Search Results - "Desiatko, Alona"

Refine Results
  1. 1

    Cyber threats to the Private Academic Cloud by Lakhno, Valerii, Akhmetov, Bakhytzhan, Kryvoruchko, Olena, Chubaievskyi, Vitalyi, Desiatko, Alona, Bereke, Madina, Shalabaeva, Maria

    “…The potential breach of access to confidential content hosted in a university's Private Academic Cloud (PAC) underscores the need for developing new protection…”
    Get full text
    Journal Article
  2. 2

    Analysis of digital footprints associated with cybersecurity behavior patterns of users of University Information and Education Systems by Lakhno, Valerii, Kurbaiyazov, Nurgazy, Lakhno, Miroslav, Kryvoruchko, Olena, Desiatko, Alona, Tsiutsiura, Svitlana, Tsiutsiura, Mykola

    “…The analysis of digital footprints (DF) related to the cybersecurity (cyber risk) user behavior of university information and education systems (UIES) involves…”
    Get full text
    Journal Article
  3. 3

    Development of an Information Security System Based on Modeling Distributed Computer Network Vulnerability Indicators of an Informatization Object by Lakhno, Valerii, Alimseitova, Zhuldyz, Kalaman, Yerbolat, Kryvoruchko, Olena, Desiatko, Alona, Kaminskyi, Serhii

    “…A methodology for development for distributed computer network (DCN) information security system (IS) for an informatization object (OBI) was proposed. It was…”
    Get full text
    Journal Article
  4. 4

    Cognitive Modeling and Formation of the Knowledge Base of the Information System for Assessing the Rating of Enterprises by Kryvoruchko, Olena, Desiatko, Alona, Karpunin, Igor, Hnatchenko, Dmytro, Lakhno, Myroslav, Malikova, Feruza, Turdaliev, Ayezhan

    “…A mathematical model is proposed that makes it possible to describe in a conceptual and functional aspect the formation and application of a knowledge base…”
    Get full text
    Journal Article
  5. 5

    Adaptive Monitoring of Companies' Information Security by Lakhno, Valerii, Adilzhanova, Saltanat, Ydyryshbayeva, Moldir, Turgynbayeva, Aliza, Kryvoruchko, Olena, Chubaievskyi, Vitalyi, Desiatko, Alona

    “…Additions were proposed to the method of organizing the information security (IS) event management process of companies. Unlike existing solutions, the…”
    Get full text
    Journal Article
  6. 6

    Hardware-Software Complex for Predicting the Development of an Ecologically Hazardous Emergency Situation on the Railway by Lakhno, Valerii, Shalabayeva, Maira, Kryvoruchko, Olena, Desiatko, Alona, Chubaievskyi, Vitalyi, Alibiyeva, Zhibek

    “…A hardware-software system has been implemented to monitor the environmental state (EnvState) at the site of railway (RY) accidents and disasters. The proposed…”
    Get full text
    Journal Article
  7. 7
  8. 8

    Optimization of computer ontologies for e-courses in information and communication technologies by Sabitova, Nazym, Tikhonov, Yuriy, Lakhno, Valerii, Kariyrbek, Makulov, Kryvoruchko, Olena, Chubaievskyi, Vitalyi, Desiatko, Alona, Zhumadilova, Mereke

    “…A methodology is proposed for modifying computer ontologies (CO) for electronic courses (EC) in the field of information and communication technologies (ICT)…”
    Get full text
    Journal Article
  9. 9

    COGNITIVE TECHNOLOGY FOR THE FORMATION OF COMPETENCIES OF STUDENTS IN THE STUDY OF NATURAL SCIENCE SUBJECTS by Desiatko, Alona, Khorolska, Natalia, Chubaievskyi, Vitalii

    “…The article focuses on the study of the impact of cognitive technologies, in particular those based on artificial intelligence, on the process of forming the…”
    Get full text
    Journal Article
  10. 10

    Optimization of computer ontologies for e-courses in information and communication technologies by Nazym Sabitova, Yuriy Tikhonov, Valerii Lakhno, Makulov Kariyrbek, Olena Kryvoruchko, Vitalyi Chubaievskyi, Alona Desiatko, Mereke Zhumadilova

    “…A methodology is proposed for modifying computer ontologies (CO) for electronic courses (EC) in the field of information and communication technologies (ICT)…”
    Get full text
    Journal Article
  11. 11

    A MODEL OF STRATEGY ANALYSIS DURING THE DYNAMIC INTERACTION OF PHISHING ATTACK PARTICIPANTS by Lakhno, Valery, Malyukov, Volodymyr, Malyukova, Inna, Atkeldi, Ogan, Kryvoruchko, Olena, Desiatko, Alona, Stepashkina, Kateryna

    “…The paper proposes an approach that allows countering attacks on cryptocurrency exchanges and their clients. This approach is formalized in the form of a…”
    Get full text
    Journal Article
  12. 12

