Features for providing of cyber security
Modern onrush of information technologies, informatisation, computerisation and creation of global information space formed fundamentally new substances — information society, information- and cyberspace, which have inexhaustible potential and become instrumental in economic and social development o...
Saved in:
| Date: | 2017 |
|---|---|
| Main Authors: | Prysiazhniuk, M. M., Cyfra, E. I. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2017
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/126532 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Automation of standardized cyber insurance processes
by: Khudyntsev, Mykola, et al.
Published: (2025)
by: Khudyntsev, Mykola, et al.
Published: (2025)
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems
by: Давидюк, А. В., et al.
Published: (2021)
by: Давидюк, А. В., et al.
Published: (2021)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Zubok, V. Yu.
Published: (2020)
by: Zubok, V. Yu.
Published: (2020)
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: Дьогтєва, І. О., et al.
Published: (2021)
by: Дьогтєва, І. О., et al.
Published: (2021)
Cyber Resilience Key Metrics in Small and Medium-Sized Enterprises
by: Deruma, Sintija
Published: (2025)
by: Deruma, Sintija
Published: (2025)
A combination of traditional methods and a metric approach to assessing the risks from cyber attacks to global routing.
by: Zubok, V. Yu.
Published: (2019)
by: Zubok, V. Yu.
Published: (2019)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021)
by: Шиян, А. А., et al.
Published: (2021)
Modelling of choice on the optimal method for counteract of information security threats
by: Nikiforova, L. O., et al.
Published: (2014)
by: Nikiforova, L. O., et al.
Published: (2014)
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019)
by: Saliieva, O. V., et al.
Published: (2019)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Using Bayesian network models for early assessment of cyberattack threats to electricity generation facility
by: Гальчинський, Л. Ю., et al.
Published: (2025)
by: Гальчинський, Л. Ю., et al.
Published: (2025)
AI (not) against AI
by: Nesterenko, Oleksandr, et al.
Published: (2025)
by: Nesterenko, Oleksandr, et al.
Published: (2025)
Network and economic component of financial cybersecurity indices
by: Turchynov, Oleksandr, et al.
Published: (2025)
by: Turchynov, Oleksandr, et al.
Published: (2025)
Methods on determination of the output data for assessing residual risks with ensuring the confidentiality of information objects
by: Vasilenko, V. S., et al.
Published: (2017)
by: Vasilenko, V. S., et al.
Published: (2017)
Investigation of the factors of informal communication inside social networks for identification of agents carrying privacy threats
by: Nikiforova, L. A., et al.
Published: (2016)
by: Nikiforova, L. A., et al.
Published: (2016)
Risk factor analysis of an example of an incident with global routing registry software
by: Zubok, V. Yu.
Published: (2020)
by: Zubok, V. Yu.
Published: (2020)
А formal description of the internet global routing objects and processes for global routing cyberattacs impact assessment
by: Zubok, V. Yu.
Published: (2019)
by: Zubok, V. Yu.
Published: (2019)
Semantic Indexing and Cluster Analysis of Cybersecurity Documents
by: Ланде, Д. В., et al.
Published: (2024)
by: Ланде, Д. В., et al.
Published: (2024)
PROBLEMS IN TESTING DIGITAL PROTECTIVE RELAY FOR IMMUNITY TO INTENTIONAL DESTRUCTIVE ELECTROMAGNETIC IMPACTS. CONTINUATION OF THE THEME
by: Gurevich, Vladimir I.
Published: (2015)
by: Gurevich, Vladimir I.
Published: (2015)
Technology for ensuring the survivability of territorially distributed information computer systems in a unified information space
by: Додонов, О. Г., et al.
Published: (2024)
by: Додонов, О. Г., et al.
Published: (2024)
On the need to use modern capabilities in situational management to protect the state's critical infrastructure
by: Гречанінов , В.Ф.
Published: (2025)
by: Гречанінов , В.Ф.
