Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems
With the development of information technology (IT) and convergence between IT and operation technology (OT), an important aspect of the stability of critical systems has become the provision of cybersecurity of critical information infrastructure. To protect the information, the legislation of Ukra...
Saved in:
| Date: | 2021 |
|---|---|
| Main Authors: | Давидюк, А. В., Зубок, В. Ю. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2021
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/265714 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
-
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems
by: A. V. Davydiuk, et al.
Published: (2021) -
Improving the security of critical infrastructures through automated organizational management systems
by: Додонов, О. Г., et al.
Published: (2022) -
Features for providing of cyber security
by: Prysiazhniuk, M. M., et al.
Published: (2017) -
Features of decision support in government situational centers to protect critical infrastructure
by: Гречанінов , В. Ф.
Published: (2021) -
Organizational and legal mechanisms of cybersecurity and cyber defense in Ukraine: essentiality, conditions and development prospects
by: Semenchenko, A.I., et al.
Published: (2020)