Biologically inspired risk assessment in cyber security using neural networks

Author(s):  
Mihai-Gabriel Ionita ◽  
Victor-Valeriu Patriciu
Author(s):  
Daniel Auge ◽  
Julian Hille ◽  
Etienne Mueller ◽  
Alois Knoll

AbstractBiologically inspired spiking neural networks are increasingly popular in the field of artificial intelligence due to their ability to solve complex problems while being power efficient. They do so by leveraging the timing of discrete spikes as main information carrier. Though, industrial applications are still lacking, partially because the question of how to encode incoming data into discrete spike events cannot be uniformly answered. In this paper, we summarise the signal encoding schemes presented in the literature and propose a uniform nomenclature to prevent the vague usage of ambiguous definitions. Therefore we survey both, the theoretical foundations as well as applications of the encoding schemes. This work provides a foundation in spiking signal encoding and gives an overview over different application-oriented implementations which utilise the schemes.


2020 ◽  
Vol 2 (10) ◽  
pp. 158-168
Author(s):  
Svitlana Shevchenko ◽  
Yuliia Zhdanovа ◽  
Svitlana Spasiteleva ◽  
Pavlo Skladannyi

This article examines the problem of implementing active teaching methods for students majoring in 125 Cybersecurity. The study of qualitative analysis of information security risks (IS) is presented on the example of studying the discipline "Risk Theory", namely the use of SWOT-analysis tools for risk assessment in the field of IS of small and medium business. General relevance and possibilities of using SWOT-analysis in the field of IS risk to study the internal environment of the organization, its strengths and weaknesses with the definition of enterprise strategies in the external environment: confronting threats to secure information (confidentiality, availability and integrity), and other its development. Based on scientific sources, the main research of the definition is analyzed: IS risks, risk analysis and their quality assessment. The content and procedure of SWOT-analysis are described. Using forms of group work and active methods (trainings) in the educational process, the basic factors for SWOT-analysis of the virtual organization "Internet Provider" were created, methodical expert assessments were conducted to identify the primary features of these factors, the analysis of the results was obtained.It is proved that the introduction of this technology in the educational process promotes the development of theoretical knowledge and the formation and development of practical skills of future specialists in information and cyber security


Sign in / Sign up

Export Citation Format

Share Document