Static analysis of information systems for IoT cyber security: a survey of machine learning approaches
Ensuring security for modern IoT systems requires the use of complex methods to analyze
their software. One of the most in-demand methods that has repeatedly been proven to be …
their software. One of the most in-demand methods that has repeatedly been proven to be …
Top-20 Weakest from Cybersecurity Elements of the Industry Production and Technology Platform 4.0 Information Systems
N Leonov, M Buinevich… - … Russian Smart Industry …, 2024 - ieeexplore.ieee.org
This work is dedicated to the issue of constructing secure information systems, which form
the foundation of any industrial and technological platform within the Fourth Industrial …
the foundation of any industrial and technological platform within the Fourth Industrial …
An approach for stego-insider detection based on a hybrid nosql database
One of the reasons for the implementation of information security threats in organizations is
the insider activity of its employees. There is a big challenge to detect stego-insiders …
the insider activity of its employees. There is a big challenge to detect stego-insiders …
On distributed object storage architecture based on mimic defense
With the advent of the era of big data, cloud computing, Internet of things, and other
information industries continue to develop. There is an increasing amount of unstructured …
information industries continue to develop. There is an increasing amount of unstructured …
Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant
The challenge of securing IT environments has reached a new complexity level as a
growing number of organisations adopt cloud solutions. This trend increases the possibility …
growing number of organisations adopt cloud solutions. This trend increases the possibility …
[PDF][PDF] Взаимодействие пользователя с информационной системой. Часть 1. Схема взаимодействия и классификация недостатков
ПА Курта - Известия СПбГЭТУ ЛЭТИ, 2020 - izv.etu.ru
Эта статья–третья из цикла, посвященного вопросам взаимодействия пользователя с
информационной системой. Рассматривается задача расчета и оценки …
информационной системой. Рассматривается задача расчета и оценки …
Cloud service price prediction using Machine Learning Algorithm with API in the case of Amazon Web Services and Microsoft Azure
B Dhayanandan, R Rajeev - 2024 International Conference on …, 2024 - ieeexplore.ieee.org
Due to the availability of highly scalable and reasonably priced infrastructure, software, and
platform services, many enterprises are moving their on-premise artificial intelligence …
platform services, many enterprises are moving their on-premise artificial intelligence …
ИНФОРМАТИЗАЦИЯ И СВЯЗЬ
АЮ Ярошенко - … , Министерство Российской Федерации по связи и …, 2022 - elibrary.ru
Статья посвящена решению задачи выполнения требований, порядок которых влияет
на итоговое обеспечение информационной безопасности. Сделан обзор российских и …
на итоговое обеспечение информационной безопасности. Сделан обзор российских и …
[HTML][HTML] Обобщенная классификация интерфейсов транспортной инфраструктуры" Умного города"
ПА Курта, МВ Коломеец - Вестник кибернетики, 2020 - cyberleninka.ru
Рассматривается задача классификации интерфейсов транспортной инфраструктуры
«умного города». На основе анализа научных исследований проводится обзор …
«умного города». На основе анализа научных исследований проводится обзор …
Strategies for network segmentation: a systematic literature review
M Kallatsa - 2024 - jyx.jyu.fi
Organizational information assets are increasingly being stored digitally over information
networks. Therefore, organizations should pay equal attention to the design and security of …
networks. Therefore, organizations should pay equal attention to the design and security of …