Search Results - "Lakhno, Valerii"
-
1
Formation of Models for Registering Systemic Processes in The Digital Educational Environment of the University Based on Log File Analysis
Published in International Journal of Electronics and Telecommunications (25-06-2024)“…It has been demonstrated that technologies and methods of intelligent data analysis (IDA) in the educational domain, particularly based on the analysis of…”
Get full text
Journal Article -
2
Cyber threats to the Private Academic Cloud
Published in International Journal of Electronics and Telecommunications (25-06-2024)“…The potential breach of access to confidential content hosted in a university's Private Academic Cloud (PAC) underscores the need for developing new protection…”
Get full text
Journal Article -
3
Analysis of digital footprints associated with cybersecurity behavior patterns of users of University Information and Education Systems
Published in International Journal of Electronics and Telecommunications (01-01-2024)“…The analysis of digital footprints (DF) related to the cybersecurity (cyber risk) user behavior of university information and education systems (UIES) involves…”
Get full text
Journal Article -
4
Development of an Information Security System Based on Modeling Distributed Computer Network Vulnerability Indicators of an Informatization Object
Published in International Journal of Electronics and Telecommunications (2023)“…A methodology for development for distributed computer network (DCN) information security system (IS) for an informatization object (OBI) was proposed. It was…”
Get full text
Journal Article -
5
Adaptive Monitoring of Companies' Information Security
Published in International Journal of Electronics and Telecommunications (01-01-2023)“…Additions were proposed to the method of organizing the information security (IS) event management process of companies. Unlike existing solutions, the…”
Get full text
Journal Article -
6
Hardware-Software Complex for Predicting the Development of an Ecologically Hazardous Emergency Situation on the Railway
Published in International Journal of Electronics and Telecommunications (01-01-2023)“…A hardware-software system has been implemented to monitor the environmental state (EnvState) at the site of railway (RY) accidents and disasters. The proposed…”
Get full text
Journal Article -
7
Electronic footprint analysis and cluster analysis techniques for information security risk research of university digital systems
Published in International Journal of Electronics and Telecommunications (01-01-2024)“…In the article there are presented results of the study of the state of user competencies for different specialties of the university digital educational…”
Get full text
Journal Article -
8
Optimization of computer ontologies for e-courses in information and communication technologies
Published in International Journal of Electronics and Telecommunications (01-01-2024)“…A methodology is proposed for modifying computer ontologies (CO) for electronic courses (EC) in the field of information and communication technologies (ICT)…”
Get full text
Journal Article -
9
Automation of Information Security Risk Assessment
Published in International Journal of Electronics and Telecommunications (01-01-2022)“…An information security audit method (ISA) for a distributed computer network (DCN) of an informatization object (OBI) has been developed. Proposed method is…”
Get full text
Journal Article -
10
The Features of Building a Portfolio of Trading Strategies Using the SAS OPTMODEL Procedure
Published in Computation (01-07-2021)“…The article describes the original information technology of the algorithmic trading, designed to solve the problem of forming the optimal portfolio of trade…”
Get full text
Journal Article -
11
RESEARCH ON DIFFERENTIAL CRYPTANALYSIS BASED ON DEEP LEARNING
Published in Kìberbezpeka. osvìta, nauka, tehnìka (2024)“…In the age of pervasive connectivity, cryptography is a vital defensive measure for information security, and the security of cryptographic protection is of…”
Get full text
Journal Article -
12
IMPLEMENTATION OF A BAYESIAN NETWORK IN PYTHON FOR ANALYSIS OF CYBERCRIMES ASSOCIATED WITH DDOS ATTACKS
Published in Kìberbezpeka. osvìta, nauka, tehnìka (2024)“…The research of cybercrimes, including DDoS attacks, is becoming increasingly important in the context of heightened attention to cybersecurity, protection of…”
Get full text
Journal Article -
13
Optimization of computer ontologies for e-courses in information and communication technologies
Published in International Journal of Electronics and Telecommunications (01-03-2024)“…A methodology is proposed for modifying computer ontologies (CO) for electronic courses (EC) in the field of information and communication technologies (ICT)…”
Get full text
Journal Article -
14
INTEGRATION AND PROTECTION OF IOT DEVICES IN THE AVAILABLE INFRASTRUCTURE OF THE COMPUTER NETWORK OF THE EDUCATIONAL INSTITUTIONS
Published in Kìberbezpeka. osvìta, nauka, tehnìka (2021)“…The development of computer networks is gaining momentum. There are new challenges to data security and the end users themselves. With the advent of the…”
Get full text
Journal Article -
15
DESIGN OF KNOWLEDGE BASE FOR CYBER SECURITY SYSTEMS ON THE BASIS OF SUBJECT IDENTIFICATION METHOD
Published in Kìberbezpeka. osvìta, nauka, tehnìka (2020)“…The article presents the results of research performed in the process of designing an expert system (ES) designed to assess the threats to information security…”
Get full text
Journal Article -
16
CLUSTERING NETWORK ATTACK FEATURES IN INFORMATION SECURITY ANALYSIS TASKS
Published in Kìberbezpeka. osvìta, nauka, tehnìka (2020)“…The paper proposes an algorithm with self-learning elements for intrusion detection systems, as well as an improved clustering technique which is recorded by…”
Get full text
Journal Article -
17
OPTIMIZATION OF PLACEMENT OF INFORMATION PROTECTION MEANS BASED ON THE APPLICATION OF A GENETIC ALGORITHM
Published in Kìberbezpeka. osvìta, nauka, tehnìka (2022)“…the article considers the possibilities of modifying the genetic algorithm (GA) for solving the problem of selecting and optimizing the configurations of…”
Get full text
Journal Article -
18
MODEL OF ADAPTIVE ACCESS RIGHTS MANAGEMENT USING PETRI NETS
Published in Kìberbezpeka. osvìta, nauka, tehnìka (2022)“…The article describes the conceptual model of adaptive management of cybersecurity of the information and educational environment of a modern university…”
Get full text
Journal Article -
19
EFFICIENCY OF THE INDICATORS INVESTMENT CALCULATION METHOD IN THE INFORMATION SECURITY SYSTEM OF INFORMATION OBJECTS
Published in Kìberbezpeka. osvìta, nauka, tehnìka (24-06-2021)“…The article analyzes publications on the evaluation of investments in information security (IS) of objects of informatization (OBI). The possibility and…”
Get full text
Journal Article -
20
METHODS OF SYSTEM ANALYSIS IN THE FORMATION OF INFORMATION SECURITY POLICY ON TRANSPORT
Published in Kìberbezpeka. osvìta, nauka, tehnìka (24-06-2021)“…Approaches to the application of methods of system analysis to solve problems related to information security of enterprises in transport, which have a complex…”
Get full text
Journal Article