Логотип репозиторію
  • English
  • Українська
  • Увійти
    Новий користувач? Зареєструйтесь. Забули пароль?
Логотип репозиторію
  • Фонди та зібрання
  • Пошук за критеріями
  • English
  • Українська
  • Увійти
    Новий користувач? Зареєструйтесь. Забули пароль?
  1. Головна
  2. Переглянути за автором

Перегляд за Автор "Shybaiev, Hennadii"

Зараз показуємо 1 - 1 з 1
Результатів на сторінці
Налаштування сортування
  • Вантажиться...
    Ескіз
    ДокументВідкритий доступ
    Detecting the operation of keyloggers using the dendritic cell algorithm with multiple resolutions
    (Igor Sikorsky Kyiv Polytechnic Institute, 2025) Shybaiev, Hennadii; Galchynskyi, Leonid
    Throughout time, criminologists (or their colleagues in history) have tried to develop the most reliable methods of protecting information. Currently, the most common method of information processing is the computer, so today's information protection specialists face the task of protecting data in computers, in which the most common method of information input is data input from the keyboard by the user. Keystroke logging, also known as keylogging, consists in intercepting keystroke codes from the user. This data may contain passwords, personal correspondence, or other confidential information. Therefore, it is very important to pay attention to this method of user interaction with your "machine", because it is through this method that an attacker can steal information directly from the keyboard. Unlike traditional malware such as worms or viruses, some types of keyloggers cannot be detected by modern antivirus protection methods. The paper presents the results of a study of the application of the dendritic cell algorithm with multiple resolutions for the task of determining the presence of a keylogger in the system. Based on the simulation, a new effective model for determining the presence of a keylogger is proposed

DSpace software copyright © 2002-2026 LYRASIS

  • Налаштування куків
  • Зворотній зв'язок