Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "information model" wg kryterium: Temat


Wyświetlanie 1-4 z 4
Tytuł:
Decision-Making Supporting Models Concerning the Internal Security of the State
Autorzy:
Kovalchuk, Oleg
Kasianchuk, Mykhailo
Karpinski, Mikolaj
Shevchuk, Ruslan
Powiązania:
https://bibliotekanauki.pl/articles/27311918.pdf
Data publikacji:
2023
Wydawca:
Polska Akademia Nauk. Czasopisma i Monografie PAN
Tematy:
information security of the state
decision-making
information and analytical support
internal security
model
Opis:
In the digital society, states’ information security has become one of the key elements of ensuring the competitiveness and sustainable development of the state, guaranteeing its integrity and security in general. An important component of state security is the internal security of the state, which must ensure the personal and public safety of its citizens. Modern Ukraine is building a new system of criminal justice, which requires a new information system for risk assessment and support for optimal decision-making. Today, applied research and the development of information and analytical software for the internal security of the state have acquired a special meaning. In the paper, there is built a set of models for providing operational information for decision-making in criminal justice. This is a cluster model for creating criminal profiles of convicts, and a scoring model for identifying individual characteristics of criminals that have the greatest impact on their propensity to reoffend. The obtained models can provide reliable support for decision-making in the field of criminal justice and become part of the information support system for the internal security of Ukraine in general.
Źródło:
International Journal of Electronics and Telecommunications; 2023, 69, 2; 301--307
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Development of an Information Security System Based on Modeling Distributed Computer Network Vulnerability Indicators of an Informatization Object
Autorzy:
Lakhno, Valerii
Alimseitova, Zhuldyz
Kalaman, Yerbolat
Kryvoruchko, Olena
Desiatko, Alona
Kaminskyi, Serhii
Powiązania:
https://bibliotekanauki.pl/articles/27311974.pdf
Data publikacji:
2023
Wydawca:
Polska Akademia Nauk. Czasopisma i Monografie PAN
Tematy:
information security
informatization object
distributed computing network
mathematical model
vulnerability coefficient
virtualization
IDS
SIEM
Opis:
A methodology for development for distributed computer network (DCN) information security system (IS) for an informatization object (OBI) was proposed. It was proposed to use mathematical modeling at the first stage of the methodology. In particular, a mathematical model was presented based on the use of the apparatus of probability theory to calculate the vulnerability coefficient. This coefficient allows one to assess the level of information security of the OBI network. Criteria for assessing the acceptable and critical level of risks for information security were proposed as well. At the second stage of the methodology development of the IS DCN system, methods of simulation and virtualization of the components of the IS DCN were used. In the course of experimental studies, a model of a protected DCN has been built. In the experimental model, network devices and DCN IS components were emulated on virtual machines (VMs). The DCN resources were reproduced using the Proxmox VE virtualization system. IPS Suricata was deployed on RCS hosts running PVE. Splunk was used as SIEM. It has been shown that the proposed methodology for the formation of the IS system for DCN and the model of the vulnerability coefficient makes it possible to obtain a quantitative assessment of the levels of vulnerability of DCN OBI.
Źródło:
International Journal of Electronics and Telecommunications; 2023, 69, 3; 475--483
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Rapid Text Entry Using Mobile and Auxiliary Devices for People with Speech Disorders Communication
Autorzy:
Krak, Iurii V.
Barmak, Olexander V.
Bahrii, Ruslan O.
Wójcik, Waldemar
Rakhmetullina, Saule
Amirgaliyeva, Saltanat
Powiązania:
https://bibliotekanauki.pl/articles/227152.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
information technology
alternative communication
ambiguous virtual keyboard
text prediction
statistical language model
N-gram
Opis:
The article considers information technology for the realization of human communication using residual human capabilities, obtained by organizing text entry using mobile and auxiliary devices. The components of the proposed technology are described in detail: the method for entering text information to realize the possibility of introducing a limited number of controls and the method of predicting words that are most often encountered after words already entered in the sentence. A generalized representation of the process of entering text is described with the aid of an ambiguous virtual keyboard and the representation of control signals for the selection of control elements. The approaches to finding the optimal distribution of the set of alphabet characters for different numbers of control signals are given. The method of word prediction is generalized and improved, the statistical language model with "back-off" is used, and the approach to the formation of the training corpus of the spoken Ukrainian language is proposed.
Źródło:
International Journal of Electronics and Telecommunications; 2020, 66, 2; 273-279
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Trust and Risk Assessment Model of Popular Software Based on Known Vulnerabilities
Autorzy:
Janiszewski, M.
Felkner, A.
Olszak, J.
Powiązania:
https://bibliotekanauki.pl/articles/226553.pdf
Data publikacji:
2017
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
software vulnerabilities
risk assessment
software management
trust management models
reputation management models
0-day vulnerabilities forecast
risk of information systems
prediction model
Opis:
This paper presents a new concept of an approach to risk assessment which can be done on the basis of publicly available information about vulnerabilities. The presented approach uses also the notion of trust and implements many concepts used in so called trust and reputation management systems (which are widely used in WSN, MANET or P2P networks, but also in ecommerce platforms). The article shows first outcomes obtained from the presented model. The outcomes demonstrate that the model can be implemented in real system to make software management more quantified and objective process, which can have real and beneficial impact on institutional security. In article, however the emphasis was set not on the model itself (which can be easily changed) but on the possibility of finding useful information about vulnerabilities.
Źródło:
International Journal of Electronics and Telecommunications; 2017, 63, 3; 329-336
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-4 z 4

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies