2018
DOI: 10.1007/978-3-030-00184-1_15
|View full text |Cite
|
Sign up to set email alerts
|

Development of Sectoral Intellectualized Expert Systems and Decision Making Support Systems in Cybersecurity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(13 citation statements)
references
References 15 publications
0
9
0
Order By: Relevance
“…The ICS infrastructure from the point of view of ensuring CS and IP is presented on Figure 1. By default, standard IPT [23] are installed in the ICS nodes: antivirus; firewall; tools for: 1) intrusion detection 2) cryptographic IP; 3) access control; 4) integrity control; 5) authentication, etc. Naturally, for a specific ICS, the list can be supplemented due to insufficiency or reduced due to redundancy.…”
Section: Methods and Modelsmentioning
confidence: 99%
See 3 more Smart Citations
“…The ICS infrastructure from the point of view of ensuring CS and IP is presented on Figure 1. By default, standard IPT [23] are installed in the ICS nodes: antivirus; firewall; tools for: 1) intrusion detection 2) cryptographic IP; 3) access control; 4) integrity control; 5) authentication, etc. Naturally, for a specific ICS, the list can be supplemented due to insufficiency or reduced due to redundancy.…”
Section: Methods and Modelsmentioning
confidence: 99%
“…It was shown in [17] - [20] that standard and modified GAs are efficient enough to solve most complex optimization problems [23] and are promising for further study and improvement.…”
Section: Review and Analysis Of Previous Studiesmentioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, the proposed toolkit will allow the participants of the investment process in CSS of ICTS to improve significantly the performance indicators of their activities. In addition, the joint use of software products such as IDSS "SSDMI" and an adaptive expert system for the recognition of cyberthreats (described in the works of the authors [20,21,23]) will allow investors not only at the stage of initial analysis of the project, but at the modernization of existing systems of cybersecurity, in particular, for critical computer infrastructures, to build effectively a forward-looking policy in the field of financing of cyber security systems, taking into account the trend towards increasing the amount of threats for their ICS.…”
mentioning
confidence: 99%