Risk factor analysis of an example of an incident with global routing registry software
When designing and developing software systems of any complexity, project risk management is important and necessary. Every software development project contains elements of uncertainty known as a project risk. The success of a software development project depends on the amount of risk that correspo...
Saved in:
| Date: | 2020 |
|---|---|
| Main Author: | Zubok, V. Yu. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2020
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/207783 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
A combination of traditional methods and a metric approach to assessing the risks from cyber attacks to global routing.
by: Zubok, V. Yu.
Published: (2019)
by: Zubok, V. Yu.
Published: (2019)
А formal description of the internet global routing objects and processes for global routing cyberattacs impact assessment
by: Zubok, V. Yu.
Published: (2019)
by: Zubok, V. Yu.
Published: (2019)
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Zubok, V. Yu.
Published: (2020)
by: Zubok, V. Yu.
Published: (2020)
Formation of the topological space of the Іnternet by the global routing system
by: Зубок, В. Ю., et al.
Published: (2021)
by: Зубок, В. Ю., et al.
Published: (2021)
Risk factor analysis of an example of an incident with global routing registry software
by: Yu. Zubok
Published: (2020)
by: Yu. Zubok
Published: (2020)
Routing technology based on virtualization software-defined networking concept
by: Kravchenko, Yu.V., et al.
Published: (2024)
by: Kravchenko, Yu.V., et al.
Published: (2024)
The Organization Based on Game Theory of Multipath Secure Data Communication
by: Кулаков, Ю. А., et al.
Published: (2012)
by: Кулаков, Ю. А., et al.
Published: (2012)
Determination of the optimal set of methods for iterative improvement of the reference route
by: Derevianko, E.M., et al.
Published: (2025)
by: Derevianko, E.M., et al.
Published: (2025)
Strategic Risk Management of Digital Transformation in the Economic Security of Industrial Enterprises
by: Ivanov, Mihail, et al.
Published: (2025)
by: Ivanov, Mihail, et al.
Published: (2025)
Practical Aspects of Modeling Changes in the Topology of the Global Computer Network
by: Zubok, V. Yu.
Published: (2012)
by: Zubok, V. Yu.
Published: (2012)
Development of a genetic method for solution of routing problems with several transport
by: Федорченко, Є. М., et al.
Published: (2023)
by: Федорченко, Є. М., et al.
Published: (2023)
OPTIMIZATION NOISE STABILITY BASED APPROACH TO CHANNEL ROUTING
by: Ivanov, V. G.
Published: (2014)
by: Ivanov, V. G.
Published: (2014)
Financial risk management with taking account of information
by: Kuznietsova, N. V.
Published: (2018)
by: Kuznietsova, N. V.
Published: (2018)
Cyber Resilience Key Metrics in Small and Medium-Sized Enterprises
by: Deruma, Sintija
Published: (2025)
by: Deruma, Sintija
Published: (2025)
About one dynamic model of conflictcontrol user interaction in open information environments
by: Ignatenko, O.P.
Published: (2015)
by: Ignatenko, O.P.
Published: (2015)
Global Internet Routing Cyberattacks Risk Assessment
by: Yu. Zubok
Published: (2019)
by: Yu. Zubok
Published: (2019)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
To the problem of risk management in the field of the atomic industry of Ukraine
by: Drozd, I.P.
Published: (2018)
by: Drozd, I.P.
Published: (2018)
Mathematical modeling of transport and logistics infrastructure for the post-war reconstruction of Ukraine
by: Horoshkova, Lidiia A., et al.
Published: (2024)
by: Horoshkova, Lidiia A., et al.
Published: (2024)
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems
by: Давидюк, А. В., et al.
Published: (2021)
by: Давидюк, А. В., et al.
Published: (2021)
Construction and Visualization of a New Risk-oriented Model of Global Routing in the Internet
by: Yu. Zubok
Published: (2020)
by: Yu. Zubok
Published: (2020)
POSSIBILITIES OF USING THE TIMES SOFTWARE TAKING INTO ACCOUNT THE NON-GUARANTEED RENEWABLE ENERGY
by: Kuznietsov, M., et al.
