[1] Apenko N. et al.: Information security of the computer system and network from internal and external attacks. 17th International scientific and practical conference "System analysis and intelligent systems for management". Turkey, Ankara, 2023, 431–434.
[2] Atkin R. H.: Combinatorial Connectivies in Social Systems: An Application of Simplicial Complex Structures to the Study of Large Organisations. Birkhäuser, Basel 1977.
DOI: https://doi.org/10.1007/978-3-0348-5750-5
[3] Hindy H. et al.: A taxonomy of network threats and the effect of current datasets on intrusion detection systems. IEEE Access 8, 2020, 104650–104675 [https://doi.org/10.1109/ACCESS.2020.3000179].
DOI: https://doi.org/10.1109/ACCESS.2020.3000179
[4] Nahornyi O. V., Zhyrova T. O., Nahornyi V. V.: Problems of information security in computer systems and means and methods of their solution. II International Scientific and Practical Conference. USA, Chicago, 2023, 171–180.
[5] Roberts F. S.: Discrete Mathematical Models with Applications to Social, Biological, and Environmental Problems. Rutgers University, Prentice-Hall Inc., New Jersey 1976.
[6] Saliieva O. V., Yaremchuk Yu. Ye.: Investigation of the reliability of the impact of threats on the level of security of a computer network, determined by scenario modeling based on a cognitive approach. Visnyk of Vinnytsia Politechnical Institute 4, 2020, 98–104 [https://doi.org/10.31649/1997-9266-2020-151-4-98-104].
DOI: https://doi.org/10.31649/1997-9266-2020-151-4-98-104
[7] Saliieva O. V., Yaremchuk Yu. Ye.: Development of a cognitive model for analyzing the impact of threats on the level of security of a computer network. Data Recording, Storage & Processing 21(4), 2019, 28–39 [https://doi.org/10.35681/1560-9189.2019.21.4.199268].
DOI: https://doi.org/10.35681/1560-9189.2019.21.4.199268
[8] Wang B. et al.: A deep hierarchical network for packet-level malicious traffic detection. IEEE Access 8, 2020, 201728–201740 [https://doi.org/10.1109/ACCESS.2020.3035967].
DOI: https://doi.org/10.1109/ACCESS.2020.3035967
[9] Zang X. et al.: Attack scenario reconstruction via fusing heterogeneous threat intelligence. Computers & Security 133(20), 2023 [https://doi.org/10.1016/j.cose.2023.103420].
DOI: https://doi.org/10.1016/j.cose.2023.103420
[10] Zhong Y., Chen L.: Research on the application of improved V-detector algorithm in network intrusion detection. Applied Mathematics and Nonlinear Sciences 9(1), 2024, 1–14 [https://doi.org/10.2478/amns.2023.2.00526].
DOI: https://doi.org/10.2478/amns.2023.2.00526
[11] Zimba A. et al.: Modeling and detection of the multi-stages of Advanced Persistent Threats attacks based on semi-supervised learning and complex networks characteristics. Future Generation Computer Systems 106, 2020, 501–517 [https://doi.org/10.1016/j.future.2020.01.032].
DOI: https://doi.org/10.1016/j.future.2020.01.032