Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
Recently, the number of cases of using cyberspace for cyberattacks on individuals, social groups, and society as a whole has been growing rapidly. Such attacks are characterized by the fact that their intensity increases during the attack. As a result, new conditions are created for the activities o...
Saved in:
| Date: | 2021 |
|---|---|
| Main Authors: | Дьогтєва, І. О., Шиян, А. А., Катаєв, В. С. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2021
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/265720 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Automation of standardized cyber insurance processes
by: Khudyntsev, Mykola, et al.
Published: (2025)
by: Khudyntsev, Mykola, et al.
Published: (2025)
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021)
by: Шиян, А. А., et al.
Published: (2021)
Complex approach for state critical information infrastructure cyber defence system constructing
by: Synitsyn, I.P., et al.
Published: (2018)
by: Synitsyn, I.P., et al.
Published: (2018)
Method of detection of http attacks on a smart home using the algebraic matching method
by: Gorbatiuk, V.O., et al.
Published: (2023)
by: Gorbatiuk, V.O., et al.
Published: (2023)
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: I. O. Dohtieva, et al.
Published: (2021)
by: I. O. Dohtieva, et al.
Published: (2021)
Organizational and legal mechanisms of cybersecurity and cyber defense in Ukraine: essentiality, conditions and development prospects
by: Semenchenko, A.I., et al.
Published: (2020)
by: Semenchenko, A.I., et al.
Published: (2020)
Cyber Resilience Key Metrics in Small and Medium-Sized Enterprises
by: Deruma, Sintija
Published: (2025)
by: Deruma, Sintija
Published: (2025)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
Integrated security systems for protecting payment synchronization from MITM attacks
by: Shahmatov, I.O., et al.
Published: (2025)
by: Shahmatov, I.O., et al.
Published: (2025)
Features for providing of cyber security
by: Prysiazhniuk, M. M., et al.
Published: (2017)
by: Prysiazhniuk, M. M., et al.
Published: (2017)
Economic Potential of the Railway Engineering Industry of Ukraine in the Context of Post-War Recovery and European Integration
by: Ruban, M., et al.
Published: (2023)
by: Ruban, M., et al.
Published: (2023)
Improvement of protection for WEB resources from attacks based on combined heuristic and statistical approach
by: Prysiazhnyi, D. P.
Published: (2016)
by: Prysiazhnyi, D. P.
Published: (2016)
Scientometric analysis of co-word networks taken from publications of a scientific team
by: Lande, D. V., et al.
Published: (2017)
by: Lande, D. V., et al.
Published: (2017)
Burden of malignant melanoma in Ukraine in 2002–2013: incidence, mortality and survival
by: Korovin, S., et al.
Published: (2023)
by: Korovin, S., et al.
Published: (2023)
Using Bayesian network models for early assessment of cyberattack threats to electricity generation facility
by: Гальчинський, Л. Ю., et al.
Published: (2025)
by: Гальчинський, Л. Ю., et al.
Published: (2025)
Incidence and long-term effects of treatment of malignant germ cell neoplasms in Ukraine
by: Fedorenko, Z.P., et al.
Published: (2023)
by: Fedorenko, Z.P., et al.
Published: (2023)
Neurosymbolic models for ensuring cybersecurity in critical cyberphysical systems
by: Yevdokymov, S.O.
Published: (2025)
by: Yevdokymov, S.O.
Published: (2025)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Determination of the dependence between climatic factors and Covid-19 disease incidence
by: Mitryasova, Olena P., et al.
Published: (2021)
by: Mitryasova, Olena P., et al.
Published: (2021)
Game-theoretic approach to the network security problem
by: Ignatenko, O.P.
Published: (2018)
by: Ignatenko, O.P.
Published: (2018)
Problems of active protection of information from leakage through vibroacoustic channels
by: Kataiev, V. С., et al.
Published: (2016)
by: Kataiev, V. С., et al.
Published: (2016)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
Ontology-based semantic similarity to metadata analysis in the information security domain
by: Gladun, A.Y., et al.
Published: (2021)
by: Gladun, A.Y., et al.
Published: (2021)
Screening technologies for infrastructure projects for post-war restoration of regions of Ukraine
by: Borodina, O., et al.
Published: (2025)
by: Borodina, O., et al.
Published: (2025)
Enhancing Regional Development with Startup Ecosystems
by: Lytvynskyi, R.
Published: (2023)
by: Lytvynskyi, R.
Published: (2023)
Fiscal Decentralisation and Local Government Reform: Adaptation in Ukraine Experience of Poland and Lithuania
by: Borodina, O.
Published: (2023)
by: Borodina, O.
Published: (2023)
Methods to Improve of the Information Component Survivabilityof Corporate Information-Analytical Systems
by: Lande, D. V.
Published: (2012)
by: Lande, D. V.
Published: (2012)
Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems
by: Chepkov, Ihor B., et al.
Published: (2019)
by: Chepkov, Ihor B., et al.
Published: (2019)
Information protection by enhancing the effectiveness of counteracting cyber attacks
by: V. D. Havlovskyi
Published: (2019)
by: V. D. Havlovskyi
Published: (2019)
Organizational and legal framework for addressing cyber attacks in the European Union
by: S. H. Petrov
Published: (2020)
by: S. H. Petrov
Published: (2020)
Development of decision support system using OLAP-technologies for information security monitoring systems
by: Dashdamirova, K.Q.
Published: (2023)
by: Dashdamirova, K.Q.
Published: (2023)
NON-REFLECTIVE INCIDENCE OF P-POLARIZED ELECTROMAGNETIC WAVES ON THE SOLID-STATE STRUCTURE "UNIAXIAL PLASMONIC METASURFACE — DIELECTRIC LAYER — METAL"
by: Beletskii, M. M., et al.
Published: (2023)
by: Beletskii, M. M., et al.
Published: (2023)
SEISMIC-IONOSPHERIC EFFECTS: RESULTS OF RADIO SOUNDINGS AT OBLIQUE INCIDENCE
by: Luo, Y., et al.
Published: (2020)
by: Luo, Y., et al.
Published: (2020)
Digitalization of personnel management processes for the post-war recovery of Ukraine
by: Vasylenko, Vladyslav, et al.
Published: (2025)
by: Vasylenko, Vladyslav, et al.
Published: (2025)
Automorphisms of finitary incidence rings
by: Khripchenko, Nikolay
Published: (2018)
by: Khripchenko, Nikolay
Published: (2018)
Valuation of extinction parameters of anisotropic macro-seismic wave intensities
by: Kulchitsky, V. E.
Published: (2014)
by: Kulchitsky, V. E.
Published: (2014)
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Zubok, V. Yu.
Published: (2020)
by: Zubok, V. Yu.
Published: (2020)
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Yu. Zubok
Published: (2020)
by: Yu. Zubok
Published: (2020)
Neurosymbolic approach for attack detection in satellite communication systems
by: Mostovyi, O.S.
Published: (2024)
by: Mostovyi, O.S.
Published: (2024)
Similar Items
-
Automation of standardized cyber insurance processes
by: Khudyntsev, Mykola, et al.
Published: (2025) -
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021) -
Complex approach for state critical information infrastructure cyber defence system constructing
by: Synitsyn, I.P., et al.
Published: (2018) -
Method of detection of http attacks on a smart home using the algebraic matching method
by: Gorbatiuk, V.O., et al.
Published: (2023) -
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: I. O. Dohtieva, et al.
Published: (2021)