Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
Recently, the number of cases of using cyberspace for cyberattacks on individuals, social groups, and society as a whole has been growing rapidly. Such attacks are characterized by the fact that their intensity increases during the attack. As a result, new conditions are created for the activities o...
Saved in:
| Date: | 2021 |
|---|---|
| Main Authors: | Дьогтєва, І. О., Шиян, А. А., Катаєв, В. С. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2021
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/265720 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Method of detection of http attacks on a smart home using the algebraic matching method
by: Gorbatiuk, V.O., et al.
Published: (2023)
by: Gorbatiuk, V.O., et al.
Published: (2023)
Complex approach for state critical information infrastructure cyber defence system constructing
by: Synitsyn, I.P., et al.
Published: (2018)
by: Synitsyn, I.P., et al.
Published: (2018)
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021)
by: Шиян, А. А., et al.
Published: (2021)
Automation of standardized cyber insurance processes
by: Khudyntsev, Mykola, et al.
Published: (2025)
by: Khudyntsev, Mykola, et al.
Published: (2025)
Scientometric analysis of co-word networks taken from publications of a scientific team
by: Lande, D. V., et al.
Published: (2017)
by: Lande, D. V., et al.
Published: (2017)
Features for providing of cyber security
by: Prysiazhniuk, M. M., et al.
Published: (2017)
by: Prysiazhniuk, M. M., et al.
Published: (2017)
Using Bayesian network models for early assessment of cyberattack threats to electricity generation facility
by: Гальчинський, Л. Ю., et al.
Published: (2025)
by: Гальчинський, Л. Ю., et al.
Published: (2025)
Improvement of protection for WEB resources from attacks based on combined heuristic and statistical approach
by: Prysiazhnyi, D. P.
Published: (2016)
by: Prysiazhnyi, D. P.
Published: (2016)
Organizational and legal mechanisms of cybersecurity and cyber defense in Ukraine: essentiality, conditions and development prospects
by: Semenchenko, A.I., et al.
Published: (2020)
by: Semenchenko, A.I., et al.
Published: (2020)
Burden of malignant melanoma in Ukraine in 2002–2013: incidence, mortality and survival
by: Korovin, S., et al.
Published: (2023)
by: Korovin, S., et al.
Published: (2023)
Incidence and long-term effects of treatment of malignant germ cell neoplasms in Ukraine
by: Fedorenko, Z.P., et al.
Published: (2023)
by: Fedorenko, Z.P., et al.
Published: (2023)
Cyber Resilience Key Metrics in Small and Medium-Sized Enterprises
by: Deruma, Sintija
Published: (2025)
by: Deruma, Sintija
Published: (2025)
Determination of the dependence between climatic factors and Covid-19 disease incidence
by: Mitryasova, Olena P., et al.
Published: (2021)
by: Mitryasova, Olena P., et al.
Published: (2021)
NON-REFLECTIVE INCIDENCE OF P-POLARIZED ELECTROMAGNETIC WAVES ON THE SOLID-STATE STRUCTURE "UNIAXIAL PLASMONIC METASURFACE — DIELECTRIC LAYER — METAL"
by: Beletskii, M. M., et al.
Published: (2023)
by: Beletskii, M. M., et al.
Published: (2023)
SEISMIC-IONOSPHERIC EFFECTS: RESULTS OF RADIO SOUNDINGS AT OBLIQUE INCIDENCE
by: Luo, Y., et al.
Published: (2020)
by: Luo, Y., et al.
Published: (2020)
Neurosymbolic approach for attack detection in satellite communication systems
by: Mostovyi, O.S.
Published: (2024)
by: Mostovyi, O.S.
Published: (2024)
Automorphisms of finitary incidence rings
by: Khripchenko, Nikolay
Published: (2018)
by: Khripchenko, Nikolay
Published: (2018)
Valuation of extinction parameters of anisotropic macro-seismic wave intensities
by: Kulchitsky, V. E.
Published: (2014)
by: Kulchitsky, V. E.
Published: (2014)
Seismic response of various sites of the territory of Kyiv to seismic loads
by: Kendzera, O. V., et al.
Published: (2021)
by: Kendzera, O. V., et al.
Published: (2021)
A SYNTHESIS OF TEMPORAL VARIATIONS IN DOPPLER SPECTRA RECORDED AT A QUASI-VERTICAL INCIDENCE BY THE HF DOPPLER RADAR WITH SPACED RECEIVERS
by: Pushin, V. F., et al.
Published: (2021)
by: Pushin, V. F., et al.
