A network approach in the study of cascading effects critical infrastructures
A cascading failure of critical infrastructure can lead to serious consequences in various areas of human activity, so it is important to detect and take preventive measures in time to reduce the consequences of the cascade. The article presents an analysis of the capabilities of the network approac...
Saved in:
| Date: | 2024 |
|---|---|
| Main Authors: | Хоменко, О. М., Сенченко, В. Р., Коваль, О. В. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2024
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/316908 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
A methodology and architecture of the platform for modeling interdependencies in critical infrastructures when cascading effects occur
by: Сенченко, В. Р., et al.
Published: (2025)
by: Сенченко, В. Р., et al.
Published: (2025)
A review of methods and technologies for scenario analysis of cascading effects
by: Сенченко, В. Р., et al.
Published: (2024)
by: Сенченко, В. Р., et al.
Published: (2024)
. Critical infrastructure information systems under modern threats and supporting their functional stability
by: Додонов, О. Г., et al.
Published: (2026)
by: Додонов, О. Г., et al.
Published: (2026)
Improving the security of critical infrastructures through automated organizational management systems
by: Додонов, О. Г., et al.
Published: (2022)
by: Додонов, О. Г., et al.
Published: (2022)
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Features of decision support in government situational centers to protect critical infrastructure
by: Гречанінов , В. Ф.
Published: (2021)
by: Гречанінов , В. Ф.
Published: (2021)
Modeling technology based on fuzzy object-oriented Bayesian belief networks
by: Yershov, S.V., et al.
Published: (2018)
by: Yershov, S.V., et al.
Published: (2018)
ANALYSIS OF METHODS AND ALGORITHMS FOR STUDYING THE REGIME RELIABILITY OF POWER SYSTEMS IN CONDITIONS OF CASCADE FAILURE PROGRESSION
by: Bardyk, Ye., et al.
Published: (2023)
by: Bardyk, Ye., et al.
Published: (2023)
On Markov graphs
by: Kozerenko, Sergiy
Published: (2018)
by: Kozerenko, Sergiy
Published: (2018)
Using Bayesian network models for early assessment of cyberattack threats to electricity generation facility
by: Гальчинський, Л. Ю., et al.
Published: (2025)
by: Гальчинський, Л. Ю., et al.
Published: (2025)
A structural and analytical simulation and animation of technological processes in engineering complexes
by: Denisenko, A. V.
Published: (2016)
by: Denisenko, A. V.
Published: (2016)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Modeling the suitability of territories for the deployment of Ukraine's critical infrastructure in the face of military threats
by: Borovyk, Karolina, et al.
Published: (2024)
by: Borovyk, Karolina, et al.
Published: (2024)
Approaches to study the reliability of wind power station
by: Mateyenko, Y., et al.
Published: (2016)
by: Mateyenko, Y., et al.
Published: (2016)
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems
by: Давидюк, А. В., et al.
Published: (2021)
by: Давидюк, А. В., et al.
Published: (2021)
Threat assessment mathematical model for potentially dangerous objects of critical infrastructure in the combat zone
by: Murasov, R.K., et al.
Published: (2023)
by: Murasov, R.K., et al.
Published: (2023)
Animation information technology of complex technical systems based on the discrete- continuous networks, FLASH-technology and means of DCNET
by: Denisenko, A. V.
Published: (2014)
by: Denisenko, A. V.
Published: (2014)
Neural and Bayesian networks in the problem of credit risk analysis
by: Kuznietsova, N. V., et al.
Published: (2015)
by: Kuznietsova, N. V., et al.
Published: (2015)
An implicit numerical scheme for gas flow simulation in cascade of vibrating airfoils
by: Быков, Ю. А., et al.
Published: (2015)
by: Быков, Ю. А., et al.
Published: (2015)
An implicit numerical scheme for gas flow simulation in cascade of vibrating airfoils
by: Быков, Ю. А., et al.
Published: (2015)
by: Быков, Ю. А., et al.
Published: (2015)
Distributed Transactions Modeling with the Use of Petri Nets
by: Iwaniak, M., et al.
Published: (2012)
by: Iwaniak, M., et al.
Published: (2012)
Coloured Petri Net Model of Two-Phase Commit Protocol With Multiple Participants
by: Iwaniak, M., et al.
