Method of detection of http attacks on a smart home using the algebraic matching method
All international and domestic spheres of production and service are developing at a frantic pace, and in modern life it is no longer possible to imagine any enterprise or government institution without connecting to the Internet and using cloud services. The development of digital technologies forc...
Saved in:
| Date: | 2023 |
|---|---|
| Main Authors: | Gorbatiuk, V.O., Gorbatiuk, S.O. |
| Format: | Article |
| Language: | English |
| Published: |
PROBLEMS IN PROGRAMMING
2023
|
| Subjects: | |
| Online Access: | https://pp.isofts.kiev.ua/index.php/ojs1/article/view/540 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Problems in programming |
| Download file: | |
Institution
Problems in programmingSimilar Items
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021)
by: Шиян, А. А., et al.
Published: (2021)
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: Дьогтєва, І. О., et al.
Published: (2021)
by: Дьогтєва, І. О., et al.
Published: (2021)
Method of detection of http attacks on a smart home using the algebraic matching method
by: Gorbatiuk, V.O., et al.
Published: (2022)
by: Gorbatiuk, V.O., et al.
Published: (2022)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
Integrated security systems for protecting payment synchronization from MITM attacks
by: Shahmatov, I.O., et al.
Published: (2025)
by: Shahmatov, I.O., et al.
Published: (2025)
Improvement of protection for WEB resources from attacks based on combined heuristic and statistical approach
by: Prysiazhnyi, D. P.
Published: (2016)
by: Prysiazhnyi, D. P.
Published: (2016)
Game-theoretic approach to the network security problem
by: Ignatenko, O.P.
Published: (2018)
by: Ignatenko, O.P.
Published: (2018)
Потокові моделі мережі Інтернет за умов атак на відмову
by: Andon, P.I., et al.
Published: (2015)
by: Andon, P.I., et al.
Published: (2015)
Complex approach for state critical information infrastructure cyber defence system constructing
by: Synitsyn, I.P., et al.
Published: (2018)
by: Synitsyn, I.P., et al.
Published: (2018)
Organizational and legal mechanisms of cybersecurity and cyber defense in Ukraine: essentiality, conditions and development prospects
by: Semenchenko, A.I., et al.
Published: (2020)
by: Semenchenko, A.I., et al.
Published: (2020)
Using Bayesian network models for early assessment of cyberattack threats to electricity generation facility
by: Гальчинський, Л. Ю., et al.
Published: (2025)
by: Гальчинський, Л. Ю., et al.
Published: (2025)
Algebraic modeling in international and local service logistical systems
by: Letychevskyi, O.O., et al.
Published: (2021)
by: Letychevskyi, O.O., et al.
Published: (2021)
Security basic model for applied tasks of the distributed information system
by: Rodin, Y.S., et al.
Published: (2021)
by: Rodin, Y.S., et al.
Published: (2021)
Automation of standardized cyber insurance processes
by: Khudyntsev, Mykola, et al.
Published: (2025)
by: Khudyntsev, Mykola, et al.
Published: (2025)
Neurosymbolic models for ensuring cybersecurity in critical cyberphysical systems
by: Yevdokymov, S.O.
Published: (2025)
by: Yevdokymov, S.O.
Published: (2025)
Methods for Shecking the Resistance to http-Attacks on a Smart Home by Algebraic Comparison
by: V. O. Horbatiuk, et al.
Published: (2022)
by: V. O. Horbatiuk, et al.
Published: (2022)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
Neurosymbolic approach for attack detection in satellite communication systems
by: Mostovyi, O.S.
Published: (2024)
by: Mostovyi, O.S.
Published: (2024)
On maximal and minimal linear matching property
by: Aliabadi, M., et al.
Published: (2018)
by: Aliabadi, M., et al.
Published: (2018)
Algebraic approach to the analysis of legal documents
by: Letychevskyi, O.O., et al.
Published: (2023)
by: Letychevskyi, O.O., et al.
