Model for Identifying Cyber Threats to Internet Information Resources


如何引用文章

全文:

开放存取 开放存取
受限制的访问 ##reader.subscriptionAccessGranted##
受限制的访问 订阅存取

详细

In this paper, we discuss the construction of a model for protecting information resources based on new approaches to active search, unified investigation, and response to cyber threats. The process of identifying cyber threats is based on search prediction methods interconnected with the cyclic nature of the behavioral activity of users of network resources.

作者简介

I. Luskatov

Mozhaisky Military Space Academy

编辑信件的主要联系方式.
Email: mrfa@rambler.ru
俄罗斯联邦, St. Petersburg, 197198

S. Pilkevich

Mozhaisky Military Space Academy

编辑信件的主要联系方式.
Email: ambers@list.ru
俄罗斯联邦, St. Petersburg, 197198

补充文件

附件文件
动作
1. JATS XML

版权所有 © Allerton Press, Inc., 2019