Analysis and modeling of price changes on the exchange market based on structural market data

B Bebeshko, K Khorolska… - 2021 IEEE 8th …, 2021 - ieeexplore.ieee.org
The securities market, also known as the stock market, is a public trading platform for trading
stocks of various companies. Forecasting in the stock market is an attempt to determine the …

Continuous investing in advanced fuzzy technologies for smart city

V Lakhno, V Malyukov, D Kasatkin… - … Intelligence and Data …, 2022 - Springer
The article describes a model for the computing core of a decision support system in the
process of continuous mutual investment in technologies for Smart City. In contrast to the …

Selection of a rational composition of information protection means using a genetic algorithm

V Lakhno, B Akhmetov, O Smirnov… - … and Virtual Mobile …, 2022 - Springer
This article describes a modified genetic algorithm (MGA) for solving a multicriteria
optimization problem for the selection and optimization of the information security means …

[PDF][PDF] Experimental studies of the features of using waf to protect internal services in the zero trust structure

V Lakhno, A Blozva, D Kasatkin, V Chubaievskyi… - J Theor Appl Inf …, 2022 - jatit.org
With the growth of web applications popularity, the need to protect them from hacking and
unauthorized access is growing even faster. More than 75% of hacker attacks are aimed at …

Analysis of digital footprints associated with cybersecurity behavior patterns of users of University Information and Education Systems

V Lakhno, N Kurbaiyazov, M Lakhno… - … Journal of Electronics …, 2024 - journals.pan.pl
The analysis of digital footprints (DF) related to the cybersecurity (cyber risk) user behavior
of university information and education systems (UIES) involves the study and evaluation of …

[PDF][PDF] Multi-criterial optimization composition of cyber security circuits based on genetic algorithm

V Lakhno, B Akhmetov, H Mohylnyi, A Blozva… - Journal of Theoretical …, 2022 - jatit.org
The article proposes a method of multicriteria optimization (MCO) of costs for an information
security system (SIS) of an informatization object (OBI). The technique is based on the use of …

Indicators systematization of unauthorized access to corporate information

V Lakhno, D Kasatkin, A Desiatko… - … and Virtual Mobile …, 2022 - Springer
An approach is proposed for the formalization procedure of the indicative functional
representation of illegal actions of a computer intruder in the course of implementing the …

Supervised clustering with SHAP values

RQ Conceição - 2023 - search.proquest.com
In the last years, data has grown at a fast rate. Not only growing in size, data is also
becoming far more complex then what it used to be. As companies are shifting to data-driven …

[PDF][PDF] Genetic algorithm for solving the problem of scaling a cloud-oriented object of informatization

V Lakhno, M Bereke, S Adilzhanova… - Journal of Theoretical …, 2022 - jatit.org
This article discusses the problem of mathematical modeling performed in the process of
choosing server platforms and the required additional amount of RAM for the deployment of …

МОДЕЛЬ ВПРОВАДЖЕННЯ ТЕХНОЛОГІЙ ЕЛЕКТРОННОЇ КОМЕРЦІЇ

О Харченко, В Яремич - Електронне фахове наукове …, 2023 - csecurity.kubg.edu.ua
Анотація У статті виокремлено класифікацію типів і форм електронної комерції в
залежності від відносин між залученими сторонами, а також від типів підприємств, що …