2016
DOI: 10.15587/1729-4061.2016.71769
|View full text |Cite
|
Sign up to set email alerts
|

Design of adaptive system of detection of cyber-attacks, based on the model of logical procedures and the coverage matrices of features

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
33
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 17 publications
(43 citation statements)
references
References 23 publications
1
33
0
Order By: Relevance
“…The results presented are a continuation of the research, results of which were described earlier in articles [10,18,23]. The prospects of further research include the enlargement of attributes knowledge base and the formation of BLM of ASR.…”
Section: Discussion Of Results Of Testing the Algorithms And Prospectsupporting
confidence: 71%
See 2 more Smart Citations
“…The results presented are a continuation of the research, results of which were described earlier in articles [10,18,23]. The prospects of further research include the enlargement of attributes knowledge base and the formation of BLM of ASR.…”
Section: Discussion Of Results Of Testing the Algorithms And Prospectsupporting
confidence: 71%
“…The rules of ASR learning, according to [1,2,14,23,24], are built based on the iteration procedure of searching for the maximum boundary magnitude of an information condition of functional effectiveness (ICFE):…”
Section: The Aim and Tasks Of Researchmentioning
confidence: 99%
See 1 more Smart Citation
“…Contemporary MCCS are usually well protected [1,3,17]. In order to succeed, those attacking have to switch off or overcome protection in the process of realization of different classes of cyberattacks, Fig.…”
Section: Model For Describing the Metaknowledge In Dss For The Provismentioning
confidence: 99%
“…Papers [17,18] examined deficiencies of existing DSS and ES in the area of IS. Such deficiencies include the need for the presence of highly qualified experts while compiling a knowledge base (KB) and the field of knowledge (FOK), difficulties in the algorithmization of separate methods and models, impossibility to estimate the effectiveness of specific DSS and others.…”
Section: Introductionmentioning
confidence: 99%