Using of Fuzzy Cognitive Modeling in Information Security Systems Constructing

被引:0
|
作者
Kulyk, Mykola [1 ]
Khoma, Volodymyr [2 ]
Kozlovskyi, Valerii [1 ]
Mischenko, Andrii [1 ]
Khlaponin, Yurii [1 ]
Janisz, Karina [3 ]
Falat, Pawel [4 ]
机构
[1] Natl Aviat Univ, 1 Kosmonavta Komarova Ave, UA-03680 Kiev, Ukraine
[2] Opole Univ Technol, PL-45758 Opole, Poland
[3] State Higher Vocat Sch Nowy Sacz, PL-33300 Nowy Sacz, Poland
[4] Univ Bielsko Biala, PL-43309 Bielsko Biala, Poland
关键词
information security; integrated security; cognitive modeling; information system; information security system;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The paper presents an algorithm of analysis and management of integrated security, which was developed using fuzzy cognitive modeling. This algorithm allows to unify the approaches of integrated security management and to begin to develop appropriate computational procedures and modules that can be further used for constructing of information security systems.
引用
收藏
页码:408 / 411
页数:4
相关论文
共 50 条
  • [1] Modeling complex systems using fuzzy cognitive maps
    Stylios, CD
    Groumpos, PP
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2004, 34 (01): : 155 - 162
  • [2] Data Security in Cognitive Information Systems
    Kubarek, Anna
    Ogiela, Lidia
    [J]. PROCEEDINGS 2018 IEEE 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2018, : 631 - 635
  • [3] RECURRENT METHOD FOR CONSTRUCTING FUZZY COGNITIVE MAPS FOR FOOD SECURITY ASSESSMENT
    Rogachev, Aleksey
    Melikhova, Elena
    Pleschenko, Tatiana
    [J]. INTERNATIONAL JOURNAL FOR QUALITY RESEARCH, 2022, 16 (01) : 111 - 118
  • [4] Efficient fuzzy cognitive Modeling for unstructured information
    Wong, Kok Wai
    Gedeon, Tamas D.
    Koczy, Laszlo T.
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, VOLS 1-5, 2006, : 358 - +
  • [5] Modeling of information systems to their security evaluation
    Zegzhda, D.
    Zegzhda, P.
    Pechenkin, A.
    Poltavtseva, M.
    [J]. SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, : 295 - 298
  • [6] The geometry of fuzzy sets in the systems of information security
    Lukina, O.
    Majewski, D.
    Kulagina, E.
    [J]. 2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT), 2014, : 23 - 26
  • [7] USING COGNITIVE PRINCIPLES To GUIDE CLASSIFICATION IN INFORMATION SYSTEMS MODELING
    Parsons, Jeffrey
    Wand, Yair
    [J]. MIS QUARTERLY, 2008, 32 (04) : 839 - 868
  • [8] Constructing Conceptual Model for Security Culture in Health Information Systems Security Effectiveness
    Shahri, Ahmad Bakhtiyari
    Ismail, Zuraini
    Ab Rahim, Nor Zairah
    [J]. ADVANCES IN INFORMATION SYSTEMS AND TECHNOLOGIES, 2013, 206 : 213 - 220
  • [9] Fuzzy Cognitive Maps for Modeling Complex Systems
    Leon, Maikel
    Rodriguez, Ciro
    Garcia, Maria M.
    Bello, Rafael
    Vanhoof, Koen
    [J]. ADVANCES IN ARTIFICIAL INTELLIGENCE, MICAI 2010, PT I, 2010, 6437 : 166 - 174
  • [10] Adding Contextual Information to Intrusion Detection Systems Using Fuzzy Cognitive Maps
    Aparicio-Navarro, Francisco J.
    Kyriakopoulos, Konstantinos G.
    Parish, David J.
    Chambers, Jonathon A.
    [J]. 2016 IEEE INTERNATIONAL MULTI-DISCIPLINARY CONFERENCE ON COGNITIVE METHODS IN SITUATION AWARENESS AND DECISION SUPPORT (COGSIMA), 2016, : 180 - 186