Risk factor analysis of an example of an incident with global routing registry software
When designing and developing software systems of any complexity, project risk management is important and necessary. Every software development project contains elements of uncertainty known as a project risk. The success of a software development project depends on the amount of risk that correspo...
Saved in:
| Date: | 2020 |
|---|---|
| Main Author: | Zubok, V. Yu. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2020
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/207783 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
A combination of traditional methods and a metric approach to assessing the risks from cyber attacks to global routing.
by: Zubok, V. Yu.
Published: (2019)
by: Zubok, V. Yu.
Published: (2019)
А formal description of the internet global routing objects and processes for global routing cyberattacs impact assessment
by: Zubok, V. Yu.
Published: (2019)
by: Zubok, V. Yu.
Published: (2019)
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Zubok, V. Yu.
Published: (2020)
by: Zubok, V. Yu.
Published: (2020)
Formation of the topological space of the Іnternet by the global routing system
by: Зубок, В. Ю., et al.
Published: (2021)
by: Зубок, В. Ю., et al.
Published: (2021)
Risk factor analysis of an example of an incident with global routing registry software
by: Yu. Zubok
Published: (2020)
by: Yu. Zubok
Published: (2020)
Routing technology based on virtualization software-defined networking concept
by: Kravchenko, Yu.V., et al.
Published: (2024)
by: Kravchenko, Yu.V., et al.
Published: (2024)
The Organization Based on Game Theory of Multipath Secure Data Communication
by: Кулаков, Ю. А., et al.
Published: (2012)
by: Кулаков, Ю. А., et al.
Published: (2012)
Determination of the optimal set of methods for iterative improvement of the reference route
by: Derevianko, E.M., et al.
Published: (2025)
by: Derevianko, E.M., et al.
Published: (2025)
Practical Aspects of Modeling Changes in the Topology of the Global Computer Network
by: Zubok, V. Yu.
Published: (2012)
by: Zubok, V. Yu.
Published: (2012)
Strategic Risk Management of Digital Transformation in the Economic Security of Industrial Enterprises
by: Ivanov, Mihail, et al.
Published: (2025)
by: Ivanov, Mihail, et al.
Published: (2025)
Development of a genetic method for solution of routing problems with several transport
by: Федорченко, Є. М., et al.
Published: (2023)
by: Федорченко, Є. М., et al.
Published: (2023)
OPTIMIZATION NOISE STABILITY BASED APPROACH TO CHANNEL ROUTING
by: Ivanov, V. G.
Published: (2014)
by: Ivanov, V. G.
Published: (2014)
Financial risk management with taking account of information
by: Kuznietsova, N. V.
Published: (2018)
by: Kuznietsova, N. V.
Published: (2018)
Cyber Resilience Key Metrics in Small and Medium-Sized Enterprises
by: Deruma, Sintija
Published: (2025)
by: Deruma, Sintija
Published: (2025)
About one dynamic model of conflictcontrol user interaction in open information environments
by: Ignatenko, O.P.
Published: (2015)
by: Ignatenko, O.P.
Published: (2015)
Global Internet Routing Cyberattacks Risk Assessment
by: Yu. Zubok
Published: (2019)
by: Yu. Zubok
Published: (2019)
To the problem of risk management in the field of the atomic industry of Ukraine
by: Drozd, I.P.
Published: (2018)
by: Drozd, I.P.
Published: (2018)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
Mathematical modeling of transport and logistics infrastructure for the post-war reconstruction of Ukraine
by: Horoshkova, Lidiia A., et al.
Published: (2024)
by: Horoshkova, Lidiia A., et al.
Published: (2024)
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems
by: Давидюк, А. В., et al.
Published: (2021)
by: Давидюк, А. В., et al.
Published: (2021)
Construction and Visualization of a New Risk-oriented Model of Global Routing in the Internet
by: Yu. Zubok
Published: (2020)
by: Yu. Zubok
Published: (2020)
A formal description of the internet global routing objects and processes for global routing cyberattacs impact assessment
by: Yu. Zubok
Published: (2019)
by: Yu. Zubok
Published: (2019)
ANTHROPOGENIC GLOBAL WARMING. ENERGY, ENVIRONMENTAL AND CLIMATE SECURITY
by: Fialko, Nataliia, et al.
Published: (2024)
by: Fialko, Nataliia, et al.
Published: (2024)
POSSIBILITIES OF USING THE TIMES SOFTWARE TAKING INTO ACCOUNT THE NON-GUARANTEED RENEWABLE ENERGY
by: Kuznietsov, M., et al.
Published: (2023)
by: Kuznietsov, M., et al.
Published: (2023)
A combination of traditional methods and a metric approach to assessing the risks from cyber attacks to global routing
by: Yu. Zubok
Published: (2019)
by: Yu. Zubok
Published: (2019)
Determining the ways of counteraction to cyberattacks on the internet global routing
by: Yu. Zubok
Published: (2018)
by: Yu. Zubok
Published: (2018)
Scoring card’s development for banking activities risks’ analysis
by: Kuznietsova, N. V.
Published: (2017)
by: Kuznietsova, N. V.
Published: (2017)
New metrics for assessment the risks of the Internet route hijack cyberattacs
by: Yu. Zubok
Published: (2020)
by: Yu. Zubok
Published: (2020)
Features of the Model of the Offender at the Analysis of Attacks on Global Internet Routing
by: Yu. Zubok
Published: (2019)
by: Yu. Zubok
Published: (2019)
Dynamic risk assessment and development of the banking activity against risk strategies
by: Кузнєцова, Н. В., et al.
Published: (2021)
by: Кузнєцова, Н. В., et al.
Published: (2021)
Ecosystem research in software engineering
by: Sydorov, N.A.
Published: (2025)
by: Sydorov, N.A.
Published: (2025)
Integrated security systems for protecting payment synchronization from MITM attacks
by: Shahmatov, I.O., et al.
Published: (2025)
by: Shahmatov, I.O., et al.
Published: (2025)
Automation of standardized cyber insurance processes
by: Khudyntsev, Mykola, et al.
Published: (2025)
by: Khudyntsev, Mykola, et al.
Published: (2025)
Formation of the topological space of the Internet by the global routing system
by: Yu. Zubok, et al.
Published: (2021)
by: Yu. Zubok, et al.
Published: (2021)
Software engineering and big data software
by: Sydorov, N.O., et al.
Published: (2023)
by: Sydorov, N.O., et al.
Published: (2023)
The New Internet Exchange Points Analisys
by: Zubok, V. Yu.
Published: (2013)
by: Zubok, V. Yu.
Published: (2013)
Research of functioning processes of wireless sensor networks
by: Semko, Viktor V., et al.
Published: (2021)
by: Semko, Viktor V., et al.
Published: (2021)
An analysis of publication activity in the scientific and technical direction of "Unmanned aerial vehicles"
by: Крючин, А. А., et al.
Published: (2025)
by: Крючин, А. А., et al.
Published: (2025)
Features for providing of cyber security
by: Prysiazhniuk, M. M., et al.
Published: (2017)
by: Prysiazhniuk, M. M., et al.
Published: (2017)
Towards ecosystem research in the software engineering
by: Sydorov, M.O.
Published: (2024)
by: Sydorov, M.O.
Published: (2024)
Similar Items
-
A combination of traditional methods and a metric approach to assessing the risks from cyber attacks to global routing.
by: Zubok, V. Yu.
Published: (2019) -
А formal description of the internet global routing objects and processes for global routing cyberattacs impact assessment
by: Zubok, V. Yu.
Published: (2019) -
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Zubok, V. Yu.
Published: (2020) -
Formation of the topological space of the Іnternet by the global routing system
by: Зубок, В. Ю., et al.
Published: (2021) -
Risk factor analysis of an example of an incident with global routing registry software
by: Yu. Zubok
Published: (2020)