ALGORITHM OF INFORMATION SECURITY RISK ASSESSMENT BASED ON FUZZY-MULTIPLE APPROACH
Main Article Content
Abstract
Article Details
References
Judin, O.K. (2011), “Regulatory support”, Information security, NAU, Kyiv, pp. 15-22.
Lenkov, S.V., Peregudov, D.A. & Horoshko, V.A. (2008), Methods and means of information protection, Arij, Kyiv, pp. 7-13.
Amin Salih, M., Yuvaraj, D., Sivaram, M. and Porkodi, V. (2018), “Detection And Removal Of Black Hole Attack In Mobile Ad Hoc Networks Using Grp Protocol”, International Journal of Advanced Research in Computer Science, Vol. 9, No 6, pp. 1–6, DOI: http://dx.doi.org/10.26483/ijarcs.v9i6.6335
Baranova, E.K. (2015), “Information security risk analysis and assessment techniques”, Educational resources and technologies, 1(9), pp. 73–79.
Anikina, I.V., Emaletdinova, L.Ju. & Kirpichnikova, A.P. (2015), “Methods for assessing and managing information security risks in corporate information networks”, Bulletin of the University of Technology, No. 18(6), pp. 195–197.
Puzyrenko, O.G., Ivko, S.O. & Lavrut, O.O., (2014). “Analysis of the process of information security risk management in providing information and telecommunication systems”, Information Processing Systems, No. 8(124), pp. 128-134.
Ghazouani, M., Faris, S., Medromi, H. & Sayouti, A., (2014), “Information security risk assessment – a practical approach with a mathematical formulation of risk”, International Journal of Computer Application, No. 103(8), pp. 36-42.
Khambhammettu, H., Logrippo, L., Boulares, S & Adi, K., (2013), “A Framework for Risk Assessment in Access Control Systems”, Computers & Security, No. 38, pp. 48-54.
Chunarova, A.V., Parhomenko, I.I. & Sachuk, I.I. (2014), “Analysis of approaches and software solutions for the assessment and control of information risks in the computerized”, Bulletin of the Engineering Academy of Ukraine, No. 2, pp. 138–142.
Buchyk, S.S. (2017), Methodology for assessing information risks in an automated system. Knowledge-based technologies,, 224 p.
Buchyk, S.S. & Shalaev, V.A. (2017), “Analysis of instrumental methods for determining information security risk information and telecommunication systems”, Knowledge-based technologies, No. 3(35), pp. 215–225.
Puzyrenko, O.G., Ivko, S.O., Lavrut, O.O. & Klymovych, O.K. (2015), “Application of information security risk assessment models in information and telecommunication systems”, Information Processing Systems, No. 3(128), pp. 75–79.
Gonchar, S. (2014), “Analysis of probability of realization of threats of information protection in automated control systems of technological process”, Information protection, No. 16(1), pp. 40–46.
Saravanan, S., Hailu, M., Gouse, G.M., Lavanya, M. and Vijaysai, R. (2019), “Optimized Secure Scan Flip Flop to Thwart Side Channel Attack in Crypto-Chip”, International Conference on Advances of Science and Technology, ICAST 2018. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol. 274, Springer, Cham. DOI: https://doi.org/10.1007/978-3-030-15357-1_34
Manikandan, V, Porkodi, V, Mohammed, A.S. and Sivaram M. (2018), “Privacy Preserving Data Mining Using Threshold Based Fuzzy cmeans Clustering”, ICTACT Journal on Soft Computing, Vol. 9, Issue 1,
pp.1813-1816. DOI: 10.21917/ijsc.2018.0252
Porkodi, V., Sivaram, M., Mohammed, A.S. and Manikandan, V. (2018), “Survey on White-Box Attacks and Solutions”, Asian Journal of Computer Science and Technology, Vol. 7, Issue 3, pp. 28–32.
Korol, O.G., (2017), “Estimation of the quality of global network services based on Ethernet technologies using a complex indicator”, Information Processing Systems, 2(148), pp. 100–110.
Kuznecov, O.O., Evseev, S.P. & Kavun S.V. (2008), Information protection and economic security of the enterprise, HNEU, Kharkiv, 360 p.
Smirnov, O.A., Evseev, S.P., Zhukarev, V.Ju., Korol, O.G., Sorokin, V.Je. & Meleshko, Je.V. (2012), Technologies and standards of computer networks,: DonIZT, Donetsk, 453 p.
Cirlov, V. L. (2008), Basics of Information Security. Feniks, Rostov n/D, 224 p.