Technology for ensuring the survivability of territorially distributed information computer systems in a unified information space
The study discusses the technology of ensuring the structural, functional and informational survivability of territorially distributed information computer systems of arbitrary architecture in a unified information space (TDICS UIS), which is a set of processes, mechanisms, tools, algorithms and mat...
Saved in:
| Date: | 2024 |
|---|---|
| Main Authors: | Додонов, О. Г., Путятін, В. Г., Додонов, В. О., Куценко, С. А., Германюк, А. П., Ізварин, І. В., Кравчук , К. О. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2024
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/308659 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Territorially distributed information computer systems in a unified information space: basic concepts and definitions
by: Додонов, О. Г., et al.
Published: (2024)
by: Додонов, О. Г., et al.
Published: (2024)
Methods to Improve of the Information Component Survivabilityof Corporate Information-Analytical Systems
by: Lande, D. V.
Published: (2012)
by: Lande, D. V.
Published: (2012)
Mеthodological Aspects of Creating Heightened Survivability Corporative Information Ana-lytical Systems
by: Dodonov, О. G., et al.
Published: (2012)
by: Dodonov, О. G., et al.
Published: (2012)
Modelling and assessment of functional stability of information systems
by: Додонов, О. Г., et al.
Published: (2025)
by: Додонов, О. Г., et al.
Published: (2025)
Mathematical models and methods for solving some problems on the information security
by: Никифоров, О. В., et al.
Published: (2023)
by: Никифоров, О. В., et al.
Published: (2023)
Improvement of the method of semiotic analysis of materials for detection of informational-psychological impact
by: Trofymchuk, Oleksandr, et al.
Published: (2025)
by: Trofymchuk, Oleksandr, et al.
Published: (2025)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
Investigation of the factors of informal communication inside social networks for identification of agents carrying privacy threats
by: Nikiforova, L. A., et al.
Published: (2016)
by: Nikiforova, L. A., et al.
Published: (2016)
Information systems for observation of marine aquatories and adjacent areas using aerospace technologies
by: Volynets, Taras, et al.
Published: (2025)
by: Volynets, Taras, et al.
Published: (2025)
Adaptation of Distributed Information Infrastructures for Government Bodies Interaction
by: Khramova, I. О.
Published: (2012)
by: Khramova, I. О.
Published: (2012)
Modelling of choice on the optimal method for counteract of information security threats
by: Nikiforova, L. O., et al.
Published: (2014)
by: Nikiforova, L. O., et al.
Published: (2014)
Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems
by: Chepkov, Ihor B., et al.
Published: (2019)
by: Chepkov, Ihor B., et al.
Published: (2019)
A network model for structural survivability
by: Додонов, О. Г., et al.
Published: (2021)
by: Додонов, О. Г., et al.
Published: (2021)
Problems of active protection of information from leakage through vibroacoustic channels
by: Kataiev, V. С., et al.
Published: (2016)
by: Kataiev, V. С., et al.
Published: (2016)
Detection of information sources distributing fake information inside global internet network
by: Soboliev, A. М.
Published: (2019)
by: Soboliev, A. М.
Published: (2019)
AI (not) against AI
by: Nesterenko, Oleksandr, et al.
Published: (2025)
by: Nesterenko, Oleksandr, et al.
Published: (2025)
Ontology based systemazing of the science information devoted to waste utilizing by methanogenesys
by: Shapovalov, Ye.B., et al.
Published: (2018)
by: Shapovalov, Ye.B., et al.
Published: (2018)
Hash functions and integrity of information objects
by: Mаtоv, O. Ya., et al.
Published: (2014)
by: Mаtоv, O. Ya., et al.
Published: (2014)
Building of a System for Monitoring, Adaptive Aggregation and Generalization of Information
by: Dodonov, A. G., et al.
Published: (2013)
by: Dodonov, A. G., et al.
Published: (2013)
A methodology of detection of the event basis for information operations
by: Prishchepa, S. V.
Published: (2018)
by: Prishchepa, S. V.
Published: (2018)
Counteraction to destructive influence during archival storage of information objects on optical media
by: Berezin, B. A., et al.
Published: (2015)
by: Berezin, B. A., et al.
