104 results on '"Doynikova, Elena"'
Search Results
2. Sentiment Analysis of Social Network Posts for Detecting Potentially Destructive Impacts
3. Security Analysis of Information Systems Based on Attack Sequences Generation and Testing
4. Security Measuring System for IoT Devices
5. Detection and Monitoring of the Destructive Impacts in the Social Networks Using Machine Learning Methods
6. Towards Attacker Attribution for Risk Analysis
7. Security Analysis of Information Systems Based on Attack Sequences Generation and Testing
8. Security Measuring System for IoT Devices
9. The Common Approach to Determination of the Destructive Information Impacts and Negative Personal Tendencies of Young Generation Using the Neural Network Methods for the Internet Content Processing
10. The Architecture of Subsystem for Eliminating an Uncertainty in Assessment of Information Objects’ Semantic Content Based on the Methods of Incomplete, Inconsistent and Fuzzy Knowledge Processing
11. Data Analytics for Security Management of Complex Heterogeneous Systems: Event Correlation and Security Assessment Tasks
12. P2Onto: Making Privacy Policies Transparent
13. Stateful RORI-based countermeasure selection using hypergraphs
14. Detection and Monitoring of the Destructive Impacts in the Social Networks Using Machine Learning Methods
15. An Automated Graph Based Approach to Risk Assessment for Computer Networks with Mobile Components
16. Ontological Hybrid Storage for Security Data
17. AI- and Metrics-Based Vulnerability-Centric Cyber Security Assessment and Countermeasure Selection
18. Attack Graph-Based Countermeasure Selection Using a Stateful Return on Investment Metric
19. Towards Intelligent Data Processing for Automated Determination of Information System Assets
20. P2Onto: Making Privacy Policies Transparent
21. The Architecture of Subsystem for Eliminating an Uncertainty in Assessment of Information Objects’ Semantic Content Based on the Methods of Incomplete, Inconsistent and Fuzzy Knowledge Processing
22. The Common Approach to Determination of the Destructive Information Impacts and Negative Personal Tendencies of Young Generation Using the Neural Network Methods for the Internet Content Processing
23. Choosing Models for Security Metrics Visualization
24. Countermeasure Selection Based on the Attack and Service Dependency Graphs for Security Incident Management
25. Security Assessment of Computer Networks Based on Attack Graphs and Security Events
26. Attack Graph-Based Countermeasure Selection Using a Stateful Return on Investment Metric
27. Ontological Hybrid Storage for Security Data
28. Combining of Scanning Protection Mechanisms in GIS and Corporate Information Systems
29. Automation of Asset Inventory for Cyber Security: Investigation of Event Correlation-Based Technique
30. Federated Learning for Intrusion Detection in the Critical Infrastructures: Vertically Partitioned Data Use Case
31. Privacy Policies of IoT Devices: Collection and Analysis
32. Construction and Analysis of Integral User-Oriented Trustworthiness Metrics
33. An approach for selecting countermeasures against harmful information based on uncertainty management
34. Towards Security Decision Support for large-scale Heterogeneous Distributed Information Systems
35. CPE and CVE based Technique for Software Security Risk Assessment
36. Security Decision Support in the Control Systems based on Graph Models
37. Security Assessment of Computer Networks Based on Attack Graphs and Security Events
38. Analysis of Formats of Young People’s Communicative Behavior in Social Network
39. Selection of Countermeasures against Harmful Information based on the Assessment of Semantic Content of Information Objects in the Conditions of Uncertainty
40. A Semantic Model for Security Evaluation of Information Systems
41. Attacker Behaviour Forecasting Using Methods of Intelligent Data Analysis: A Comparative Review and Prospects
42. Synthesis and Analysis of the Fixed-Point Hodgkin–Huxley Neuron Model
43. Use of neural networks for forecasting of the exposure of social network users to destructive impacts
44. Improving Calculation Accuracy of Digital Filters Based on Finite Field Algebra
45. Determination of System Weaknesses Based on the Analysis of Vulnerability Indexes and the Source Code of Exploits
46. Considerations on sentiment of social network posts as a feature of destructive impacts.
47. Automated Detection of Assets and Calculation of their Criticality for the Analysis of Information System Security
48. Ontology of Metrics for Cyber Security Assessment
49. Automated Revealing of Organizational Assets Based on Event Correlation
50. An Ontology-based Storage of Security Information
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.