We proposed an architecture for a protection control system of the object of informatization (OBI) with the subsystem of intelligent support for making decisions on the operational management of cyberprotection. The proposed architecture, in particular, can be used under conditions of the incompleteness of knowledge about the state of OBI protection. We developed a model for the operational management of cyberprotection at OBI and formed a rational complex of protection means. The model is based on the morphological approach. The model allows, taking into account morphological matrices for each of the five proposed perimeters prepared by the intelligent decision-making support system (IDMSS), generation of variants of sets that consider the...
This paper studies Optimal Intelligent Supervisory Control System (OISCS) model for the design of co...
Types and complexity of information security related vulnerabilities are growing rapidly and present...
In the age of rapidly developing information technologies, when the process of informatization has l...
We developed the method and the model for managing protection of objects of informatization, based o...
Introduction. To increase the decision-making efficiency at the enterprise, it is advisable to use a...
The object of the research is intelligent systems for collecting, processing and analyzing informati...
The structures of intelligent information protection systems are considered. The tree of tasks for p...
The article herein presents the method and algorithms for forming the feature space for the base of ...
A methodological approach to the construction of models of typical decision support tasks for the fo...
This paper has proposed a model of the computational core for the decision support system (DSS) when...
This paper has proposed a model of the computational core for the decision support system (DSS) when...
The development of technologies and computing resources has not only expanded the range of digital s...
This article discusses the purpose, tasks and composition of the Operational Security Center (SOC). ...
In order to reach the goal, in the thesis work, a detailed information about the actuality of the de...
The present article covers the use of an artificial intelligence system in the organization of the p...
This paper studies Optimal Intelligent Supervisory Control System (OISCS) model for the design of co...
Types and complexity of information security related vulnerabilities are growing rapidly and present...
In the age of rapidly developing information technologies, when the process of informatization has l...
We developed the method and the model for managing protection of objects of informatization, based o...
Introduction. To increase the decision-making efficiency at the enterprise, it is advisable to use a...
The object of the research is intelligent systems for collecting, processing and analyzing informati...
The structures of intelligent information protection systems are considered. The tree of tasks for p...
The article herein presents the method and algorithms for forming the feature space for the base of ...
A methodological approach to the construction of models of typical decision support tasks for the fo...
This paper has proposed a model of the computational core for the decision support system (DSS) when...
This paper has proposed a model of the computational core for the decision support system (DSS) when...
The development of technologies and computing resources has not only expanded the range of digital s...
This article discusses the purpose, tasks and composition of the Operational Security Center (SOC). ...
In order to reach the goal, in the thesis work, a detailed information about the actuality of the de...
The present article covers the use of an artificial intelligence system in the organization of the p...
This paper studies Optimal Intelligent Supervisory Control System (OISCS) model for the design of co...
Types and complexity of information security related vulnerabilities are growing rapidly and present...
In the age of rapidly developing information technologies, when the process of informatization has l...