Published: (2015)
Protection of information objects from intentional collisions of inspection characteristics in error-correcting codes
by: Mаtоv, O. Y., et al.
Published: (2016)
by: Mаtоv, O. Y., et al.
Published: (2016)
Encoding algorithms of information objects in the code of conditional deductions
by: Matov, O. Ya., et al.
Published: (2015)
by: Matov, O. Ya., et al.
Published: (2015)
Information-Technology Approach to Complex Substantiation of Requirements for Automated Systems
by: Самохвалов, Ю. Я., et al.
Published: (2012)
by: Самохвалов, Ю. Я., et al.
Published: (2012)
Quality analysis of information control systems of oil refining industries Justification of the need to implement information management systems of enterprises of the oil refining industry
by: Охріменко, Т. О., et al.
Published: (2021)
by: Охріменко, Т. О., et al.
Published: (2021)
Information and mathematical model of quantum communication channel state control processes
by: Zinchenko, Volodymyr L., et al.
Published: (2024)
by: Zinchenko, Volodymyr L., et al.
Published: (2024)
Information technologies of application architecture`s IT services
by: Dovgiy, Stanislav O., et al.
Published: (2023)
by: Dovgiy, Stanislav O., et al.
Published: (2023)
Application of convolutional neural networks for improving the accuracy of multistatic localization of radio emission sources
by: Dziuba, Volodymyr
Published: (2025)
by: Dziuba, Volodymyr
Published: (2025)
On the experience of reproducing sound information from rarity record carriers and putting it into scientific circulation
by: Kosyak, I. V., et al.
Published: (2017)
by: Kosyak, I. V., et al.
Published: (2017)
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019)
by: Saliieva, O. V., et al.
Published: (2019)
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021)
by: Шиян, А. А., et al.
Published: (2021)
Methods on determination of the output data for assessing residual risks with ensuring the confidentiality of information objects
by: Vasilenko, V. S., et al.
Published: (2017)
by: Vasilenko, V. S., et al.
Published: (2017)
Method of processing information about the state of the environment based on data obtained through a service-oriented network
by: Trofymchuk, Oleksandr M., et al.
Published: (2023)
by: Trofymchuk, Oleksandr M., et al.
Published: (2023)
HIGH-PERFORMANCE ELECTROMECHANICAL AND ELECTROMAGNETIC PULSE DEVICES FOR DESTRUCTION OF INFORMATION ON DIGITAL DRIVES
by: Bolyukh, V. F., et al.
Published: (2015)
by: Bolyukh, V. F., et al.
Published: (2015)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Formation of management scenarios by means of investigation of information space
by: Boychenko, A. V., et al.
Published: (2017)
by: Boychenko, A. V., et al.
Published: (2017)
Information-analytical complex of support of transdisciplinary researches processes
by: Prychodniuk, V.V., et al.
Published: (2018)
by: Prychodniuk, V.V., et al.
Published: (2018)
Cryptographic Protection of Information Objects by Block Transformation from the Positional Namber System into the Residual Classes System
by: Матов, О. Я., et al.
Published: (2012)
by: Матов, О. Я., et al.
Published: (2012)
Financial risk management with taking account of information
by: Kuznietsova, N. V.
Published: (2018)
by: Kuznietsova, N. V.
Published: (2018)
Cryptographic Protection of Information Objects by Block Transformation of the System of Residual Classes to a Positional Number System
by: Mаtоv, О. Y., et al.
Published: (2012)
by: Mаtоv, О. Y., et al.
Published: (2012)
Similar Items
-
Territorially distributed information computer systems in a unified information space: basic concepts and definitions
by: Додонов, О. Г., et al.
Published: (2024) -
Methods to Improve of the Information Component Survivabilityof Corporate Information-Analytical Systems
by: Lande, D. V.
Published: (2012) -
Mеthodological Aspects of Creating Heightened Survivability Corporative Information Ana-lytical Systems
by: Dodonov, О. G., et al.
Published: (2012) -
Modelling and assessment of functional stability of information systems
by: Додонов, О. Г., et al.
Published: (2025) -
Mathematical models and methods for solving some problems on the information security
by: Никифоров, О. В., et al.
Published: (2023)