Browsing Moksliniai ir apžvalginiai straipsniai / Research and Review Articles by VGTU prioritized fields "IK0101 - Informacijos ir informacinių technologijų sauga / Information and Information Technologies Security"
Now showing items 1-20 of 44
-
A deep-learning-based approach to keystroke-injection payload generation
(Electronics: Special issue: Data driven security, 2023)Investigation and detection of cybercrimes has been in the spotlight of cybersecurity research for as long as the topic has existed. Modern methods are required to keep up with the pace of the technology and toolset used ... -
A Fuzzy WASPAS-based approach to determine critical information infrastructures of EU sustainable development
(Sustainability, 2019)Critical information infrastructure exists in di_erent sectors of each country. Its loss or sustainability violation will lead to a negative impact on the supply of essential services, as well as on the social or economic ... -
A review of modern CMOS transimpedance amplifiers for OTDR applications
(Electronics, 2019)The work presents a review of modern CMOS transimpedance amplifiers (TIAs) in the context of their application for low-cost optical time-domain reflectometry (OTDR). After introducing the basic principles behind the OTDR, ... -
Adaptation of parallel SaaS to heterogeneous co-located cloud resources
(Applied sciences, 2023)Cloud computing has received increasing attention due to its promise of delivering on-demand, scalable, and virtually unlimited resources. However, heterogeneity or co-location of virtual cloud resources can cause severe ... -
Analysis of mobile services in the financial sector
(Mokslas – Lietuvos ateitis. Informacinės technologijos ir multimedija = Science – Future of Lithuania. Information technologies and multimedia, 2019)Extensive research of mobile financial services has been conducted in digital finance, FinTech, blockchain and cryptocurrencies. These new technologies and products are changing the financial services industry. It is ... -
Analysis of TCP flood attack using NetFlow
(Mokslas – Lietuvos ateitis. Elektronika ir elektros inžinerija = Science – Future of Lithuania. Electronics and electrical engineering, 2023)Traffic analysis is a common question for most of the production systems in various segments of computer networks. Attacks, configuration mistakes, and other factors can cause network increased accessibility and as a result ... -
Application of histogram-based outlier scores to detect computer network anomalies
(Electronics, 2019)Misuse activity in computer networks constantly creates new challenges and difficulties to ensure data confidentiality, integrity, and availability. The capability to identify and quickly stop the attacks is essential, as ... -
Application of multicriteria methods for improvement of information security metrics
(Sustainability: Special issue: Application of cyber security in sustainable system, 2023)Metrics are a set of numbers that are used to obtain information about the operation of a process or system. In our case, metrics are used to assess the level of information security of information and communication ... -
Automated expert system knowledge base development method for information security risk analysis
(International journal of computers, communications and control, 2019)Information security risk analysis is a compulsory requirement both from the side of regulating documents and information security management decision making process. Some researchers propose using expert systems (ES) for ... -
Automated system-level malware detection using machine learning: A comprehensive review /
(Applied sciences: Special issue: Security challenges for the internet of things and mobile networks., 2023.)Malware poses a significant threat to computer systems and networks. This necessitates the development of effective detection mechanisms. Detection mechanisms dependent on signatures for attack detection perform poorly due ... -
Cost- and performance-aware resource selection for parallel software on heterogeneous cloud
(Concurrency and computation-practice & experience, 2023)Cloud providers offer flexible infrastructures and on‐demand services, including the capability to deploy low cost virtual resources of many different types. However, the diversity of cloud resources followed by the important ... -
Defining the minimum security baseline in a multiple security standards environment by graph theory techniques
(Applied sciences, 2019)One of the best ways to protect an organization’s assets is to implement security requirements defined by different standards or best practices. However, such an approach is complicated and requires specific skills and ... -
Dynamic expert system-based geographically adapted malware risk evaluation method
(International journal of computers communications & control, 2020)Fast development of information systems and technologies while providing new opportunities for people and organizations also make them more vulnerable at the same time. Information security risk assessment helps to identify ... -
E-mail-based phishing attack taxonomy
(Applied sciences, 2020)The amount of fraud on the Internet is increasing along with the availability and the popularity of the Internet around the world. One of the most common forms of Internet fraud is phishing. Phishing attacks seek to obtain ... -
Educational organization’s security level estimation model
(Applied sciences, 2021)During the pandemic, distance learning gained its necessity. Most schools and universities were forced to use e-learning tools. The fast transition to distance learning increased the digitalization of the educational system ... -
Energy saving techniques in next generation of mobile communication networks
(Engineering proceedings: The 2nd International Electronic Conference on Processes session Environmental and Green Processes, 2023)Generalized integration of new communication technologies expected to improve human`s life and bring the Sustainable Development Goals achievement closer in the next ten years. People will benefit from rapid exchange of ... -
Evaluation of deep learning methods efficiency for malicious and benign system calls classification on the AWSCTD
(Security and communication networks, 2019)The increasing amount of malware and cyberattacks on a host level increases the need for a reliable anomaly-based host IDS (HIDS) that would be able to deal with zero-day attacks and would ensure low false alarm rate (FAR), ... -
Evaluation of microservice communication while decomposing monoliths
(Computing and informatics, 2023)One of the biggest challenges while migrating from a monolith architecture to a microservice architecture is to define a proper communication technology. In monolith applications, communication between components is performed ... -
Hash functions and GPU algorithm of infinite grid method for contact search
(Information technology and control, 2022)The paper presents the memory-saving GPU algorithm of the infinite grid method with various hash functionsfor contact search in discrete element computations. The implemented hash table of fixed size has the addedbenefit ... -
High order numerical schemes for solving fractional powers of elliptic operators
(Journal of computational and applied mathematics, 2020)In many recent applications when new materials and technologies are developed it is important to describe and simulate new nonlinear and nonlocal diffusion transport processes. A general class of such models deals with ...