people to acquire additional skills for developing an applied critical thinking in many contexts of our society. When it comes to education, and more particularly in any Engineering subject, pr...
ver más
|
|
|
|
|
|
Oleksandr Milov,Serhii Yevseiev,Volodymyr Aleksiyev,Polina Berdnik,Oleksandr Voitko,Valentyn Dyptan,Yevheniia Ivanchenko,Maxim Pavlenko,Anatolii Salii,Serhiy Yarovyy
Pág. 46 - 57
The results of modeling and analysis of scenarios of the behavior of interacting agents in conditions of cyber conflict are presented. General approaches to the development of a scenario of the behavior of antagonistic agents are presented. The definitio...
ver más
|
|
|
|
|
|
Oleksandr Milov,Serhii Yevseiev,Yevheniia Ivanchenko,Stanislav Milevskyi,Oleksandr Nesterov,Oleksandr Puchkov,Anatolii Salii,Oleksandr Timochko,Vitalii Tiurin,?leksandr Yarovyi
Pág. 6 - 19
The results of the development of the model of the antagonistic agents behavior in a cyber conflict are presented. It is shown that the resulting model can be used to analyze investment processes in security systems, taking into account the assumption th...
ver más
|
|
|