Construction method of cyber attacks classifier on government information resources
Dynamics of successful realizations of cyber attacks, the object of which are public information resources, demonstrates the need to improve their security. One problem that hinders the implementation of effective information security systems, such as attack detection systems, is their inability to...
Main Authors: | Володимир Леонідович Бурячок, Руслан Валентинович Грищук, Віктор Миколайович Мамарєв |
---|---|
Format: | Article |
Language: | English |
Published: |
PC Technology Center
2015-01-01
|
Series: | Tehnologìčnij Audit ta Rezervi Virobnictva |
Subjects: | |
Online Access: | http://journals.uran.ua/tarp/article/view/37423 |
Similar Items
-
Methodology of building multicriterion differential-game models and methods
by: Руслан Валентинович Грищук
Published: (2013-09-01) -
Cyber Attacks and Combat Behavior
by: Carataș Maria Alina, et al.
Published: (2017-01-01) -
Pattern Analysis of Topological Attacks in Cyber-Physical Power Systems Considering Cascading Outages
by: Zhimei Zhang, et al.
Published: (2020-01-01) -
Extremely Randomized Trees-Based Scheme for Stealthy Cyber-Attack Detection in Smart Grid Networks
by: Mario R. Camana Acosta, et al.
Published: (2020-01-01) -
The Defense Against the latest Cyber Espionage both insider and outsider attacks
by: Nsambu, Emmanuel, et al.
Published: (2012)