“…The results presented are a continuation of the research, results of which were described earlier in articles [10,18,23]. The prospects of further research include the enlargement of attributes knowledge base and the formation of BLM of ASR.…”
Section: Discussion Of Results Of Testing the Algorithms And Prospectsupporting
confidence: 71%
“…As was shown in articles [17,18], in case the RO attributes glossary is unchanged, it is possible to improve effectiveness of ASR learning. These studies do not take into account the possibility of increasing the degree of intersection of the RO classes.…”
Section: Development Of a System For The Detection Of Cyber Attacks Bmentioning
confidence: 99%
“…As a criterion of the optimization of parameters, during ASR learning, we used statistical parameters (information measures) for the variants of solutions with two alternatives [18,25,26] for a modified entropic indicator, as well as the Kullback-Leibler divergence (for three hypotheses) [27]. Table 1 Stages of splitting FS into clusters…”
Section: The Aim and Tasks Of Researchmentioning
confidence: 99%
“…We developed the algorithm that allows us to perform parallel formation of reference tolerances during an analysis of attributes of anomalies and cyber attacks, which are difficult to explain [1,7,16,18]. This approach, when a parallel formation of VAD -({ca K,i }) is performed, makes it possible to change VAD for all attributes at every step of learning simultaneously.…”
“…The results presented are a continuation of the research, results of which were described earlier in articles [10,18,23]. The prospects of further research include the enlargement of attributes knowledge base and the formation of BLM of ASR.…”
Section: Discussion Of Results Of Testing the Algorithms And Prospectsupporting
confidence: 71%
“…As was shown in articles [17,18], in case the RO attributes glossary is unchanged, it is possible to improve effectiveness of ASR learning. These studies do not take into account the possibility of increasing the degree of intersection of the RO classes.…”
Section: Development Of a System For The Detection Of Cyber Attacks Bmentioning
confidence: 99%
“…As a criterion of the optimization of parameters, during ASR learning, we used statistical parameters (information measures) for the variants of solutions with two alternatives [18,25,26] for a modified entropic indicator, as well as the Kullback-Leibler divergence (for three hypotheses) [27]. Table 1 Stages of splitting FS into clusters…”
Section: The Aim and Tasks Of Researchmentioning
confidence: 99%
“…We developed the algorithm that allows us to perform parallel formation of reference tolerances during an analysis of attributes of anomalies and cyber attacks, which are difficult to explain [1,7,16,18]. This approach, when a parallel formation of VAD -({ca K,i }) is performed, makes it possible to change VAD for all attributes at every step of learning simultaneously.…”
“…The practice of employing DSS and ES for the tasks on managing IP and CS at separate enterprises was outlined in [13,14]. As shown in [15,16], the existing commercial DSS and ES for the information (IS) and cybersecurity are of closed character, and their acquisition by individual enterprises implies significant financial costs.…”
Section: разработаны метод и модель управления киберзащитой объекта иmentioning
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.