Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Cyber" wg kryterium: Temat


Wyświetlanie 1-6 z 6
Tytuł:
Development of decision support system based on feature matrix for cyber threat assessment
Autorzy:
Kartbayev, Timur
Akhmetov, Bakhytzhan
Doszhanova, Aliya
Lakhno, Valery
Malikova, Feruza
Tolybayev, Sharapatdin
Powiązania:
https://bibliotekanauki.pl/articles/226626.pdf
Data publikacji:
2019
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
decision support system
cyber threat
intellectualized system
detecting the cyber threats
critically needed
computer systems
Opis:
The article herein presents the method and algorithms for forming the feature space for the base of intellectualized system knowledge for the support system in the cyber threats and anomalies tasks. The system being elaborated might be used both autonomously by cyber threat services analysts and jointly with information protection complex systems. It is shown, that advised algorithms allow supplementing dynamically the knowledge base upon appearing the new threats, which permits to cut the time of their recognition and analysis, in particular, for cases of hard-to-explain features and reduce the false responses in threat recognizing systems, anomalies and attacks at informatization objects. It is stated herein, that collectively with the outcomes of previous authors investigations, the offered algorithms of forming the feature space for identifying cyber threats within decisions making support system are more effective. It is reached at the expense of the fact, that, comparing to existing decisions, the described decisions in the article, allow separate considering the task of threat recognition in the frame of the known classes, and if necessary supplementing feature space for the new threat types. It is demonstrated, that new threats features often initially are not identified within the frame of existing base of threat classes knowledge in the decision support system. As well the methods and advised algorithms allow fulfilling the time-efficient cyber threats classification for a definite informatization object.
Źródło:
International Journal of Electronics and Telecommunications; 2019, 65, 4; 545-550
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Concept of V2G Battery Charging Station as the Implementation of IoT and Cyber Physical Network System
Autorzy:
Nasir, Muhammad
Safitri, Nelly
Rachmawati, Yassir
Arhami, Muhammad
Powiązania:
https://bibliotekanauki.pl/articles/27311964.pdf
Data publikacji:
2023
Wydawca:
Polska Akademia Nauk. Czasopisma i Monografie PAN
Tematy:
IoT
cyber physical network
V2G
EV
SoC
charging station
Opis:
The integration of the internet of things (IoT) and cyber physical network into the battery charging station system is critical to the success and long-term viability of the vehicle to grid (V2G) trend for future automobiles in terms of environmental and energy sustainability. The goal of this article is to create a V2G battery charging station concept using the internet of things (IoT) and a cyber physical network system. The V2G charging station concept was developed with the idea that every charging electric vehicle (EV) can communicate and coordinate with the charging station's control center, which includes a cyber physical system that addresses privacy and security concerns. The communication protocol must also be considered by the charging station. The preliminary test has been taken into consideration. Normal hours (for case one), peak hours (for case two), and valley hours (for case three), respectively, were created as charging circumstances for EVs at charging stations. Simulations were run for each of the three case scenarios. Each EV's battery state of charge (SoC) is provided a 50 percent initial charge and user-defined SoC restrictions. The MATLAB/SIMULINK platform was used to run the case simulations. The grid frequency, charging station output power, and the EV's battery SoC were all observed during the 24- hour simulation. As a result, the developed V2G charging station concept can regulate its input and output power depending on the battery status of the EVs inside the charging station, as well as provide frequency regulation service to the grid while meeting the energy demand of EV customers.
Źródło:
International Journal of Electronics and Telecommunications; 2023, 69, 2; 269--273
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Optimization Model of Adaptive Decision Taking Support System for Distributed Systems Cyber Security Facilities Placement
Autorzy:
Kalizhanova, Aliya
Akhmetov, Sultan
Lakhno, Valery
Wojcik, Waldemar
Nabiyeva, Gulnaz
Powiązania:
https://bibliotekanauki.pl/articles/226504.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
distributed computational network
cyber security
optimization
protection facilities placement
decision-making support system
Opis:
An article herein presents an optimization model, designated for computational core of decision-taking support system (DTSS). DTSS is necessary for system analysis and search of optimal versions for cyber security facilities placement and information protection of an enterprise or organization distributed computational network (DCN). DTSS and a model allow automize the analysis of information protection and cyber security systems in different versions. It is possible to consider, how separate elements, influence at DCN protection factors and their combinations. Offered model, in distinction from existing, has allowed implementing both the principles of information protection equivalency to a concrete threat and a system complex approach to forming a highly effective protection system for DCN. Hereby we have presented the outcomes of computational experiments on selecting the rational program algorithm of implementing the developed optimization model. It has been offered to use genetic algorithm modification (GAM). Based on the offered model, there has been implemented the module for adaptive DTSS. DTSS module might be applied upon designing protected DCN, based on preset architecture and available sets of information protection and cyber security systems in the network.
