Search Results - "Lakhno, Valerii"

Refine Results
  1. 1
  2. 2

    Cyber threats to the Private Academic Cloud by Lakhno, Valerii, Akhmetov, Bakhytzhan, Kryvoruchko, Olena, Chubaievskyi, Vitalyi, Desiatko, Alona, Bereke, Madina, Shalabaeva, Maria

    “…The potential breach of access to confidential content hosted in a university's Private Academic Cloud (PAC) underscores the need for developing new protection…”
    Get full text
    Journal Article
  3. 3

    Analysis of digital footprints associated with cybersecurity behavior patterns of users of University Information and Education Systems by Lakhno, Valerii, Kurbaiyazov, Nurgazy, Lakhno, Miroslav, Kryvoruchko, Olena, Desiatko, Alona, Tsiutsiura, Svitlana, Tsiutsiura, Mykola

    “…The analysis of digital footprints (DF) related to the cybersecurity (cyber risk) user behavior of university information and education systems (UIES) involves…”
    Get full text
    Journal Article
  4. 4

    Development of an Information Security System Based on Modeling Distributed Computer Network Vulnerability Indicators of an Informatization Object by Lakhno, Valerii, Alimseitova, Zhuldyz, Kalaman, Yerbolat, Kryvoruchko, Olena, Desiatko, Alona, Kaminskyi, Serhii

    “…A methodology for development for distributed computer network (DCN) information security system (IS) for an informatization object (OBI) was proposed. It was…”
    Get full text
    Journal Article
  5. 5

    Adaptive Monitoring of Companies' Information Security by Lakhno, Valerii, Adilzhanova, Saltanat, Ydyryshbayeva, Moldir, Turgynbayeva, Aliza, Kryvoruchko, Olena, Chubaievskyi, Vitalyi, Desiatko, Alona

    “…Additions were proposed to the method of organizing the information security (IS) event management process of companies. Unlike existing solutions, the…”
    Get full text
    Journal Article
  6. 6

    Hardware-Software Complex for Predicting the Development of an Ecologically Hazardous Emergency Situation on the Railway by Lakhno, Valerii, Shalabayeva, Maira, Kryvoruchko, Olena, Desiatko, Alona, Chubaievskyi, Vitalyi, Alibiyeva, Zhibek

    “…A hardware-software system has been implemented to monitor the environmental state (EnvState) at the site of railway (RY) accidents and disasters. The proposed…”
    Get full text
    Journal Article
  7. 7
  8. 8

    Optimization of computer ontologies for e-courses in information and communication technologies by Sabitova, Nazym, Tikhonov, Yuriy, Lakhno, Valerii, Kariyrbek, Makulov, Kryvoruchko, Olena, Chubaievskyi, Vitalyi, Desiatko, Alona, Zhumadilova, Mereke

    “…A methodology is proposed for modifying computer ontologies (CO) for electronic courses (EC) in the field of information and communication technologies (ICT)…”
    Get full text
    Journal Article
  9. 9

    Automation of Information Security Risk Assessment by Akhmetov, Berik, Lakhno, Valerii, Chubaievskyi, Vitalyi, Kaminskyi, Serhii, Adilzhanova, Saltanat, Ydyryshbayeva, Moldir

    “…An information security audit method (ISA) for a distributed computer network (DCN) of an informatization object (OBI) has been developed. Proposed method is…”
    Get full text
    Journal Article
  10. 10

    The Features of Building a Portfolio of Trading Strategies Using the SAS OPTMODEL Procedure by Terentiev, Oleksandr, Prosiankina-Zharova, Tatyana, Savastiyanov, Volodymyr, Lakhno, Valerii, Kolmakova, Vira

    Published in Computation (01-07-2021)
    “…The article describes the original information technology of the algorithmic trading, designed to solve the problem of forming the optimal portfolio of trade…”
    Get full text
    Journal Article
  11. 11

    RESEARCH ON DIFFERENTIAL CRYPTANALYSIS BASED ON DEEP LEARNING by Xue, Jiang, Lakhno, Valerii, Sahun, Andrii

    “…In the age of pervasive connectivity, cryptography is a vital defensive measure for information security, and the security of cryptographic protection is of…”
    Get full text
    Journal Article
  12. 12