Published: (2021)
ENERGY EFFICIENCY OF THE SUBWAY ELECTRICAL SUPPLY SYSTEM WITH ELECTRICAL ENERGY RECOVERY AT BRAKING
by: Zhemerov, George G., et al.
Published: (2019)
by: Zhemerov, George G., et al.
Published: (2019)
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Zubok, V. Yu.
Published: (2020)
by: Zubok, V. Yu.
Published: (2020)
EVALUATION OF THE INTENSITY OF THE EXTERNAL WATER EXCHANGE AT THE KIEV RESERVOIR DEPENDING ON THE WATER YEAR
by: Obukhov, E., et al.
Published: (2017)
by: Obukhov, E., et al.
Published: (2017)
Variations of geomagnetic response functions in Japan
by: Rokityansky, I.I., et al.
Published: (2015)
by: Rokityansky, I.I., et al.
Published: (2015)
Relief parameters and angular distribution of light intensity for axisymmetric surface homogenizing structures
by: Antonov, E. E., et al.
Published: (2020)
by: Antonov, E. E., et al.
Published: (2020)
FUZZY DYNAMIC RESPONSE OF A BISTABLE ELECTROMAGNETIC ACTUATOR BASED ON HIGH-COERCITIVITY PERMANENT MAGNETS
by: Baida, E. I.
Published: (2012)
by: Baida, E. I.
Published: (2012)
Digitalization of personnel management processes for the post-war recovery of Ukraine
by: Vasylenko, Vladyslav, et al.
Published: (2025)
by: Vasylenko, Vladyslav, et al.
Published: (2025)
Потокові моделі мережі Інтернет за умов атак на відмову
by: Andon, P.I., et al.
Published: (2015)
by: Andon, P.I., et al.
Published: (2015)
Corporate Social Responsibility and Strategic Management of Business Development in Small and Medium-Sized Enterprises
by: Stoyanov, Philip
Published: (2025)
by: Stoyanov, Philip
Published: (2025)
Corporate Social Responsibility Management and Business Strategies in Sustainable Economic Development
by: Hutsaliuk, Oleksii, et al.
Published: (2025)
by: Hutsaliuk, Oleksii, et al.
Published: (2025)
Overview of the technologies of the collection, transportation, recovery and disposal of municipal solid waste
by: Satin, Ihor V., et al.
Published: (2022)
by: Satin, Ihor V., et al.
Published: (2022)
Neurosymbolic models for ensuring cybersecurity in critical cyberphysical systems
by: Yevdokymov, S.O.
Published: (2025)
by: Yevdokymov, S.O.
Published: (2025)
RETRIEVAL OF A NON-UNIFORM PROFILE OF RAIN INTENSITY BY SOLVING THE INTEGRAL SCATTERING EQUATION FOR DUAL-FREQUENCY SENSING CASE STUDY
by: Linkova, A. M.
Published: (2024)
by: Linkova, A. M.
Published: (2024)
Recognition of pathogen attacks by plant immune sensors and their initiation of the immune response
by: S. M. Shamrai
Published: (2022)
by: S. M. Shamrai
Published: (2022)
Assessment of seismic response of a soil layer with the oscillating inclusions
by: Kendzera, O.V., et al.
Published: (2020)
by: Kendzera, O.V., et al.
Published: (2020)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
A combination of traditional methods and a metric approach to assessing the risks from cyber attacks to global routing.
by: Zubok, V. Yu.
Published: (2019)
by: Zubok, V. Yu.
Published: (2019)
Modeling of seismic response of soil layer within the framework of nonlocal model of continuous medium
by: Kendzera, O. V., et al.
Published: (2020)
by: Kendzera, O. V., et al.
Published: (2020)
International cooperation of S. I. Subbotin Institute Geophysics, NAS of Ukraine for 2010—2020
by: Starostenko, V. I., et al.
Published: (2021)
by: Starostenko, V. I., et al.
Published: (2021)
Game-theoretic approach to the network security problem
by: Ignatenko, O.P.
Published: (2018)
by: Ignatenko, O.P.
Published: (2018)
Similar Items
-
Method of detection of http attacks on a smart home using the algebraic matching method
by: Gorbatiuk, V.O., et al.
Published: (2023) -
Complex approach for state critical information infrastructure cyber defence system constructing
by: Synitsyn, I.P., et al.
Published: (2018) -
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021) -
Automation of standardized cyber insurance processes
by: Khudyntsev, Mykola, et al.
Published: (2025) -
Scientometric analysis of co-word networks taken from publications of a scientific team
by: Lande, D. V., et al.
Published: (2017)