Menu
×
Main Library
9 a.m. - 6 p.m.
Phone: (843) 805-6930
West Ashley Library
9 a.m. - 4 p.m.
Phone: (843) 766-6635
Folly Beach Library
Closed for renovations
Phone: (843) 588-2001
John L. Dart Library
9 a.m. - 6 p.m.
Phone: (843) 722-7550
St. Paul's/Hollywood Library
9 a.m. - 5 p.m.
Phone: (843) 889-3300
Mt. Pleasant Library
9 a.m. – 6 p.m.
Phone: (843) 849-6161
Dorchester Road Library
9 a.m. - 6 p.m.
Phone: (843) 552-6466
Edgar Allan Poe/Sullivan's Island Library
9 a.m. - 6 p.m.
Phone: (843) 883-3914
John's Island Library
9 a.m. - 6 p.m.
Phone: (843) 559-1945
McClellanville Library
Closed for renovations
Phone: (843) 887-3699
Edisto Library
9 a.m. - 3 p.m.
Phone: (843) 869-2355
Wando Mount Pleasant Library
9 a.m. - 6 p.m.
Phone: (843) 805-6888
Otranto Road Library
9 a.m. - 6 p.m.
Phone: (843) 572-4094
Hurd/St. Andrews Library
9 a.m. - 6 p.m.
Phone: (843) 766-2546
Baxter-Patrick James Island
9 a.m. - 6 p.m.
Phone: (843) 795-6679
Bees Ferry West Ashley Library
9 a.m. - 6 p.m.
Phone: (843) 805-6892
Village Library
9 a.m. - 6 p.m.
Phone: (843) 884-9741
Keith Summey North Charleston Library
9 a.m. – 6 p.m.
Phone: (843) 744-2489
Mobile Library
9 a.m. - 5 p.m.
Phone: (843) 805-6909
Today's Hours
Main Library
9 a.m. - 6 p.m.
Phone: (843) 805-6930
West Ashley Library
9 a.m. - 4 p.m.
Phone: (843) 766-6635
Folly Beach Library
Closed for renovations
Phone: (843) 588-2001
John L. Dart Library
9 a.m. - 6 p.m.
Phone: (843) 722-7550
St. Paul's/Hollywood Library
9 a.m. - 5 p.m.
Phone: (843) 889-3300
Mt. Pleasant Library
9 a.m. – 6 p.m.
Phone: (843) 849-6161
Dorchester Road Library
9 a.m. - 6 p.m.
Phone: (843) 552-6466
Edgar Allan Poe/Sullivan's Island Library
9 a.m. - 6 p.m.
Phone: (843) 883-3914
John's Island Library
9 a.m. - 6 p.m.
Phone: (843) 559-1945
McClellanville Library
Closed for renovations
Phone: (843) 887-3699
Edisto Library
9 a.m. - 3 p.m.
Phone: (843) 869-2355
Wando Mount Pleasant Library
9 a.m. - 6 p.m.
Phone: (843) 805-6888
Otranto Road Library
9 a.m. - 6 p.m.
Phone: (843) 572-4094
Hurd/St. Andrews Library
9 a.m. - 6 p.m.
Phone: (843) 766-2546
Baxter-Patrick James Island
9 a.m. - 6 p.m.
Phone: (843) 795-6679
Bees Ferry West Ashley Library
9 a.m. - 6 p.m.
Phone: (843) 805-6892
Village Library
9 a.m. - 6 p.m.
Phone: (843) 884-9741
Keith Summey North Charleston Library
9 a.m. – 6 p.m.
Phone: (843) 744-2489
Mobile Library
9 a.m. - 5 p.m.
Phone: (843) 805-6909
Patron Login
menu
Item request has been placed!
×
Item request cannot be made.
×
Processing Request
ВИЯВЛЕННЯ КІБЕРАТАК В ІНФОРМАЦІЙНИХ МЕРЕЖАХ (Ukrainian)
Item request has been placed!
×
Item request cannot be made.
×
Processing Request
- Author(s): Опірський, І. Р.; Ткач, Ю. М.; Хорошко, В. О.
- Source:
Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì; 2020, Vol. 10 Issue 3/4, p177-189, 13p- Subject Terms:
- Source:
- Additional Information
- Alternate Title: CYBER ATTACKS DETECTION IN INFORMATION NETWORKS. (English)
- Abstract: Cyber security is becoming increasingly important in ensuring the national security of various countries. Cyber attacks and cyber influences are increasingly becoming one of the main actions to achieve the goal of control over various objects (person, organization, region, state, etc.) in the modern world. Thus, a new phenomenon in international politics has emerged in the world - the ability to achieve their own political goals, economic and spiritual subordination of the peoples of other states without the use of military force. Therefore, cyber attacks and cyber influences are developing quite actively in the world. Therefore, for the effective operation of modern information and telecommunication networks and means of their protection, as well as for the reliable detection and prediction of cyber attacks and unauthorized actions, it is necessary to develop new approaches and methods of cyber security. The purpose of the article is to detect cyber attacks in information networks. The problem of detecting a cyber-attack A (t) against the background of white Gaussian noise V (t) under the condition of continuous observation time is considered. The theoretical substantiation of the averaged forecasting object (AOP) is given. A consistent analysis of UOP in the general case revealed that it is not a sufficient statistic in the problem of sequential detection of cyber attacks. From the above it follows that one of the main issues in the synthesis of optimal sequential and inconsistent detector of cyber attacks with random moments of occurrence is to find algorithms for the formation of UOP. As a result of the conducted researches the technique of detection of NSD with the unknown moment of occurrence in discrete time of supervision is offered. [ABSTRACT FROM AUTHOR]
- Abstract: Copyright of Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì is the property of Odessa Polytechnic University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Alternate Title:
Contact CCPL
Copyright 2022 Charleston County Public Library Powered By EBSCO Stacks 3.3.0 [350.3] | Staff Login
No Comments.