2025-02-22T10:30:18-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: Query fl=%2A&wt=json&json.nl=arrarr&q=id%3A%22drspiprikievua-article-265714%22&qt=morelikethis&rows=5
2025-02-22T10:30:18-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: => GET http://localhost:8983/solr/biblio/select?fl=%2A&wt=json&json.nl=arrarr&q=id%3A%22drspiprikievua-article-265714%22&qt=morelikethis&rows=5
2025-02-22T10:30:18-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: <= 200 OK
2025-02-22T10:30:18-05:00 DEBUG: Deserialized SOLR response
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems
With the development of information technology (IT) and convergence between IT and operation technology (OT), an important aspect of the stability of critical systems has become the provision of cybersecurity of critical information infrastructure. To protect the information, the legislation of Ukra...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | Ukrainian |
Published: |
Інститут проблем реєстрації інформації НАН України
2021
|
Subjects: | |
Online Access: | http://drsp.ipri.kiev.ua/article/view/265714 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!