Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems
With the development of information technology (IT) and convergence between IT and operation technology (OT), an important aspect of the stability of critical systems has become the provision of cybersecurity of critical information infrastructure. To protect the information, the legislation of Ukra...
Saved in:
| Date: | 2021 |
|---|---|
| Main Authors: | Давидюк, А. В., Зубок, В. Ю. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2021
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/265714 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems
by: A. V. Davydiuk, et al.
Published: (2021)
by: A. V. Davydiuk, et al.
Published: (2021)
Improving the security of critical infrastructures through automated organizational management systems
by: Додонов, О. Г., et al.
Published: (2022)
by: Додонов, О. Г., et al.
Published: (2022)
Features for providing of cyber security
by: Prysiazhniuk, M. M., et al.
Published: (2017)
by: Prysiazhniuk, M. M., et al.
Published: (2017)
Features of decision support in government situational centers to protect critical infrastructure
by: Гречанінов , В. Ф.
Published: (2021)
by: Гречанінов , В. Ф.
Published: (2021)
Organizational and legal mechanisms of cybersecurity and cyber defense in Ukraine: essentiality, conditions and development prospects
by: Semenchenko, A.I., et al.
Published: (2020)
by: Semenchenko, A.I., et al.
Published: (2020)
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
A methodology and architecture of the platform for modeling interdependencies in critical infrastructures when cascading effects occur
by: Сенченко, В. Р., et al.
Published: (2025)
by: Сенченко, В. Р., et al.
Published: (2025)
Neurosymbolic models for ensuring cybersecurity in critical cyberphysical systems
by: Yevdokymov, S.O.
Published: (2025)
by: Yevdokymov, S.O.
Published: (2025)
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Zubok, V. Yu.
Published: (2020)
by: Zubok, V. Yu.
Published: (2020)
Logical consequence relations in logics of monotone predicates and logics of antitone predicates
by: Shkilniak, O.S.
Published: (2018)
by: Shkilniak, O.S.
Published: (2018)
Armed conflict as an environmental risk factor at water supply facilities in еastern Ukraine (case study of “Voda Donbassa” utility company’s Siverskyi Donets – Donbas canal)
by: Buglak, Olexandra V., et al.
Published: (2019)
by: Buglak, Olexandra V., et al.
Published: (2019)
EVALUATION TECHNIQUE FOR THE F2 LAYER CRITICAL FREQUENCY BY THE DIFFERENCE OF IONOSPHERE ALFVEN RESONANCE EIGENFREQUENCIES
by: Baru, N. A., et al.
Published: (2014)
by: Baru, N. A., et al.
Published: (2014)
A combination of traditional methods and a metric approach to assessing the risks from cyber attacks to global routing.
by: Zubok, V. Yu.
Published: (2019)
by: Zubok, V. Yu.
Published: (2019)
Risk factor analysis of an example of an incident with global routing registry software
by: Zubok, V. Yu.
Published: (2020)
by: Zubok, V. Yu.
Published: (2020)
Analysis of critical scenarios connected with the termination of action of certain international contracts in the gas sector of Ukraine
by: Leshchenko
Published: (2016)
by: Leshchenko
Published: (2016)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
Logical consequence relations in logics of quasiary predicates
by: Shkilniak, O.S.
Published: (2018)
by: Shkilniak, O.S.
Published: (2018)
Automation of standardized cyber insurance processes
by: Khudyntsev, Mykola, et al.
Published: (2025)
by: Khudyntsev, Mykola, et al.
Published: (2025)
Relations of logical consequence in logics of partial predicates with composition of predicate complement
by: Shkilniak, O.S.
Published: (2019)
by: Shkilniak, O.S.
Published: (2019)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Propositional logics of partial predicates with composition of predicate complement
by: Nikitchenko, M.S., et al.
Published: (2019)
by: Nikitchenko, M.S., et al.
Published: (2019)
Modeling the suitability of territories for the deployment of Ukraine's critical infrastructure in the face of military threats
by: Borovyk, Karolina, et al.
Published: (2024)
by: Borovyk, Karolina, et al.
Published: (2024)
A review of methods and technologies for scenario analysis of cascading effects
by: Сенченко, В. Р., et al.
