Abstract: In this paper, we propose a model for predicting the dynamics of a generalized efficiency index for corporate computer networks operating under conditions of malicious cyber activity. The model represents the dynamics of the index as a function of the operational efficiency of a corporate network at each instant on a certain time interval. In this case, the level of operational efficiency of the network depends on the operational efficiency of its components and is described by a system of differential equations that take into account both malicious activity and the process of eliminating its effects. Under some simplifying conditions, we find analytical solutions of these equations, which significantly facilitates the prediction ...
Proper evaluation of the risk associated to a cyber attack is a crucial aspect for many companies. T...
The article presents a method for setting the optimal time for special audit to improve the level of...
The recommendation systems used to form a news feed in social networks or to create recommendation l...
Cyber security has become a serious challenge for organizations due to growing use of the Internet a...
Utility networks are becoming more and more interconnected. Besides the natural physical interdepend...
The article discusses the mathematical model of the implemented intruder of the process of informati...
Objective. The most important task of the theory and practice of ensuring the information security o...
In this paper we present analytical techniques that can be used to better understand the behavior of...
A new model for malicious file propagation and transmission in a computer network is formulated. Thi...
This research emphasizes to establish an e-VEIRS (vulnerable, exhibited, infected, restored) widespr...
All sizes of enterprises and organizations in the Internet World face the plaguing problem of Intern...
In this paper, we propose an efficiency/performance measure for dynamic networks, which have been mo...
Malicious softwares or malwares for short have become a major security threat. While origi-nating in...
The purpose of this article is to extend related research on the spread of malware in networks and t...
Development of Cybersecurity processes and strategies should take two main approaches. One is to dev...
Proper evaluation of the risk associated to a cyber attack is a crucial aspect for many companies. T...
The article presents a method for setting the optimal time for special audit to improve the level of...
The recommendation systems used to form a news feed in social networks or to create recommendation l...
Cyber security has become a serious challenge for organizations due to growing use of the Internet a...
Utility networks are becoming more and more interconnected. Besides the natural physical interdepend...
The article discusses the mathematical model of the implemented intruder of the process of informati...
Objective. The most important task of the theory and practice of ensuring the information security o...
In this paper we present analytical techniques that can be used to better understand the behavior of...
A new model for malicious file propagation and transmission in a computer network is formulated. Thi...
This research emphasizes to establish an e-VEIRS (vulnerable, exhibited, infected, restored) widespr...
All sizes of enterprises and organizations in the Internet World face the plaguing problem of Intern...
In this paper, we propose an efficiency/performance measure for dynamic networks, which have been mo...
Malicious softwares or malwares for short have become a major security threat. While origi-nating in...
The purpose of this article is to extend related research on the spread of malware in networks and t...
Development of Cybersecurity processes and strategies should take two main approaches. One is to dev...
Proper evaluation of the risk associated to a cyber attack is a crucial aspect for many companies. T...
The article presents a method for setting the optimal time for special audit to improve the level of...
The recommendation systems used to form a news feed in social networks or to create recommendation l...