2025-02-22T00:51:34-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: Query fl=%2A&wt=json&json.nl=arrarr&q=id%3A%22drspiprikievua-article-265714%22&qt=morelikethis&rows=5
2025-02-22T00:51:34-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: => GET http://localhost:8983/solr/biblio/select?fl=%2A&wt=json&json.nl=arrarr&q=id%3A%22drspiprikievua-article-265714%22&qt=morelikethis&rows=5
2025-02-22T00:51:34-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: <= 200 OK
2025-02-22T00:51:34-05:00 DEBUG: Deserialized SOLR response

Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems

With the development of information technology (IT) and convergence between IT and operation technology (OT), an important aspect of the stability of critical systems has become the provision of cybersecurity of critical information infrastructure. To protect the information, the legislation of Ukra...

Full description

Saved in:
Bibliographic Details
Main Authors: Давидюк, А. В., Зубок, В. Ю.
Format: Article
Language:Ukrainian
Published: Інститут проблем реєстрації інформації НАН України 2021
Subjects:
Online Access:http://drsp.ipri.kiev.ua/article/view/265714
Tags: Add Tag
No Tags, Be the first to tag this record!