Published: (2024)
by: Сенченко, В. Р., et al.
Published: (2024)
Pure first-order logics of quasiary predicates
by: Nikitchenko, M.S., et al.
Published: (2018)
by: Nikitchenko, M.S., et al.
Published: (2018)
A network approach in the study of cascading effects critical infrastructures
by: Хоменко, О. М., et al.
Published: (2024)
by: Хоменко, О. М., et al.
Published: (2024)
Methodological basis of orthotransformed space images application for the environmental assessment and software of research
by: Lunova, Oksana, et al.
Published: (2019)
by: Lunova, Oksana, et al.
Published: (2019)
Pure first-order quasiary logics with equality predicates
by: Nikitchenko, M.S., et al.
Published: (2018)
by: Nikitchenko, M.S., et al.
Published: (2018)
First-order logics with partial predicates for checking variable definedness
by: Shkilniak, S.S.
Published: (2025)
by: Shkilniak, S.S.
Published: (2025)
Logics of general non-deterministic predicates: semantic aspects
by: Nikitchenko, M.S., et al.
Published: (2018)
by: Nikitchenko, M.S., et al.
Published: (2018)
Sequent calculi of first-order logics of partial predicates with extended renominations and composition of predicate complement
by: Nikitchenko, M.S., et al.
Published: (2020)
by: Nikitchenko, M.S., et al.
Published: (2020)
Synthesis of information and telecommunication networks of automatized environmental security systems with the purpose of gaining maximum noise resistance with a given efficiency
by: Dovgiy, Stanislav O., et al.
Published: (2021)
by: Dovgiy, Stanislav O., et al.
Published: (2021)
Threat assessment mathematical model for potentially dangerous objects of critical infrastructure in the combat zone
by: Murasov, R.K., et al.
Published: (2023)
by: Murasov, R.K., et al.
Published: (2023)
Network and economic component of financial cybersecurity indices
by: Turchynov, Oleksandr, et al.
Published: (2025)
by: Turchynov, Oleksandr, et al.
Published: (2025)
IMPROVING THE RESILIENCE OF POWER SYSTEMS FOR ENERGY-INDEPENDENT COMMUNITIES THROUGH THE INTEGRATION OF DECENTRALIZED GENERATION
by: Polishchuk, Roman, et al.
Published: (2025)
by: Polishchuk, Roman, et al.
Published: (2025)
First-order composition-nominative logics with predicates of weak equality and of strong equality
by: Shkilniak, S.S.
Published: (2019)
by: Shkilniak, S.S.
Published: (2019)
Composition nominative modal logics of partial non-monotone predicates and their calculi
by: Shkilniak, O.S., et al.
Published: (2018)
by: Shkilniak, O.S., et al.
Published: (2018)
Territorially distributed information computer systems in a unified information space: basic concepts and definitions
by: Додонов, О. Г., et al.
Published: (2024)
by: Додонов, О. Г., et al.
Published: (2024)
First-order sequent calculi of logics of quasiary predicates with extended renominations and equality
by: Shkilniak, О.S., et al.
Published: (2023)
by: Shkilniak, О.S., et al.
Published: (2023)
Information technology of IT-infrastructure management architecture elements
by: Dovgiy, Stanislav O., et al.
Published: (2022)
by: Dovgiy, Stanislav O., et al.
Published: (2022)
On classifying the non-Tits \(P\)-critical posets
by: Bondarenko, V. M., et al.
Published: (2022)
by: Bondarenko, V. M., et al.
Published: (2022)
Similar Items
-
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems
by: A. V. Davydiuk, et al.
Published: (2021) -
Improving the security of critical infrastructures through automated organizational management systems
by: Додонов, О. Г., et al.
Published: (2022) -
Features for providing of cyber security
by: Prysiazhniuk, M. M., et al.
Published: (2017) -
Features of decision support in government situational centers to protect critical infrastructure
by: Гречанінов , В. Ф.
Published: (2021) -
Organizational and legal mechanisms of cybersecurity and cyber defense in Ukraine: essentiality, conditions and development prospects
by: Semenchenko, A.I., et al.
Published: (2020)