Modelling of choice on the optimal method for counteract of information security threats
TA mathematical model for choice of the method of countering of information security threats is ob-tained. The general formula for calculation of the economic effect from the method of counteracting to information security threats is derived. Conditions, under which using of a given method of counte...
Saved in:
| Date: | 2014 |
|---|---|
| Main Authors: | Nikiforova, L. O., Iaremchuk, Iu. E., Shiyan, A. A. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2014
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/100287 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019)
by: Saliieva, O. V., et al.
Published: (2019)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
AI (not) against AI
by: Nesterenko, Oleksandr, et al.
Published: (2025)
by: Nesterenko, Oleksandr, et al.
Published: (2025)
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021)
by: Шиян, А. А., et al.
Published: (2021)
Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems
by: Chepkov, Ihor B., et al.
Published: (2019)
by: Chepkov, Ihor B., et al.
Published: (2019)
Investigation of the factors of informal communication inside social networks for identification of agents carrying privacy threats
by: Nikiforova, L. A., et al.
Published: (2016)
by: Nikiforova, L. A., et al.
Published: (2016)
Mathematical models and methods for solving some problems on the information security
by: Никифоров, О. В., et al.
Published: (2023)
by: Никифоров, О. В., et al.
Published: (2023)
Method of Digital Signature Producing and Verification Based on Recurrent Sequences
by: Iaremchuk, Iu. Е.
Published: (2013)
by: Iaremchuk, Iu. Е.
Published: (2013)
Estimation of the efficiency of development and introduction of standards in the energy sector
by: Sokolovska I.S.
Published: (2008)
by: Sokolovska I.S.
Published: (2008)
Optimization of cell motility evaluation in scratch assay
by: Gotsulyak, N.Ya., et al.
Published: (2014)
by: Gotsulyak, N.Ya., et al.
Published: (2014)
Optimization of in vitro model for analysis of tumor cell migration dynamics
by: Kravchenko, A.O., et al.
Published: (2018)
by: Kravchenko, A.O., et al.
Published: (2018)
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Iaremchuk, Iu. E.
Published: (2014)
by: Iaremchuk, Iu. E.
Published: (2014)
Tasks for information security risks management in making-decision process
by: Rodin, Y.S.
Published: (2018)
by: Rodin, Y.S.
Published: (2018)
An approximate method for solving assignment problem
by: Marko, M.Y., et al.
Published: (2017)
by: Marko, M.Y., et al.
Published: (2017)
Modeling of financial flow regulators in systemic macroeconomic environment
by: Makarenko, I.P.
Published: (2017)
by: Makarenko, I.P.
Published: (2017)
SIMULATION OF RENEWABLE ENERGY SYSTEMS WITH SEASONAL HEAT ACCUMULATORS
by: Popovych, О.
Published: (2023)
by: Popovych, О.
Published: (2023)
AN OPTIMIZATION APPROACH TO THE CHOICE OF PARAMETERS OF LINEAR PULSE INDUCTION ELECTROMECHANICAL CONVERTER
by: Bolyukh, V. F., et al.
Published: (2018)
by: Bolyukh, V. F., et al.
Published: (2018)
Increasing the resilience of the method of protection to ensure the authenticity of raster images of the evidence base from unauthorized access.
by: Pavlenko, B. V., et al.
Published: (2019)
by: Pavlenko, B. V., et al.
Published: (2019)
Method of information and analytical support for information security risk management of information systems
by: Rodin, Y.S.
Published: (2019)
by: Rodin, Y.S.
Published: (2019)
Features for providing of cyber security
by: Prysiazhniuk, M. M., et al.
Published: (2017)
by: Prysiazhniuk, M. M., et al.
Published: (2017)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Development of decision support system using OLAP-technologies for information security monitoring systems
by: Dashdamirova, K.Q.
Published: (2023)
by: Dashdamirova, K.Q.
Published: (2023)
Electric Power Load Graphs Simulation under Incomplete Initial Information Conditions
by: Ozeryanskiy A.A., et al.
Published: (2000)
by: Ozeryanskiy A.A., et al.
Published: (2000)
Method of calculation of unsteady formation of the liquid phase in rapidly expanding flows of supercooled steam in the stages of wet steam turbines
by: Шубенко, Александр Леонидович, et al.
Published: (2015)
by: Шубенко, Александр Леонидович, et al.
Published: (2015)
ESTIMATION OF RANDOM PROPERTIES OF ELECTRICITY CONSUMPTIONLEVELS
by: Lysenko, O. V.
Published: (2018)
by: Lysenko, O. V.
Published: (2018)
Method of calculation of unsteady formation of the liquid phase in rapidly expanding flows of supercooled steam in the stages of wet steam turbines
by: Шубенко, Александр Леонидович, et al.
Published: (2015)
by: Шубенко, Александр Леонидович, et al.
Published: (2015)
Mathematical model of the coal products optimal structure for TPPs of Ukraine
by: Stohniy O.V., et al.
Published: (2013)
by: Stohniy O.V., et al.
Published: (2013)
The System of Counteracting External Threats to the Economic Security of the Enterprise
by: N. M. Mykhaylychenko, et al.
Published: (2024)
by: N. M. Mykhaylychenko, et al.
Published: (2024)
Counteraction to destructive influence during archival storage of information objects on optical media
by: Berezin, B. A., et al.
Published: (2015)
by: Berezin, B. A., et al.
Published: (2015)
Specialized Processors for Realization of Authentication of Subjects (objects) of Interaction Based on Recurrent Sequences
by: Iaremchuk, I. E.
Published: (2014)
by: Iaremchuk, I. E.
Published: (2014)
Optimization of the bremsstrahlung converter
by: Rudychev, V.G., et al.
Published: (2022)
by: Rudychev, V.G., et al.
Published: (2022)
Problems of active protection of information from leakage through vibroacoustic channels
by: Kataiev, V. С., et al.
Published: (2016)
by: Kataiev, V. С., et al.
Published: (2016)
Resilience and stability in security
by: Мохор, В. В., et al.
Published: (2024)
by: Мохор, В. В., et al.
Published: (2024)
MATHEMATICAL MODEL OF HYDROGEN STORAGE IN AQUIFER
by: Morozov, Yu., et al.
Published: (2023)
by: Morozov, Yu., et al.
Published: (2023)
Five-mode quasilinear model of nonlinear dynamics of extended system
by: Lebid, Oleksii G.
Published: (2021)
by: Lebid, Oleksii G.
Published: (2021)
Strategic Risk Management of Digital Transformation in the Economic Security of Industrial Enterprises
by: Ivanov, Mihail, et al.
Published: (2025)
by: Ivanov, Mihail, et al.
Published: (2025)
Optimization of bremsstrahlung characteristics for irradiating thick objects
by: Rudychev, V.G., et al.
Published: (2022)
by: Rudychev, V.G., et al.
Published: (2022)
Similar Items
-
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015) -
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019) -
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020) -
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013) -
AI (not) against AI
by: Nesterenko, Oleksandr, et al.
Published: (2025)