Search Results - "Desiatko, Alona"
-
1
Cyber threats to the Private Academic Cloud
Published in International Journal of Electronics and Telecommunications (25-06-2024)“…The potential breach of access to confidential content hosted in a university's Private Academic Cloud (PAC) underscores the need for developing new protection…”
Get full text
Journal Article -
2
Analysis of digital footprints associated with cybersecurity behavior patterns of users of University Information and Education Systems
Published in International Journal of Electronics and Telecommunications (01-01-2024)“…The analysis of digital footprints (DF) related to the cybersecurity (cyber risk) user behavior of university information and education systems (UIES) involves…”
Get full text
Journal Article -
3
Development of an Information Security System Based on Modeling Distributed Computer Network Vulnerability Indicators of an Informatization Object
Published in International Journal of Electronics and Telecommunications (2023)“…A methodology for development for distributed computer network (DCN) information security system (IS) for an informatization object (OBI) was proposed. It was…”
Get full text
Journal Article -
4
Cognitive Modeling and Formation of the Knowledge Base of the Information System for Assessing the Rating of Enterprises
Published in International Journal of Electronics and Telecommunications (01-01-2023)“…A mathematical model is proposed that makes it possible to describe in a conceptual and functional aspect the formation and application of a knowledge base…”
Get full text
Journal Article -
5
Adaptive Monitoring of Companies' Information Security
Published in International Journal of Electronics and Telecommunications (01-01-2023)“…Additions were proposed to the method of organizing the information security (IS) event management process of companies. Unlike existing solutions, the…”
Get full text
Journal Article -
6
Hardware-Software Complex for Predicting the Development of an Ecologically Hazardous Emergency Situation on the Railway
Published in International Journal of Electronics and Telecommunications (01-01-2023)“…A hardware-software system has been implemented to monitor the environmental state (EnvState) at the site of railway (RY) accidents and disasters. The proposed…”
Get full text
Journal Article -
7
Electronic footprint analysis and cluster analysis techniques for information security risk research of university digital systems
Published in International Journal of Electronics and Telecommunications (01-01-2024)“…In the article there are presented results of the study of the state of user competencies for different specialties of the university digital educational…”
Get full text
Journal Article -
8
Optimization of computer ontologies for e-courses in information and communication technologies
Published in International Journal of Electronics and Telecommunications (01-01-2024)“…A methodology is proposed for modifying computer ontologies (CO) for electronic courses (EC) in the field of information and communication technologies (ICT)…”
Get full text
Journal Article -
9
COGNITIVE TECHNOLOGY FOR THE FORMATION OF COMPETENCIES OF STUDENTS IN THE STUDY OF NATURAL SCIENCE SUBJECTS
Published in Kìberbezpeka. osvìta, nauka, tehnìka (2024)“…The article focuses on the study of the impact of cognitive technologies, in particular those based on artificial intelligence, on the process of forming the…”
Get full text
Journal Article -
10
Optimization of computer ontologies for e-courses in information and communication technologies
Published in International Journal of Electronics and Telecommunications (01-03-2024)“…A methodology is proposed for modifying computer ontologies (CO) for electronic courses (EC) in the field of information and communication technologies (ICT)…”
Get full text
Journal Article -
11
A MODEL OF STRATEGY ANALYSIS DURING THE DYNAMIC INTERACTION OF PHISHING ATTACK PARTICIPANTS
Published in Kìberbezpeka. osvìta, nauka, tehnìka (2023)“…The paper proposes an approach that allows countering attacks on cryptocurrency exchanges and their clients. This approach is formalized in the form of a…”
Get full text
Journal Article -
12
A NEURO-GAME MODEL OF STRATEGY ANALYSIS DURING THE DYNAMIC INTERACTION OF PHISHING ATTACK PARTICIPANTS
Published in Kìberbezpeka. osvìta, nauka, tehnìka (2023)“…Cloud computing is a dynamically evolving computing paradigm. The demand for cloud applications and technologies has especially increased during the CoVID-19…”
Get full text
Journal Article -
13
THE MODEL OF SERVER VIRTUALIZATION SYSTEM PROTECTION IN THE EDUCATIONAL INSTITUTION LOCAL NETWORK
Published in Kìberbezpeka. osvìta, nauka, tehnìka (2022)“…A new approach for the information security (IS) improvement of the educational institution's network has been proposed. The proposed approach is structured…”
Get full text
Journal Article -
14
EFFICIENCY OF THE INDICATORS INVESTMENT CALCULATION METHOD IN THE INFORMATION SECURITY SYSTEM OF INFORMATION OBJECTS
Published in Kìberbezpeka. osvìta, nauka, tehnìka (24-06-2021)“…The article analyzes publications on the evaluation of investments in information security (IS) of objects of informatization (OBI). The possibility and…”
Get full text
Journal Article -
15
EFFICIENCY OF THE INDICATORS INVESTMENT CALCULATION METHOD IN THE INFORMATION SECURITY SYSTEM OF INFORMATION OBJECTS
Published in Kìberbezpeka. osvìta, nauka, tehnìka (2021)“…The article describes the methodology of multi-criteria optimization of costs for the information protection system of the object of informatization. The…”
Get full text
Journal Article -
16
OPTIMIZATION OF EQUIPMENT RESERVE FOR INTELLECTUAL AUTOMATED SYSTEMS
Published in Kìberbezpeka. osvìta, nauka, tehnìka (2021)“…Algorithms for a neural network analyzer involved in the decision support system (DSS) during the selection of the composition of backup equipment (CBE) for…”
Get full text
Journal Article -
17
RESEARCH OF MAIN TRENDS OF MODERN WEB SITES DEVELOPMENT
Published in Kìberbezpeka. osvìta, nauka, tehnìka (2019)“…The article contains the following sections: introduction, research results, conclusions and prospects for further research. In the introduction, a problem…”
Get full text
Journal Article -
18
Adaptive Monitoring of Companies' Information Security
Published in International Journal of Electronics and Telecommunications (27-12-2022)Get full text
Journal Article -
19
МОДЕЛЬ ЗАХИСТУ ЛОКАЛЬНОЇ МЕРЕЖІ НАВЧАЛЬНОГО ЗАКЛАДУ СЕРВЕРНОЇ СИСТЕМИ ВІРТУАЛІЗАЦІЇ
Published in Kìberbezpeka. osvìta, nauka, tehnìka (01-12-2022)“…Запропоновано новий підхід для удосконалення інформаційної безпеки (ІБ) мережі навчального закладу. Пропонований підхід – структурований і системний. Ще…”
Get full text
Journal Article -
20
ОПТИМІЗАЦІЇ РЕЗЕРВУ ОБЛАДНАННЯ ДЛЯ ІНТЕЛЕКТУАЛЬНИХ АВТОМАТИЗОВАНИХ СИСТЕМ
Published in Kìberbezpeka. osvìta, nauka, tehnìka (01-12-2021)“…Запропоновано алгоритми для нейромережевого аналізатора, задіяного у системі підтримки прийняття рішень (СППР) у ході вибору складу резервного обладнання (СРО)…”
Get full text
Journal Article