This article is about criteria of reliability of information. The validity period of the information
has been determined. It is established that an important stage of selection, development of
methods and mechanisms for ensuring the reliability of information is the analysis of the
processes of its processing. The definition of the information reliability assessment is given, and it
is also established that the complexity of the information reliability assessment is information
evaluation. To assess the accuracy of information, such features as the doubtfulness of the facts
presented, the emotional coloring of the content, the tone of the content in relation to an object or event, the sensational content, the hidden content. These features will be based on monitoring the
reliability of information in the information space, which aims to minimize the subjectivity of
peer review of the content of authors from the point of view of their influential orientation
towards individuals of the information space. In order to minimize this subjectivism, the basis of
evaluations is the key criteria for the reliability of information, which, unlike estimates, are
largely fully measured: the criterion of balance of information, the criterion for separating facts
from opinions, the criterion for the accuracy and reliability of information, the criterion for
completeness of information. Thus, there is a need to create an algorithm for assessing the
reliability of information in the information space, which makes it possible to investigate
information resources for the impact on them, identify problems of information security in a
timely manner, recommend proven solutions for use at critical sites, organize and to carry out
special trainings at the state level, etc.
The dynamics of the increase in the number of vulnerabilities of software and hardware platforms of corporate networks, the accessibility of exploit modules for these vulnerabilities in the Internet and the Darknet, along with the lack of a sufficient number of highly qualified cybersecurity specialists make the problem of effective automation of preventive information protection mechanisms quite urgent. In particular, the basic algorithms for the sequential implementation of exploits embedded in the vulnerability exploitation tools are quite primitive, and the proposed approaches to their improvement require constant adaptation of mathematical models of the implementation of attacking actions. This justifies the direction of this research. This paper considers the issue of forming decision-making rules for the implementation of vulnerabilities’ exploits during an active analysis of the corporate networks’ security. Based on the results of the analysis of quantitative indicators of the quality of the validation mechanism of the identified vulnerabilities and the use of fuzzy logic methods, a fuzzy system was formed, membership functions for each of the linguistic variables were determined and a knowledge base was built, which makes it possible to determine the quality level of the validation mechanism of the identified vulnerabilities based on all available information. At the same time, in order to eliminate the “human factor” of making mistakes when validating vulnerabilities, based on the built fuzzy knowledge base and the established levels of exploit modules’ efficiency, the rules for the implementation of individual exploit modules during an active analysis of the corporate network’s security were formed. Results of research make it possible to create expert systems for diagnosing the effectiveness of the validation mechanism of the identified vulnerabilities of target systems, and also help to solve the problem of the lack of qualified specialists in the analysis and maintenance of an appropriate level of information security of corporate networks.
МЕТОДИКА ФІЛЬТРАЦІЇ ЦИФРОВИХ СИГНАЛІВ З ВИКОРИСТАННЯМ ШВИДКОГО ВЕЙВЛЕТ-ПЕРЕТВОРЕННЯЗапропоновано методику фільтрації цифрових сигналів з використанням вейвлет-перетворення у базисі Хаара. Показано, що в даній методиці доцільно проводити фільтрацію сигналів з використанням алгоритмів швидкого вейвлет-перетворення.Ключові слова: цифровий сигнал, швидке вейвлет-перетворення, фільтрація, методика, частота.
Розглянута можливість використання пакетного вейвлет-перетворення для обробки оцифрованих радіотехнічних сигналів. Показано, що розроблений алгоритм дозволяє відновити радіотехнічний сигнал із заданою точністю. Ключові слова: цифровий сигнал, пакетне вейвлет-перетворення, радіотехнічний сигнал, спектральний аналіз, частота.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.