2016
DOI: 10.15587/1729-4061.2016.85600
|View full text |Cite
|
Sign up to set email alerts
|

Development of adaptive expert system of information security using a procedure of clustering the attributes of anomalies and cyber attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
10
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 14 publications
(15 citation statements)
references
References 20 publications
1
10
0
Order By: Relevance
“…The results presented are a continuation of the research, results of which were described earlier in articles [10,18,23]. The prospects of further research include the enlargement of attributes knowledge base and the formation of BLM of ASR.…”
Section: Discussion Of Results Of Testing the Algorithms And Prospectsupporting
confidence: 71%
See 3 more Smart Citations
“…The results presented are a continuation of the research, results of which were described earlier in articles [10,18,23]. The prospects of further research include the enlargement of attributes knowledge base and the formation of BLM of ASR.…”
Section: Discussion Of Results Of Testing the Algorithms And Prospectsupporting
confidence: 71%
“…As was shown in articles [17,18], in case the RO attributes glossary is unchanged, it is possible to improve effectiveness of ASR learning. These studies do not take into account the possibility of increasing the degree of intersection of the RO classes.…”
Section: Development Of a System For The Detection Of Cyber Attacks Bmentioning
confidence: 99%
See 2 more Smart Citations
“…The practice of employing DSS and ES for the tasks on managing IP and CS at separate enterprises was outlined in [13,14]. As shown in [15,16], the existing commercial DSS and ES for the information (IS) and cybersecurity are of closed character, and their acquisition by individual enterprises implies significant financial costs.…”
Section: разработаны метод и модель управления киберзащитой объекта иmentioning
confidence: 99%