INTELLIGENT CYBER DEFENCE SYSTEMS: DETECTION OF RANSOMWARE AND PROTECTION OF WIRELESS NETWORKS BASED ON ARTIFICIAL INTELLIGENCE TECHNOLOGIES
Oleh Harasymchuk; Ivan Opirskyy, Roman Banakh, Danyil Zhuravchak, Olha Partyka, Elena Nyemkova, Sviatoslav Vasylyshyn, Andrii Partyka, Yuriy Nakonechnyy, Taras Lukovskyy, Vitalii Susukailo, Viktor Otenko, Ivan Tyshyk, Nazarii Dzianyi, Dmytro Sabodashko, Petro Haraniuk, Valerii Dudykevych, Serhiy Semenyuk, Marta Stakhiv, Ihor Zhuravel, Taras Kret, Lesya Mychuda, Zynoviy Mychuda, Orest Polotai, Yevhenii Kurii, Nataliya Nakonechna, Nataliya Luzhetska, Anatoliy […]
Continuous accounting implementation for a new future: opening the black box through green transformational leadership by surveying Indonesia banking employees
Dian Widiyati, Etty Murwaningsari, Juniati Gunawan This study intents to examine and analyze the continuous accounting implementation with green transformational leadership as moderation variable by conducting a survey. Accounting produce services that impacted by the industrial revolution, so that they need to prepare for the challenges of an industry that clings to inflexible rituals and […]
A model of decoy system based on dynamic attributes for cybercrime investigation
Sviatoslav Vasylyshyn, Vitalii Susukailo, Ivan Opirskyy, Yevhenii Kurii, Ivan Tyshyk The object of research are decoys with dynamic attributes. This paper discusses the impact of decoys involving blockchain technologies on the state of information security of the organization and the process of researching cybercrime. This is important because most cybercrimes are detected after the attacker […]
A reassessment of public awareness and legislative framework on cybersecurity in South Africa
Sogo Angel Olofinbiyi Cybersecurity has become a growing concern globally, following this era of unparalleled resources, power relations and technological evolution. Technological vulnerabilities have led to massive data breaches in recent years and research has highlighted potential uses of artificial intelligence to engineer more powerful cyber-attacks thus revealing new hardware weaknesses. Cyber-attacks pose a threat […]
Development and analysis of game-theoretical models of security systems agents interaction
Serhii Yevseiev, Oleksandr Milov, Stanislav Milevskyi, Oleksandr Voitko, Maksym Kasianenko, Yevgen Melenti, Serhii Pohasii, Hrygorii Stepanov, Oleksandr Turinskyi, Serhii Faraon A game-theoretic approach is presented, which claims to be a universal method for solving most problems in the field of cybersecurity. As arguments to confirm the superiority of game theory, mathematical validity and provability of […]
Development of methodological foundations for designing a classifier of threats to cyberphysical systems
Olexander Shmatko, Svitlana Balakireva, Andrii Vlasov, Nataliya Zagorodna, Olha Korol, Oleksandr Milov, Oleksii Petrov, Serhii Pohasii, Khazail Rzayev, Vladyslav Khvostenko The emergence of a full-scale quantum computer questions the stability of almost all symmetric and asymmetric cryptography algorithms. At the same time, the rapid growth of computing resources of IT and “G” technologies contributes to […]
Development of a method for assessing cybernetic security in special-purpose information systems
Serhii Drozdov, Yurii Zhuravskyi, Olha Salnikova, Ruslan Zhyvotovskyi, Elena Odarushchenko, Oleksandr Shcheptsov, Oleksiy Alekseienko, Roman Lazuta, Oleksii Nalapko, Olha Pikul A method for assessing cybersecurity in special-purpose information systems was developed. Cybersecurity assessment was performed using decision trees, implemented using “IF-THEN” fuzzy rules, which are considered as common building blocks of the decision tree. This […]
Development of the space-time structure of the methodology for modeling the behavior of antagonistic agents of the security system
Oleksandr Milov, Andrii Hrebeniuk, Andrii Nalyvaiko, Elena Nyemkova, Ivan Opirskyy, Igor Pasko, Khazail Rzayev, Anatolii Salii, Uliia Synytsina, Olha Soloviova The rapid development of computer technology, the emergence of modern cyber threats with signs of hybridity and synergy put forward strict requirements for the economic component of national security and especially the processes of ensuring […]
Development of the space-time structure of the methodology for modeling the behavior of antagonistic agents of the security system
Oleksandr Milov, Andrii Hrebeniuk, Andrii Nalyvaiko, Elena Nyemkova, Ivan Opirskyy, Igor Pasko, Khazail Rzayev, Anatolii Salii, Uliia Synytsina, Olha Soloviova The rapid development of computer technology, the emergence of modern cyber threats with signs of hybridity and synergy put forward strict requirements for the economic component of national security and especially the processes of ensuring […]