Published: (2025)
Cloud service provider selection using reinforcement learning approach and providers’ reputation
by: Myroshnikova, I. Yu., et al.
Published: (2014)
by: Myroshnikova, I. Yu., et al.
Published: (2014)
THE USE OF WIND AND SOLAR ENERGY RESOURCES TO PROVIDE ELECTRICITY NEEDS PROVIDE AT THE AKADEMIK VERNADSKY STATION (ANTARCTICA)
by: Karmazin, О., et al.
Published: (2022)
by: Karmazin, О., et al.
Published: (2022)
Digitalization of Economic Security Management in Investment Security of Ukraine
by: Kalinin, Oleksandr, et al.
Published: (2023)
by: Kalinin, Oleksandr, et al.
Published: (2023)
PROVIDING COMPETITIVE ADVANTAGES AND BUSINESS BENEFITS
by: Pavlovska, Liudmyla
Published: (2020)
by: Pavlovska, Liudmyla
Published: (2020)
Specialized care provided to patients with rectal cancer in Kyiv city
by: Kliusov, O.M.
Published: (2023)
by: Kliusov, O.M.
Published: (2023)
Resilience and stability in security
by: Мохор, В. В., et al.
Published: (2024)
by: Мохор, В. В., et al.
Published: (2024)
Analytical models of multi-priority cloud data-centers with a mixed discipline of providing services taking into account the features of functioning and possible failures.
by: Matov, A. Ya.
Published: (2019)
by: Matov, A. Ya.
Published: (2019)
Territorially distributed information computer systems in a unified information space: basic concepts and definitions
by: Додонов, О. Г., et al.
Published: (2024)
by: Додонов, О. Г., et al.
Published: (2024)
Geoecological and economic consequences of creation, drainage and possible variants of restoration the Kakhovsky reservoir
by: Yakovlev, Yevhen O., et al.
Published: (2023)
by: Yakovlev, Yevhen O., et al.
Published: (2023)
Construction of seismic portraits of important events provided that their observation is not available
by: Бріцький , О. І.
Published: (2021)
by: Бріцький , О. І.
Published: (2021)
REQUIREMENTS FOR PROVIDING ENVIRONMENTAL FACTORS IN IMPLEMENTATION OF PHOTO ENERGY TECHNOLOGIES IN UKRAINE
by: Rieztsov, V., et al.
Published: (2019)
by: Rieztsov, V., et al.
Published: (2019)
Investment Security in the Development of the Digital Economy
by: Kalinin, Oleksandr
Published: (2024)
by: Kalinin, Oleksandr
Published: (2024)
PROVIDING TECHNICAL PARAMETERS OF RESISTIVE CABLES OF THE HEATING FLOOR SYSTEM WITH PRESERVATION OF THERMAL RESISTANCE OF INSULATION
by: Bezprozvannych, G. V., et al.
Published: (2020)
by: Bezprozvannych, G. V., et al.
Published: (2020)
Unsaturated Regime as Alternative Method to Provide Stability of Low-Noise Amplifier on High-Electron-Mobility Transistors
by: Korolev, O. M., et al.
Published: (2012)
by: Korolev, O. M., et al.
Published: (2012)
Parametric tolerance synthesis as multiple inverse problem of providing complex engineering system operability
by: Горошко, А. В., et al.
Published: (2014)
by: Горошко, А. В., et al.
Published: (2014)
Parametric tolerance synthesis as multiple inverse problem of providing complex engineering system operability
by: Горошко, А. В., et al.
Published: (2014)
by: Горошко, А. В., et al.
Published: (2014)
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Iaremchuk, Iu. E.
Published: (2014)
by: Iaremchuk, Iu. E.
Published: (2014)
Similar Items
-
Automation of standardized cyber insurance processes
by: Khudyntsev, Mykola, et al.
Published: (2025) -
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems
by: Давидюк, А. В., et al.
Published: (2021) -
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024) -
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Zubok, V. Yu.
Published: (2020) -
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: Дьогтєва, І. О., et al.
Published: (2021)