Published April 28, 2026
| Version v1
Journal article
Open
Korporativ tarmoq himoyalanganligini tahlillashning intellektual tizimi
Authors/Creators
- 1. Muhammad al-Xorazmiy nomidagi Toshkent axborot texnologiyalari universiteti, Axborot xavfsizligi kafedrasi katta o'qituvchisi, Toshkent, O'zbekiston
Description
Maqolada hozirgi zamon kompyuter tarmoqlarining murakkablashishi natijasida yuzaga kelayotgan xavfsizlik muammolari va ularni hal qilish uchun avtomatlashtirilgan intellektual tizim ishlab chiqish masalalari yoritilgan. Tadqiqot doirasida hujumlarning umumiy grafigini shakllantirish va xavfsizlik ko'rsatkichlarini baholash modellariga asoslangan yondashuv taklif etilgan.
Files
5_1117-26-32-Sayfullaev.pdf
Files
(515.4 kB)
| Name | Size | Download all |
|---|---|---|
|
md5:e4670bc006d18e37a431606dea9a2958
|
515.4 kB | Preview Download |
Additional details
References
- Stallings, William & Brown, Lawrie. (2018). Computer security: principles and practice / William Stallings, Lawrie Brown, UNSW Canberra at the Australian Defence Force Academy. Hoboken, New Jersey: Pearson Education, Inc. https://nla.gov.au/nla.cat-vn7464940
- Kott, A., Wang, C., & Erbacher, R. F. (2015). Cyber defense and situational awareness (Vol. 62). Springer. https://doi.org/10.1007/978-3-319-11391-3 .
- Bal, J. (2020). A review of attack graph and attack tree visual syntax in cyber security. Computer Science Review. https://www.academia.edu/105575918/A_review_of_attack_graph_and_attack_tree_visual_syntax_in_cyber_security
- Sarker, I.H., Furhad, M.H. & Nowrozy, R. AI-Driven Cybersecurity: An Overview, Security Intelligence Modeling and Research Directions. SN COMPUT. SCI. 2, 173 (2021). https://doi.org/10.1007/s42979-021-00557-0 .
- FIRST. (2025). "Common Vulnerability Scoring System (CVSS) v4.0: User Guide." https://web.archive.org/web/20250125085936/https://www.first.org/cvss/v4-0/ .
- SANS Institute. (2024). "Network Attack Severity Assessment and Risk Analysis Framework." SANS Reading Room. https://www.prweb.com/releases/sans-institute-unveils-highly-anticipated-annual-security-awareness-report-for-2024-302209886.html
- Fu, C., Zhang, H. & Zhou, Y. An approach to generating attack graphs and analyzing threats based on CAPEC and ATT&CK matrix. Softw Syst Model (2025). https://doi.org/10.1007/s10270-025-01328-8
- Chauhan, Jaskirat. (2025). Automated Security Configuration Management for Enterprise Networking Products. International Journal of Scientific Research in Computer Science, Engineering and Information Technology. 11. 2881-2888. DOI: 10.32628/CSEIT251112296.