    A NEURO-GAME MODEL OF STRATEGY ANALYSIS DURING THE DYNAMIC INTERACTION OF PHISHING ATTACK PARTICIPANTS by Lakhno, Valery, Lakhno, Miroslav, Kryvoruchko, Olena, Desiatko, Alona, Chubaievskyi, Vitaliy, Аkhmetov, Bakhytzhan, Bereke, Madina

    “…Cloud computing is a dynamically evolving computing paradigm. The demand for cloud applications and technologies has especially increased during the CoVID-19…”
    Get full text
    Journal Article
  13. 13

    THE MODEL OF SERVER VIRTUALIZATION SYSTEM PROTECTION IN THE EDUCATIONAL INSTITUTION LOCAL NETWORK by Lakhno, Valery, Yerbolat, Kalaman, Bagdat, Yagaliyeva, Kryvoruchko, Olena, Desiatko, Alona, Tsiutsiura, Svitlana, Tsiutsiura, Mykola

    “…A new approach for the information security (IS) improvement of the educational institution's network has been proposed. The proposed approach is structured…”
    Get full text
    Journal Article
  14. 14

    EFFICIENCY OF THE INDICATORS INVESTMENT CALCULATION METHOD IN THE INFORMATION SECURITY SYSTEM OF INFORMATION OBJECTS by Chubaievskyi, Vitaliy, Lakhno, Valerii, Kryvoruchko, Olena, Kasatkin, Dmytro, Desiatko, Alona, Blozva, Andrii

    Published in Kìberbezpeka. osvìta, nauka, tehnìka (24-06-2021)
    “…The article analyzes publications on the evaluation of investments in information security (IS) of objects of informatization (OBI). The possibility and…”
    Get full text
    Journal Article
  15. 15

    EFFICIENCY OF THE INDICATORS INVESTMENT CALCULATION METHOD IN THE INFORMATION SECURITY SYSTEM OF INFORMATION OBJECTS by Chubaievskyi, Vitaliy, Lakhno, Valery, Kryvoruchko, Olena, Kasatkin, Dmytro, Desiatko, Alona, Blozva, Andrii, Gusev, Boris

    “…The article describes the methodology of multi-criteria optimization of costs for the information protection system of the object of informatization. The…”
    Get full text
    Journal Article
  16. 16

    OPTIMIZATION OF EQUIPMENT RESERVE FOR INTELLECTUAL AUTOMATED SYSTEMS by Chubaievskyi, Vitaliy, Lakhno, Valery, Akhmetov, Berik, Kryvoruchko, Olena, Kasatkin, Dmytro, Desiatko, Alona, Litovchenko, Taras

    “…Algorithms for a neural network analyzer involved in the decision support system (DSS) during the selection of the composition of backup equipment (CBE) for…”
    Get full text
    Journal Article
  17. 17

    RESEARCH OF MAIN TRENDS OF MODERN WEB SITES DEVELOPMENT by Kotenko, Nataliia, Zhyrova, Tetiana, Chybaievskyi, Vitalii, Desiatko, Alona

    “…The article contains the following sections: introduction, research results, conclusions and prospects for further research. In the introduction, a problem…”
    Get full text
    Journal Article
  18. 18
  19. 19

    МОДЕЛЬ ЗАХИСТУ ЛОКАЛЬНОЇ МЕРЕЖІ НАВЧАЛЬНОГО ЗАКЛАДУ СЕРВЕРНОЇ СИСТЕМИ ВІРТУАЛІЗАЦІЇ by Valery Lakhno, Kalaman Yerbolat, Yagaliyeva Bagdat, Olena Kryvoruchko, Alona Desiatko, Svitlana Tsiutsiura, Mykola Tsiutsiura

    Published in Kìberbezpeka. osvìta, nauka, tehnìka (01-12-2022)
    “…Запропоновано новий підхід для удосконалення інформаційної безпеки (ІБ) мережі навчального закладу. Пропонований підхід – структурований і системний. Ще…”
    Get full text
    Journal Article
  20. 20

    ОПТИМІЗАЦІЇ РЕЗЕРВУ ОБЛАДНАННЯ ДЛЯ ІНТЕЛЕКТУАЛЬНИХ АВТОМАТИЗОВАНИХ СИСТЕМ by Vitaliy Chubaievskyi, Valery Lakhno, Berik Akhmetov, Olena Kryvoruchko, Dmytro Kasatkin, Alona Desiatko, Taras Litovchenko

    Published in Kìberbezpeka. osvìta, nauka, tehnìka (01-12-2021)
    “…Запропоновано алгоритми для нейромережевого аналізатора, задіяного у системі підтримки прийняття рішень (СППР) у ході вибору складу резервного обладнання (СРО)…”
    Get full text
    Journal Article