Published: (2013)
by: Iwaniak, M., et al.
Published: (2013)
Transition systems as method of designing applications in GPGPU technology
by: Kryvyi, S.L., et al.
Published: (2018)
by: Kryvyi, S.L., et al.
Published: (2018)
Neurosymbolic models for ensuring cybersecurity in critical cyberphysical systems
by: Yevdokymov, S.O.
Published: (2025)
by: Yevdokymov, S.O.
Published: (2025)
Probabilistic description of cascade kinetic processes
by: Virchenko, Yu.P., et al.
Published: (2007)
by: Virchenko, Yu.P., et al.
Published: (2007)
Graphical data aggregation and analysis in dedicated mobile device networks.
by: Pogorilyy, S. D., et al.
Published: (2019)
by: Pogorilyy, S. D., et al.
Published: (2019)
Mathematical modeling of transport and logistics infrastructure for the post-war reconstruction of Ukraine
by: Horoshkova, Lidiia A., et al.
Published: (2024)
by: Horoshkova, Lidiia A., et al.
Published: (2024)
Information technology of IT-infrastructure management architecture elements
by: Dovgiy, Stanislav O., et al.
Published: (2022)
by: Dovgiy, Stanislav O., et al.
Published: (2022)
Evaluation of the intensity of the external water exchange reservoirs of the Dnieper cascade in terms
by: Obukhov, E., et al.
Published: (2017)
by: Obukhov, E., et al.
Published: (2017)
The grammar of Petri-object model visual programming language
by: Dyfuchyn, А.J., et al.
Published: (2022)
by: Dyfuchyn, А.J., et al.
Published: (2022)
EVALUATION TECHNIQUE FOR THE F2 LAYER CRITICAL FREQUENCY BY THE DIFFERENCE OF IONOSPHERE ALFVEN RESONANCE EIGENFREQUENCIES
by: Baru, N. A., et al.
Published: (2014)
by: Baru, N. A., et al.
Published: (2014)
A method of risk assessment in defense planning tasks
by: Нестеренко, О. В., et al.
Published: (2021)
by: Нестеренко, О. В., et al.
Published: (2021)
Visibility Graph as a Tool for the Network Analysis of Measurement Series
by: Snarskii, A. A., et al.
Published: (2013)
by: Snarskii, A. A., et al.
Published: (2013)
Improvement of cereal harvest programming methods using computer simulation information technology
by: Terentiev, Oleksandr M., et al.
Published: (2023)
by: Terentiev, Oleksandr M., et al.
Published: (2023)
Model of two-component system with component deactivation by hidden failure control
by: Обжерин, Юрий Евгеньевич, et al.
Published: (2014)
by: Обжерин, Юрий Евгеньевич, et al.
Published: (2014)
Model of two-component system with component deactivation by hidden failure control
by: Обжерин, Юрий Евгеньевич, et al.
Published: (2014)
by: Обжерин, Юрий Евгеньевич, et al.
Published: (2014)
Methodological basis of orthotransformed space images application for the environmental assessment and software of research
by: Lunova, Oksana, et al.
Published: (2019)
by: Lunova, Oksana, et al.
Published: (2019)
Determining the weights of links in networks of terms
by: Lande, D. V., et al.
Published: (2019)
by: Lande, D. V., et al.
Published: (2019)
Numerical simulation of flow in a compressor cascade under wide range of flow conditions
by: Папазов, С. В., et al.
Published: (2014)
by: Папазов, С. В., et al.
Published: (2014)
Numerical simulation of flow in a compressor cascade under wide range of flow conditions
by: Папазов, С. В., et al.
Published: (2014)
by: Папазов, С. В., et al.
Published: (2014)
Similar Items
-
A methodology and architecture of the platform for modeling interdependencies in critical infrastructures when cascading effects occur
by: Сенченко, В. Р., et al.
Published: (2025) -
A review of methods and technologies for scenario analysis of cascading effects
by: Сенченко, В. Р., et al.
Published: (2024) -
. Critical infrastructure information systems under modern threats and supporting their functional stability
by: Додонов, О. Г., et al.
Published: (2026) -
Improving the security of critical infrastructures through automated organizational management systems
by: Додонов, О. Г., et al.
Published: (2022) -
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: Saliieva, O. V., et al.
Published: (2020)