9   Artículos

 
en línea
Igor Kotenko, Igor Saenko, Andrey Privalov and Oleg Lauta    
The article proposes an approach to ensuring the functioning of Software-Defined Networks (SDN) in cyber attack conditions based on the analytical modeling of cyber attacks using the method of topological transformation of stochastic networks. Unlike oth... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Olga Tushkanova, Diana Levshun, Alexander Branitskiy, Elena Fedorchenko, Evgenia Novikova and Igor Kotenko    
Cyberattacks on cyber-physical systems (CPS) can lead to severe consequences, and therefore it is extremely important to detect them at early stages. However, there are several challenges to be solved in this area; they include an ability of the security... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Lidia Vitkova, Igor Kotenko and Andrey Chechulin    
The problem of countering the spread of destructive content in social networks is currently relevant for most countries of the world. Basically, automatic monitoring systems are used to detect the sources of the spread of malicious information, and autom... ver más
Revista: Information    Formato: Electrónico

 
en línea
Elena Doynikova, Evgenia Novikova and Igor Kotenko    
Early detection of the security incidents and correct forecasting of the attack development is the basis for the efficient and timely response to cyber threats. The development of the attack depends on future steps available to the attackers, their goals... ver más
Revista: Information    Formato: Electrónico

 
en línea
Igor Kotenko, Olga Polubelova, Andrey Chechulin and Igor Saenko    
The technology of Security Information and Event Management (SIEM) becomes one of the most important research applications in the area of computer network security. The overall functionality of SIEM systems depends largely on the quality of solutions imp... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »