Improving the security of critical infrastructures through automated organizational management systems
Automated organizational management systems (OMS) of critical infrastructures operate in constantly changing conditions in various industries where there is a high potential threat to human life and the environment (nuclear energy, chemical industry, military and aviation industries, transport, etc....
Saved in:
| Date: | 2022 |
|---|---|
| Main Authors: | Додонов, О. Г., Горбачик, О. С., Кузнєцова , М. Г. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2022
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/262817 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems
by: Давидюк, А. В., et al.
Published: (2021)
by: Давидюк, А. В., et al.
Published: (2021)
Indicators of efficiency (quality) of a comprehensive system for ensuring the survivability of distributed automated systems for organizational management of forces and means
by: Залужний , В. Ф.
Published: (2025)
by: Залужний , В. Ф.
Published: (2025)
Features of decision support in government situational centers to protect critical infrastructure
by: Гречанінов , В. Ф.
Published: (2021)
by: Гречанінов , В. Ф.
Published: (2021)
A methodology and architecture of the platform for modeling interdependencies in critical infrastructures when cascading effects occur
by: Сенченко, В. Р., et al.
Published: (2025)
by: Сенченко, В. Р., et al.
Published: (2025)
A network approach in the study of cascading effects critical infrastructures
by: Хоменко, О. М., et al.
Published: (2024)
by: Хоменко, О. М., et al.
Published: (2024)
Modeling the suitability of territories for the deployment of Ukraine's critical infrastructure in the face of military threats
by: Borovyk, Karolina, et al.
Published: (2024)
by: Borovyk, Karolina, et al.
Published: (2024)
Modelling and assessment of functional stability of information systems
by: Додонов, О. Г., et al.
Published: (2025)
by: Додонов, О. Г., et al.
Published: (2025)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
Automation of standardized cyber insurance processes
by: Khudyntsev, Mykola, et al.
Published: (2025)
by: Khudyntsev, Mykola, et al.
Published: (2025)
Armed conflict as an environmental risk factor at water supply facilities in еastern Ukraine (case study of “Voda Donbassa” utility company’s Siverskyi Donets – Donbas canal)
by: Buglak, Olexandra V., et al.
Published: (2019)
by: Buglak, Olexandra V., et al.
Published: (2019)
Information technology of IT-infrastructure management architecture elements
by: Dovgiy, Stanislav O., et al.
Published: (2022)
by: Dovgiy, Stanislav O., et al.
Published: (2022)
Territorially distributed information computer systems in a unified information space: basic concepts and definitions
by: Додонов, О. Г., et al.
Published: (2024)
by: Додонов, О. Г., et al.
Published: (2024)
Mathematical modeling of transport and logistics infrastructure for the post-war reconstruction of Ukraine
by: Horoshkova, Lidiia A., et al.
Published: (2024)
by: Horoshkova, Lidiia A., et al.
Published: (2024)
Methods to Improve of the Information Component Survivabilityof Corporate Information-Analytical Systems
by: Lande, D. V.
Published: (2012)
by: Lande, D. V.
Published: (2012)
A review of methods and technologies for scenario analysis of cascading effects
by: Сенченко, В. Р., et al.
Published: (2024)
by: Сенченко, В. Р., et al.
Published: (2024)
Strategic Risk Management of Digital Transformation in the Economic Security of Industrial Enterprises
by: Ivanov, Mihail, et al.
Published: (2025)
by: Ivanov, Mihail, et al.
Published: (2025)
Analysis of the Status and Functional Requirements for Modern Engineering Solutions to Create Automated Systems for Personnel Management
by: Khramova, I. О.
Published: (2012)
by: Khramova, I. О.
Published: (2012)
Methodological basis of orthotransformed space images application for the environmental assessment and software of research
by: Lunova, Oksana, et al.
Published: (2019)
by: Lunova, Oksana, et al.
Published: (2019)
Industrial Process Automation and Business Technology Management: A Cobb–Douglas Elasticity Perspective
by: Tomov, Pancho, et al.
Published: (2025)
by: Tomov, Pancho, et al.
Published: (2025)
EVALUATION TECHNIQUE FOR THE F2 LAYER CRITICAL FREQUENCY BY THE DIFFERENCE OF IONOSPHERE ALFVEN RESONANCE EIGENFREQUENCIES
by: Baru, N. A., et al.
Published: (2014)
by: Baru, N. A., et al.
Published: (2014)
On the need to use modern capabilities in situational management to protect the state's critical infrastructure
by: Гречанінов , В.Ф.
Published: (2025)
by: Гречанінов , В.Ф.
Published: (2025)
On classifying the non-Tits \(P\)-critical posets
by: Bondarenko, V. M., et al.
Published: (2022)
by: Bondarenko, V. M., et al.
Published: (2022)
Renewable energy sources for backup energy supply of small wastewater plants and individual households
by: Voloshkina, Olena S., et al.
Published: (2023)
by: Voloshkina, Olena S., et al.
Published: (2023)
Resilience and stability in security
by: Мохор, В. В., et al.
Published: (2024)
by: Мохор, В. В., et al.
Published: (2024)
Integration of environmental safety into mechanisms for combating energy threats to residential buildings
by: Hamotskyi, Roman
Published: (2025)
by: Hamotskyi, Roman
Published: (2025)
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019)
by: Saliieva, O. V., et al.
Published: (2019)
Problems of building an effective system for development processes on management of the aviation forces of Ukraine
by: Dodonov, A. G., et al.
Published: (2019)
by: Dodonov, A. G., et al.
Published: (2019)
Methodical Aspects of the Conceptual Design of Automated Systems
by: Samokhvalov, Yu. Ya., et al.
Published: (2012)
by: Samokhvalov, Yu. Ya., et al.
Published: (2012)
Software system for automated data interpretation of potential fields (GMT-Auto)
by: Starostenko, V. I., et al.
Published: (2015)
by: Starostenko, V. I., et al.
Published: (2015)
Decision on making support for road safety strategy building and urban transport infrastructure development
by: Tsyganok, V. V., et al.
Published: (2019)
by: Tsyganok, V. V., et al.
Published: (2019)
A quantitative assessment of the network structures functional resilience by analyzing of the sensitivity of an optimization model
by: Додонов, О. Г., et al.
Published: (2024)
by: Додонов, О. Г., et al.
Published: (2024)
Securing virtual machines with AMD Zen CPU architecture and instruction set
by: Sokolovskyi, V. S., et al.
Published: (2018)
by: Sokolovskyi, V. S., et al.
Published: (2018)
Problems of active protection of information from leakage through vibroacoustic channels
by: Kataiev, V. С., et al.
Published: (2016)
by: Kataiev, V. С., et al.
Published: (2016)
Synthesis of information and telecommunication networks of automatized environmental security systems with the purpose of gaining maximum noise resistance with a given efficiency
by: Dovgiy, Stanislav O., et al.
Published: (2021)
by: Dovgiy, Stanislav O., et al.
Published: (2021)
Mathematical models and methods for solving some problems on the information security
by: Никифоров, О. В., et al.
Published: (2023)
by: Никифоров, О. В., et al.
Published: (2023)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
The Organization Based on Game Theory of Multipath Secure Data Communication
by: Кулаков, Ю. А., et al.
Published: (2012)
by: Кулаков, Ю. А., et al.
Published: (2012)
From the idea to the creation of an automated interpretation system of potential fields GMT-AUTO: step by step
by: Makarenko, I.B., et al.
Published: (2025)
by: Makarenko, I.B., et al.
Published: (2025)
Similar Items
-
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: Saliieva, O. V., et al.
Published: (2020) -
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020) -
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems
by: Давидюк, А. В., et al.
Published: (2021) -
Indicators of efficiency (quality) of a comprehensive system for ensuring the survivability of distributed automated systems for organizational management of forces and means
by: Залужний , В. Ф.
Published: (2025) -
Features of decision support in government situational centers to protect critical infrastructure
by: Гречанінов , В. Ф.
Published: (2021)