Resilience and stability in security
The investigation discusses the difference between the concepts of «resilience» and «stability». It is noted that within the Ukrainian national academic scientific dialogue there is a significant terminological uncertainty, due to the lack in the Ukrainian lexical array of historically established e...
Saved in:
| Date: | 2024 |
|---|---|
| Main Authors: | Мохор, В. В., Коробейніков, Ф. О. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2024
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/308655 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Cyber Resilience Key Metrics in Small and Medium-Sized Enterprises
by: Deruma, Sintija
Published: (2025)
by: Deruma, Sintija
Published: (2025)
Biospheric processes forecasting by the means of synergetics
by: Azarov, S.I., et al.
Published: (2018)
by: Azarov, S.I., et al.
Published: (2018)
Resilience of Digital Archives
by: Ланде, Д. В., et al.
Published: (2025)
by: Ланде, Д. В., et al.
Published: (2025)
Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems
by: Chepkov, Ihor B., et al.
Published: (2019)
by: Chepkov, Ihor B., et al.
Published: (2019)
Automation of standardized cyber insurance processes
by: Khudyntsev, Mykola, et al.
Published: (2025)
by: Khudyntsev, Mykola, et al.
Published: (2025)
Investigations on hybrid line stability ranking index with polynomial load modeling for power system security
by: Venkatesh, P., et al.
Published: (2023)
by: Venkatesh, P., et al.
Published: (2023)
The Organization Based on Game Theory of Multipath Secure Data Communication
by: Кулаков, Ю. А., et al.
Published: (2012)
by: Кулаков, Ю. А., et al.
Published: (2012)
Strategic Risk Management of Digital Transformation in the Economic Security of Industrial Enterprises
by: Ivanov, Mihail, et al.
Published: (2025)
by: Ivanov, Mihail, et al.
Published: (2025)
Indirect adaptive fuzzy finite time synergetic control for power systems
by: Khatir, A., et al.
Published: (2023)
by: Khatir, A., et al.
Published: (2023)
Mathematical models and methods for solving some problems on the information security
by: Никифоров, О. В., et al.
Published: (2023)
by: Никифоров, О. В., et al.
Published: (2023)
GIS-Based Assessment Model of Resilient Management and Monitoring of Water Resources
by: Kostev, Radoslav
Published: (2025)
by: Kostev, Radoslav
Published: (2025)
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019)
by: Saliieva, O. V., et al.
Published: (2019)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
Acquired Helplessness Syndrome in Monofunctional Systems Experiencing Multicrisis: Mechanisms Overcoming Challenges in Resilient Circular Economy
by: Mykytenko, Viktoriia, et al.
Published: (2025)
by: Mykytenko, Viktoriia, et al.
Published: (2025)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Modelling and assessment of functional stability of information systems
by: Додонов, О. Г., et al.
Published: (2025)
by: Додонов, О. Г., et al.
Published: (2025)
Securing virtual machines with AMD Zen CPU architecture and instruction set
by: Sokolovskyi, V. S., et al.
Published: (2018)
by: Sokolovskyi, V. S., et al.
Published: (2018)
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Analysis and prediction of anthropogenic impact on the atmospheric air of an industrial city with the use of new geographic and mathematical approaches
by: Bunyakova, Yu.Ya., et al.
Published: (2020)
by: Bunyakova, Yu.Ya., et al.
Published: (2020)
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: Дьогтєва, І. О., et al.
Published: (2021)
by: Дьогтєва, І. О., et al.
Published: (2021)
Adaptive finite-time synergetic control for flexible-joint robot manipulator with disturbance inputs
by: Nguyen, X. C., et al.
Published: (2025)
by: Nguyen, X. C., et al.
Published: (2025)
Modelling of choice on the optimal method for counteract of information security threats
by: Nikiforova, L. O., et al.
Published: (2014)
by: Nikiforova, L. O., et al.
Published: (2014)
To the analysis of methods of calculation of stability of use and their classification
by: Sirenko, Anatolii P.
Published: (2019)
by: Sirenko, Anatolii P.
Published: (2019)
Integration of environmental safety into mechanisms for combating energy threats to residential buildings
by: Hamotskyi, Roman
Published: (2025)
by: Hamotskyi, Roman
Published: (2025)
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems
by: Давидюк, А. В., et al.
Published: (2021)
by: Давидюк, А. В., et al.
Published: (2021)
Security of decision support systems based on decentralized data platforms
by: Савченко, М. М.
Published: (2023)
by: Савченко, М. М.
Published: (2023)
Problems of active protection of information from leakage through vibroacoustic channels
by: Kataiev, V. С., et al.
Published: (2016)
by: Kataiev, V. С., et al.
Published: (2016)
THE ROLE OF BATTERY ENERGY STORAGE SYSTEMS (BESS) IN ENHANCING THE RESILIENCE AND ENERGY INDEPENDENCE OF UKRAINE’S POWER SYSTEM
by: Diachenko , O.
Published: (2025)
by: Diachenko , O.
Published: (2025)
Financial risk management with taking account of information
by: Kuznietsova, N. V.
Published: (2018)
by: Kuznietsova, N. V.
Published: (2018)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
Mathematical models of copulas for assessing the risks of green projects
by: Кузнєцова, Н. В., et al.
Published: (2025)
by: Кузнєцова, Н. В., et al.
Published: (2025)
Increasing the resilience of the method of protection to ensure the authenticity of raster images of the evidence base from unauthorized access.
by: Pavlenko, B. V., et al.
Published: (2019)
by: Pavlenko, B. V., et al.
Published: (2019)
Methods to Improve of the Information Component Survivabilityof Corporate Information-Analytical Systems
by: Lande, D. V.
Published: (2012)
by: Lande, D. V.
Published: (2012)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
Non-linear dynamics theory and malignant melanoma
by: Orel, V.E., et al.
Published: (2023)
by: Orel, V.E., et al.
Published: (2023)
IMPROVING THE RESILIENCE OF SYNCHROINFORMATION SYSTEMS OF SMART POWER GRIDS AND MOBILE COMMUNICATIONS NETWORKS UNDER WARTIME CONDITIONS
by: Samkov, O., et al.
Published: (2025)
by: Samkov, O., et al.
Published: (2025)
Injective stabilization of additive functors, III. Asymptotic stabilization of the tensor product
by: Martsinkovsky, A., et al.
Published: (2021)
by: Martsinkovsky, A., et al.
Published: (2021)
Risk factor analysis of an example of an incident with global routing registry software
by: Zubok, V. Yu.
Published: (2020)
by: Zubok, V. Yu.
Published: (2020)
Protection of information objects from intentional collisions of inspection characteristics in error-correcting codes
by: Mаtоv, O. Y., et al.
Published: (2016)
by: Mаtоv, O. Y., et al.
Published: (2016)
AI (not) against AI
by: Nesterenko, Oleksandr, et al.
Published: (2025)
by: Nesterenko, Oleksandr, et al.
Published: (2025)
Similar Items
-
Cyber Resilience Key Metrics in Small and Medium-Sized Enterprises
by: Deruma, Sintija
Published: (2025) -
Biospheric processes forecasting by the means of synergetics
by: Azarov, S.I., et al.
Published: (2018) -
Resilience of Digital Archives
by: Ланде, Д. В., et al.
Published: (2025) -
Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems
by: Chepkov, Ihor B., et al.
Published: (2019) -
Automation of standardized cyber insurance processes
by: Khudyntsev, Mykola, et al.
Published: (2025)