Źródło:
International Journal of Electronics and Telecommunications; 2020, 66, 3; 493-498
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Markov Model of Cyber Attack Life Cycle Triggered by Software Vulnerability
Autorzy:
Hoffmann, Romuald
Powiązania:
https://bibliotekanauki.pl/articles/1844613.pdf
Data publikacji:
2021
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
Markov model
cyber-attack
vulnerability
life cycle
homogenous Markov process
continuous time Markov chain
Opis:
Software vulnerability life cycles illustrate changes in detection processes of software vulnerabilities during using computer systems. Unfortunately, the detection can be made by cyber-adversaries and a discovered software vulnerability may be consequently exploited for their own purpose. The vulnerability may be exploited by cyber-criminals at any time while it is not patched. Cyber-attacks on organizations by exploring vulnerabilities are usually conducted through the processes divided into many stages. These cyber-attack processes in literature are called cyber-attack live cycles or cyber kill chains. The both type of cycles have their research reflection in literature but so far, they have been separately considered and modeled. This work addresses this deficiency by proposing a Markov model which combine a cyber-attack life cycle with an idea of software vulnerability life cycles. For modeling is applied homogeneous continuous time Markov chain theory.
Źródło:
International Journal of Electronics and Telecommunications; 2021, 67, 1; 35-41
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Modeling of the Decision-making Procedure for Financing of Cyber Security Means of Cloud Services by the Medium of a Bilinear Multistep Quality Game with Several Terminal Surfaces
Autorzy:
Lakhno, V.
Akhmetov, B.
Malyukov, V.
Kartbaev, T.
Powiązania:
https://bibliotekanauki.pl/articles/226592.pdf
Data publikacji:
2018
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
cloud infrastructures
cyber security
multistep quality game
optimum financing strategy
risks
decision-making support system
Opis:
The model is developed for the intellectualized decision-making support system on financing of cyber security means of transport cloud-based computing infrastructures, given the limited financial resources. The model is based on the use of the theory of multistep games tools. The decision, which gives specialists a chance to effectively assess risks in the financing processes of cyber security means, is found. The model differs from the existing approaches in the decision of bilinear multistep quality games with several terminal surfaces. The decision of bilinear multistep quality games with dependent movements is found. On the basis of the decision for a one-step game, founded by application of the domination method and developed for infinite antagonistic games, the conclusion about risks for players is drawn. The results of a simulation experiment within program implementation of the intellectualized decision-making support system in the field of financing of cyber security means of cloudbased computing infrastructures on transport are described. Confirmed during the simulation experiment, the decision assumes accounting a financial component of cyber defense strategy at any ratios of the parameters, describing financing process.
Źródło:
International Journal of Electronics and Telecommunications; 2018, 64, 4; 467-472
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
IoT : review of critical issues
Autorzy:
Romaniuk, R. S.
Powiązania:
https://bibliotekanauki.pl/articles/226508.pdf
Data publikacji:
2018
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
Internet of Things
IoT
industrial IoT
machine to machine communications
industry 4.0
IoT civilization
artificial super-intelligence
cyber-man
future of work
Opis:
Science - research transformation of the Internet of Things (IoT) has a number of colours and shadows, many dimensions including technical, social, community, financial, economic and civilization. This transformation has many wide development roads but also numerable pitfalls and traps. It does not take place solely at the level of scientific and technical progress and innovation. It preliminarily takes place in a complex sociopolitical-economic context, narrowed for simplification as social acceptance and education only. Such acceptance, for example expressed simply by demand and market popularity, for simple items supplemented by useful functions, such as an iron that recognizes the type of fabric and matches its work accordingly, a completely autonomous vacuum cleaner, etc., is trivial. We aim at much deeper relations of IoT with society. If IoT were only adding such functionalities, it would not be worth the time to consider it here. IoT causes a lot of confusion for much more important reasons in many areas of life. Somewhere further on the potential paths of IoT development, it has been noted with interest, but also with anxiety, the possibility of its empowerment as local but also global, superintendent surveillance system, gathering enormous amounts of information, creating knowledge and making autonomous decisions. Potential subjectivity must include such attributes as acquiting from the creator, autonomy, consciousness, morality and further building by the society the whole legal system around the new entity. It will not be a single entity, it will be a whole virtual society, with electronic people. The consequences can be far-reaching and appear as an inevitable option on such a scale for the first time in the history of our human society. Overcoming certain barriers recognized by us may mean that the intelligence and consciousness are not only attributes of the human biological mind. Such reasoning, not without a reason, encounters strong resistance. However, there is a fundamental difference between the opposition to some genetic research and the potential modification of man himself, and the opposition to machine building, a system of superintendence that far exceeds the possibilities of a single man and of entire societies.
Źródło:
International Journal of Electronics and Telecommunications; 2018, 64, 1; 95-102
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-6 z 6

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies