An example of fuzzy ontology usage for risk assessment and attack impact

dc.contributor.authorKozlenko, Oleh
dc.date.accessioned2025-04-03T09:16:56Z
dc.date.available2025-04-03T09:16:56Z
dc.date.issued2024
dc.description.abstractThe article discusses the use of fuzzy ontology for assessing risks and impacts of attacks in the field of information security. Fuzzy ontology, which is a formalized way of representing knowledge, offers effective solutions for processing complex and informal processes. The article substantiates the significance of fuzzy logic in structural analysis and presents an example of how new types of attacks influence the ontology. Key findings include the identification of risks associated with attacks through the application of fuzzy sets and entropy theory. The discussion highlights how these methods can enhance threat response and risk management in information systems.
dc.format.pagerangeP. 91-98
dc.identifier.citationKozlenko, O. An example of fuzzy ontology usage for risk assessment and attack impact / Oleh Kozlenko // Theoretical and Applied Cybersecurity: scientific journal. – 2024. – Vol. 6, No. 1. – P. 91-98. – Bibliogr.: 8 ref.
dc.identifier.doihttps://doi.org/10.20535/tacs.2664-29132024.1.312677
dc.identifier.urihttps://ela.kpi.ua/handle/123456789/73230
dc.language.isoen
dc.publisherIgor Sikorsky Kyiv Polytechnic Institute
dc.publisher.placeKyiv
dc.relation.ispartofTheoretical and Applied Cybersecurity: scientific journal, Vol. 6, No. 1
dc.subjectcybersecurity
dc.subjectrisk
dc.subjectfuzzy logic
dc.subjectontology
dc.subjectthreat analysis
dc.subject.udc004
dc.titleAn example of fuzzy ontology usage for risk assessment and attack impact
dc.typeArticle

Файли

Контейнер файлів
Зараз показуємо 1 - 1 з 1
Вантажиться...
Ескіз
Назва:
312677-737005-1-10-20241216.pdf
Розмір:
1.01 MB
Формат:
Adobe Portable Document Format
Ліцензійна угода
Зараз показуємо 1 - 1 з 1
Ескіз недоступний
Назва:
license.txt
Розмір:
8.98 KB
Формат:
Item-specific license agreed upon to submission
Опис: