Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
It is impossible to imagine modern life without the use of computer networks, which offer many opportunities for their users. However, computer networks and their resources are constantly at risk of being infected by malware or from various types of network attacks. Therefore, for the proper functio...
Saved in:
| Date: | 2019 |
|---|---|
| Main Authors: | Saliieva, O. V., Yaremchuk, Yu. E. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2019
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/199268 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
Method of corn yield prediction per grain applying Fuzzy Cognitive Maps
by: Popov, Mykhailo, et al.
Published: (2024)
by: Popov, Mykhailo, et al.
Published: (2024)
Modelling of choice on the optimal method for counteract of information security threats
by: Nikiforova, L. O., et al.
Published: (2014)
by: Nikiforova, L. O., et al.
Published: (2014)
Construction of an оntology-based model for scenario analysis
by: Boychenko, A. V.
Published: (2016)
by: Boychenko, A. V.
Published: (2016)
AI (not) against AI
by: Nesterenko, Oleksandr, et al.
Published: (2025)
by: Nesterenko, Oleksandr, et al.
Published: (2025)
Securing virtual machines with AMD Zen CPU architecture and instruction set
by: Sokolovskyi, V. S., et al.
Published: (2018)
by: Sokolovskyi, V. S., et al.
Published: (2018)
Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems
by: Chepkov, Ihor B., et al.
Published: (2019)
by: Chepkov, Ihor B., et al.
Published: (2019)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
Resilience and stability in security
by: Мохор, В. В., et al.
Published: (2024)
by: Мохор, В. В., et al.
Published: (2024)
Neural network based method of a user identification by keyboard handwriting
by: Danyliuk, I. I., et al.
Published: (2018)
by: Danyliuk, I. I., et al.
Published: (2018)
Investigation of the factors of informal communication inside social networks for identification of agents carrying privacy threats
by: Nikiforova, L. A., et al.
Published: (2016)
by: Nikiforova, L. A., et al.
Published: (2016)
Technology for ensuring the survivability of territorially distributed information computer systems in a unified information space
by: Додонов, О. Г., et al.
Published: (2024)
by: Додонов, О. Г., et al.
Published: (2024)
Mathematical models and methods for solving some problems on the information security
by: Никифоров, О. В., et al.
Published: (2023)
by: Никифоров, О. В., et al.
Published: (2023)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
Authentication Method of Interaction Parties Based on Reccurent Sequences
by: Yaremchuk, Yu. Е.
Published: (2013)
by: Yaremchuk, Yu. Е.
Published: (2013)
Problems of active protection of information from leakage through vibroacoustic channels
by: Kataiev, V. С., et al.
Published: (2016)
by: Kataiev, V. С., et al.
Published: (2016)
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021)
by: Шиян, А. А., et al.
Published: (2021)
Researches of characteristics of domestic radiopaque fabrics H1, H2 and H3 with the use of different combinations of theirs
by: Yaremchuk, Yu. E., et al.
Published: (2016)
by: Yaremchuk, Yu. E., et al.
Published: (2016)
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: Дьогтєва, І. О., et al.
Published: (2021)
by: Дьогтєва, І. О., et al.
Published: (2021)
A Cross-Sectional Review of Energy Transition, Security and Climate Change Policies
by: Georgescu, Cătălina Maria, et al.
Published: (2025)
by: Georgescu, Cătălina Maria, et al.
Published: (2025)
Investigation of combinational characteristics of domestic radio-stable fabrics M1, M2 and M3
by: Yaremchuk, Yu. E., et al.
Published: (2015)
by: Yaremchuk, Yu. E., et al.
Published: (2015)
Methods to Improve of the Information Component Survivabilityof Corporate Information-Analytical Systems
by: Lande, D. V.
Published: (2012)
by: Lande, D. V.
Published: (2012)
Security of decision support systems based on decentralized data platforms
by: Савченко, М. М.
Published: (2023)
by: Савченко, М. М.
Published: (2023)
Improvement of role-based access control model in private cloud environments
by: Volynets, O. Yu., et al.
Published: (2019)
by: Volynets, O. Yu., et al.
Published: (2019)
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Iaremchuk, Iu. E.
Published: (2014)
by: Iaremchuk, Iu. E.
Published: (2014)
Automation of standardized cyber insurance processes
by: Khudyntsev, Mykola, et al.
Published: (2025)
by: Khudyntsev, Mykola, et al.
Published: (2025)
Territorially distributed information computer systems in a unified information space: basic concepts and definitions
by: Додонов, О. Г., et al.
Published: (2024)
by: Додонов, О. Г., et al.
Published: (2024)
The Organization Based on Game Theory of Multipath Secure Data Communication
by: Кулаков, Ю. А., et al.
Published: (2012)
by: Кулаков, Ю. А., et al.
Published: (2012)
Enhancing power system security using soft computing and machine learning
by: Venkatesh, P., et al.
Published: (2023)
by: Venkatesh, P., et al.
Published: (2023)
Strategic Risk Management of Digital Transformation in the Economic Security of Industrial Enterprises
by: Ivanov, Mihail, et al.
Published: (2025)
by: Ivanov, Mihail, et al.
Published: (2025)
Method of Digital Signature Producing and Verification Based on Recurrent Sequences
by: Iaremchuk, Iu. Е.
Published: (2013)
by: Iaremchuk, Iu. Е.
Published: (2013)
Features for providing of cyber security
by: Prysiazhniuk, M. M., et al.
Published: (2017)
by: Prysiazhniuk, M. M., et al.
Published: (2017)
Protection of information objects from intentional collisions of inspection characteristics in error-correcting codes
by: Mаtоv, O. Y., et al.
Published: (2016)
by: Mаtоv, O. Y., et al.
Published: (2016)
Improving the security of critical infrastructures through automated organizational management systems
by: Додонов, О. Г., et al.
Published: (2022)
by: Додонов, О. Г., et al.
Published: (2022)
Integration of environmental safety into mechanisms for combating energy threats to residential buildings
by: Hamotskyi, Roman
Published: (2025)
by: Hamotskyi, Roman
Published: (2025)
Modernization of domestic power machine-building – basic of power security of Ukraine
by: Мацевитый, Ю. М., et al.
Published: (2013)
by: Мацевитый, Ю. М., et al.
Published: (2013)
Modernization of domestic power machine-building – basic of power security of Ukraine
by: Мацевитый, Ю. М., et al.
Published: (2013)
by: Мацевитый, Ю. М., et al.
Published: (2013)
Network Modelling of Assessing the Impact of Threats to the Economic Security of Logistics Operators
by: Vivchar, Oksana, et al.
Published: (2024)
by: Vivchar, Oksana, et al.
Published: (2024)
Similar Items
-
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: Saliieva, O. V., et al.
Published: (2020) -
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020) -
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015) -
Method of corn yield prediction per grain applying Fuzzy Cognitive Maps
by: Popov, Mykhailo, et al.
Published: (2024) -
Modelling of choice on the optimal method for counteract of information security threats
by: Nikiforova, L. O., et al.
Published: (2014)