    IMPLEMENTATION OF A BAYESIAN NETWORK IN PYTHON FOR ANALYSIS OF CYBERCRIMES ASSOCIATED WITH DDOS ATTACKS by Lakhno, Valerii, Voloshyn, Semen, Mamchenko, Sergii, Matiyevsky, Volodymyr, Lakhno, Myroslav

    “…The research of cybercrimes, including DDoS attacks, is becoming increasingly important in the context of heightened attention to cybersecurity, protection of…”
    Get full text
    Journal Article
  13. 13

    Optimization of computer ontologies for e-courses in information and communication technologies by Nazym Sabitova, Yuriy Tikhonov, Valerii Lakhno, Makulov Kariyrbek, Olena Kryvoruchko, Vitalyi Chubaievskyi, Alona Desiatko, Mereke Zhumadilova

    “…A methodology is proposed for modifying computer ontologies (CO) for electronic courses (EC) in the field of information and communication technologies (ICT)…”
    Get full text
    Journal Article
  14. 14

    INTEGRATION AND PROTECTION OF IOT DEVICES IN THE AVAILABLE INFRASTRUCTURE OF THE COMPUTER NETWORK OF THE EDUCATIONAL INSTITUTIONS by Lakhno, Valerii, Blozva, Andrii, Husiev, Borys, Osypova, Tetiana, Matus, Yurii

    “…The development of computer networks is gaining momentum. There are new challenges to data security and the end users themselves. With the advent of the…”
    Get full text
    Journal Article
  15. 15

    DESIGN OF KNOWLEDGE BASE FOR CYBER SECURITY SYSTEMS ON THE BASIS OF SUBJECT IDENTIFICATION METHOD by Lakhno, Valerii, Kasatkin, Dmytro, Misiura, Maksym, Husiev, Borys

    “…The article presents the results of research performed in the process of designing an expert system (ES) designed to assess the threats to information security…”
    Get full text
    Journal Article
  16. 16

    CLUSTERING NETWORK ATTACK FEATURES IN INFORMATION SECURITY ANALYSIS TASKS by Lakhno, Valerii, Husiev, Borys, Blozva, Andrii, Kasatkin, Dmytro, Osypova, Tetiana

    “…The paper proposes an algorithm with self-learning elements for intrusion detection systems, as well as an improved clustering technique which is recorded by…”
    Get full text
    Journal Article
  17. 17

    OPTIMIZATION OF PLACEMENT OF INFORMATION PROTECTION MEANS BASED ON THE APPLICATION OF A GENETIC ALGORITHM by Lakhno, Valerii, Maliukov, Volodimir, Komarova, Larysa, Kasatkin, Dmytro, Osypova, Tetiana, Chasnovskyi, Yehor

    “…the article considers the possibilities of modifying the genetic algorithm (GA) for solving the problem of selecting and optimizing the configurations of…”
    Get full text
    Journal Article
  18. 18

    MODEL OF ADAPTIVE ACCESS RIGHTS MANAGEMENT USING PETRI NETS by Lakhno, Valerii, Smolii, Victor, Blozva, Andrii, Kasatkin, Dmytro, Osypova, Tetiana, Misiura, Maksym

    “…The article describes the conceptual model of adaptive management of cybersecurity of the information and educational environment of a modern university…”
    Get full text
    Journal Article
  19. 19

    EFFICIENCY OF THE INDICATORS INVESTMENT CALCULATION METHOD IN THE INFORMATION SECURITY SYSTEM OF INFORMATION OBJECTS by Chubaievskyi, Vitaliy, Lakhno, Valerii, Kryvoruchko, Olena, Kasatkin, Dmytro, Desiatko, Alona, Blozva, Andrii

    Published in Kìberbezpeka. osvìta, nauka, tehnìka (24-06-2021)
    “…The article analyzes publications on the evaluation of investments in information security (IS) of objects of informatization (OBI). The possibility and…”
    Get full text
    Journal Article
  20. 20

    METHODS OF SYSTEM ANALYSIS IN THE FORMATION OF INFORMATION SECURITY POLICY ON TRANSPORT by Lakhno, Valerii, Husiev, Borys, Smolii, Victor, Blozva, Andrii, Kasatkin, Dmytro, Osypova, Tetiana

    Published in Kìberbezpeka. osvìta, nauka, tehnìka (24-06-2021)
    “…Approaches to the application of methods of system analysis to solve problems related to information security of enterprises in transport, which have a complex…”
    Get full text
    Journal Article