Published: (2023)
by: Kuznietsov, M., et al.
Published: (2023)
A formal description of the internet global routing objects and processes for global routing cyberattacs impact assessment
by: Yu. Zubok
Published: (2019)
by: Yu. Zubok
Published: (2019)
ANTHROPOGENIC GLOBAL WARMING. ENERGY, ENVIRONMENTAL AND CLIMATE SECURITY
by: Fialko, Nataliia, et al.
Published: (2024)
by: Fialko, Nataliia, et al.
Published: (2024)
Ecosystem research in software engineering
by: Sydorov, N.A.
Published: (2025)
by: Sydorov, N.A.
Published: (2025)
A combination of traditional methods and a metric approach to assessing the risks from cyber attacks to global routing
by: Yu. Zubok
Published: (2019)
by: Yu. Zubok
Published: (2019)
Software engineering and big data software
by: Sydorov, N.O., et al.
Published: (2023)
by: Sydorov, N.O., et al.
Published: (2023)
Determining the ways of counteraction to cyberattacks on the internet global routing
by: Yu. Zubok
Published: (2018)
by: Yu. Zubok
Published: (2018)
Scoring card’s development for banking activities risks’ analysis
by: Kuznietsova, N. V.
Published: (2017)
by: Kuznietsova, N. V.
Published: (2017)
Integrated security systems for protecting payment synchronization from MITM attacks
by: Shahmatov, I.O., et al.
Published: (2025)
by: Shahmatov, I.O., et al.
Published: (2025)
Towards ecosystem research in the software engineering
by: Sydorov, M.O.
Published: (2024)
by: Sydorov, M.O.
Published: (2024)
New metrics for assessment the risks of the Internet route hijack cyberattacs
by: Yu. Zubok
Published: (2020)
by: Yu. Zubok
Published: (2020)
Dynamic risk assessment and development of the banking activity against risk strategies
by: Кузнєцова, Н. В., et al.
Published: (2021)
by: Кузнєцова, Н. В., et al.
Published: (2021)
Tete-a-tete project: software engineering tools supporting understanding
by: Hrytsay, V.P., et al.
Published: (2015)
by: Hrytsay, V.P., et al.
Published: (2015)
Features of the Model of the Offender at the Analysis of Attacks on Global Internet Routing
by: Yu. Zubok
Published: (2019)
by: Yu. Zubok
Published: (2019)
Automation of standardized cyber insurance processes
by: Khudyntsev, Mykola, et al.
Published: (2025)
by: Khudyntsev, Mykola, et al.
Published: (2025)
Toward software artifacts ecosystem
by: Sydorov, N.A.
Published: (2021)
by: Sydorov, N.A.
Published: (2021)
Features for providing of cyber security
by: Prysiazhniuk, M. M., et al.
Published: (2017)
by: Prysiazhniuk, M. M., et al.
Published: (2017)
50 years of software engineering
by: Sydorov, N.A.
Published: (2019)
by: Sydorov, N.A.
Published: (2019)
The problems of embedded systems special software effective testing and their elaboration
by: Yerofieiev, Yu.V., et al.
Published: (2026)
by: Yerofieiev, Yu.V., et al.
Published: (2026)
Similar Items
-
A combination of traditional methods and a metric approach to assessing the risks from cyber attacks to global routing.
by: Zubok, V. Yu.
Published: (2019) -
А formal description of the internet global routing objects and processes for global routing cyberattacs impact assessment
by: Zubok, V. Yu.
Published: (2019) -
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Zubok, V. Yu.
Published: (2020) -
Formation of the topological space of the Іnternet by the global routing system
by: Зубок, В. Ю., et al.
Published: (2021) -
Risk factor analysis of an example of an incident with global routing registry software
by: Yu. Zubok
Published: (2020)