2014 Joint 7th International Conference on Soft Computing and Intelligent Systems (SCIS) and 15th International Symposium on Ad 2014
DOI: 10.1109/scis-isis.2014.7044702
|View full text |Cite
|
Sign up to set email alerts
|

Expert systems for information security management and audit. Implementation phase issues

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
21
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(24 citation statements)
references
References 16 publications
1
21
0
Order By: Relevance
“…Four levels of automation of a security audit are found in [9] and the importance of automating the audit process is discussed in [10] due to repeatability of the process and the large amounts of data. Various methods of security audits and assessments are presented in [11] and [12].…”
Section: Related Workmentioning
confidence: 99%
“…Four levels of automation of a security audit are found in [9] and the importance of automating the audit process is discussed in [10] due to repeatability of the process and the large amounts of data. Various methods of security audits and assessments are presented in [11] and [12].…”
Section: Related Workmentioning
confidence: 99%
“…The increasing number of IS and CS threats has given rise to the surge of research in the field of development of uncovering and preventing cyberattack systems [1][2][3][4], and also DSS [5,6] and expert systems (ES) [7][8][9] in this field. But these studies are basically presented only as formal mathematical models and are not implemented in currently active software.…”
Section: Literature Data Analysis and Problem Statementmentioning
confidence: 99%
“…In such a way, according to the disputes in publications [8,10,17], dedicated to the potential of using integrated DSS [5,6] or ES [7,9,16] in ISMS, which realize a precautionary strategy of IO cyber-security [15,20], the task of developing methods, models and applied software for using them in practice in intelligent support of ISS rational structure planning and the task of assessment and prediction of IS and CS risks and also of IP management in conditions of uncertainty of potential cyberterrorists influences became relevant.…”
Section: Literature Data Analysis and Problem Statementmentioning
confidence: 99%
See 1 more Smart Citation
“…In the opinion of authors [13,14], the analysis of MCCS protection and development of the plan to counteract targeted cyberattacks must be preceded by the stage of detecting the basic threats and vulnerabilities. In this case, as indicated by researchers, a task of the formalization of connections between the threats and the OBCP vulnerabilities remains challenging.…”
Section: Introductionmentioning
confidence: 99%