Repository logo
  • English
  • Latviešu
  • Log In
    or
    New user? Click here to register.Have you forgotten your password?
Repository logo
  • Communities & Collections
  • Research Outputs
  • Projects
  • People
  • English
  • Latviešu
  • Log In
    or
    New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Faculty of Engineering
  3. Scientific publications
  4. Scientific papers (IF)
  5. Security Protocols Analysis in Relation to Information Structures Protection
 
  • Details
Options

Security Protocols Analysis in Relation to Information Structures Protection

Journal
2019 60th International Scientific Conference on Information Technology and Management Science of Riga Technical University (ITMS)
Date Issued
2019
Author(s)
Grabusts, Pēteris 
Rezekne Academy of Technologies 
DOI
10.1109/itms47855.2019.8940767
Abstract
The concept of information warfare encompasses the use of information and communication technologies to gain an advantage over a potential opponent. The information warfare is the manipulation with the information that trusts the goal, so that the goal should make decisions about its interests in the interests of opponents. Information structures are treated as systems that process different types of information, provide storage and access to users. Such structures may enclose neural networks, self-learning systems etc. They need to be ready to learn, respond to threats and ensure their safety, which is topical in today's information warfare. The paper will examine theoretical aspects of ensuring the security of information structures from the system theory point of view. The description of information structures, analysis of their security protocols will be given. The knowledge base of the information structure can be a neural network, the training of which is secured from external interference. The research presents a description of a potential counteraction against the threats of information warfare against information systems (AI based on artificial neural networks). The CORAS methodology for risk analysis in case of threats to information structures was discussed.
Subjects
  • artificial intelligen...

  • AI Box

  • neural networks

  • CORAS

  • information structure...

  • information warfare

  • risk analysis

Scopus© citations
0
Acquisition Date
Jan 12, 2024
View Details
google-scholar
Views
Downloads
User Guide
  • Documentation

© Rezekne Academy of Technologies

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science

  • Cookie settings
  • Privacy policy
  • End User Agreement
  • Send Feedback