Published: (2023)
Cyber Resilience Key Metrics in Small and Medium-Sized Enterprises
by: Deruma, Sintija
Published: (2025)
by: Deruma, Sintija
Published: (2025)
Application of machine learning models to predict energy consumption in smart home systems
by: Haidukevych, V.O., et al.
Published: (2025)
by: Haidukevych, V.O., et al.
Published: (2025)
Algebraic patterns of binary code vulnerabilities
by: Yakovlev, V.M.
Published: (2020)
by: Yakovlev, V.M.
Published: (2020)
Context WEB-services matching as a means of search query. Ontological approaches
by: Zakharova, O.V.
Published: (2020)
by: Zakharova, O.V.
Published: (2020)
Ontology-based semantic similarity to metadata analysis in the information security domain
by: Gladun, A.Y., et al.
Published: (2021)
by: Gladun, A.Y., et al.
Published: (2021)
IMAGES MATCHING IN CASE OF SURFACE RELIEF RECONSTRUCTION WITH THE PHOTOCLINOMETRIC METHOD
by: Dulova, I. A., et al.
Published: (2015)
by: Dulova, I. A., et al.
Published: (2015)
On solvable \(Z_3\)-graded alternative algebras
by: Goncharov, Maxim
Published: (2016)
by: Goncharov, Maxim
Published: (2016)
Design and implementation of the unified control module for a sustainable operation of the combined renewable energy system
by: Volodarskyi, V., et al.
Published: (2017)
by: Volodarskyi, V., et al.
Published: (2017)
Use of methods of algebraic programming for the formal verification of legal acts
by: Peschanenko, V.S., et al.
Published: (2018)
by: Peschanenko, V.S., et al.
Published: (2018)
Decentralized systems in logistics: usage overview and security issues
by: Letichevsky, O.O., et al.
Published: (2020)
by: Letichevsky, O.O., et al.
Published: (2020)
Method of information and analytical support for information security risk management of information systems
by: Rodin, Y.S.
Published: (2019)
by: Rodin, Y.S.
Published: (2019)
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019)
by: Saliieva, O. V., et al.
Published: (2019)
Digital twins in intrusion detection systems based on deep learning
by: Letychevskyi, O.O., et al.
Published: (2025)
by: Letychevskyi, O.O., et al.
Published: (2025)
Authentication Method of Interaction Parties Based on Reccurent Sequences
by: Yaremchuk, Yu. Е.
Published: (2013)
by: Yaremchuk, Yu. Е.
Published: (2013)
Method of Digital Signature Producing and Verification Based on Recurrent Sequences
by: Iaremchuk, Iu. Е.
Published: (2013)
by: Iaremchuk, Iu. Е.
Published: (2013)
Flow based bonet traffic detection using AI
by: Panchuk, B.O.
Published: (2023)
by: Panchuk, B.O.
Published: (2023)
Gentle \(m\)-Calabi-Yau tilted algebras
by: Garcia Elsener, A.
Published: (2020)
by: Garcia Elsener, A.
Published: (2020)
Gram matrices and Stirling numbers of a class of diagram algebras, I
by: Karimilla Bi, N., et al.
Published: (2018)
by: Karimilla Bi, N., et al.
Published: (2018)
Ideally finite Leibniz algebras
by: Kurdachenko, L. A., et al.
Published: (2023)
by: Kurdachenko, L. A., et al.
Published: (2023)
Gram matrices and Stirling numbers of a class of diagram algebras, II
by: Karimilla Bi, N., et al.
Published: (2018)
by: Karimilla Bi, N., et al.
Published: (2018)
Similar Items
-
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021) -
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: Дьогтєва, І. О., et al.
Published: (2021) -
Method of detection of http attacks on a smart home using the algebraic matching method
by: Gorbatiuk, V.O., et al.
Published: (2022) -
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015) -
Integrated security systems for protecting payment synchronization from MITM attacks
by: Shahmatov, I.O., et al.
Published: (2025)