A network approach in the study of cascading effects critical infrastructures
A cascading failure of critical infrastructure can lead to serious consequences in various areas of human activity, so it is important to detect and take preventive measures in time to reduce the consequences of the cascade. The article presents an analysis of the capabilities of the network approac...
Saved in:
| Date: | 2024 |
|---|---|
| Main Authors: | Хоменко, О. М., Сенченко, В. Р., Коваль, О. В. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2024
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/316908 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
A methodology and architecture of the platform for modeling interdependencies in critical infrastructures when cascading effects occur
by: Сенченко, В. Р., et al.
Published: (2025)
by: Сенченко, В. Р., et al.
Published: (2025)
A review of methods and technologies for scenario analysis of cascading effects
by: Сенченко, В. Р., et al.
Published: (2024)
by: Сенченко, В. Р., et al.
Published: (2024)
Improving the security of critical infrastructures through automated organizational management systems
by: Додонов, О. Г., et al.
Published: (2022)
by: Додонов, О. Г., et al.
Published: (2022)
Features of decision support in government situational centers to protect critical infrastructure
by: Гречанінов , В. Ф.
Published: (2021)
by: Гречанінов , В. Ф.
Published: (2021)
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Modeling the suitability of territories for the deployment of Ukraine's critical infrastructure in the face of military threats
by: Borovyk, Karolina, et al.
Published: (2024)
by: Borovyk, Karolina, et al.
Published: (2024)
Approaches to study the reliability of wind power station
by: Mateyenko, Y., et al.
Published: (2016)
by: Mateyenko, Y., et al.
Published: (2016)
ANALYSIS OF METHODS AND ALGORITHMS FOR STUDYING THE REGIME RELIABILITY OF POWER SYSTEMS IN CONDITIONS OF CASCADE FAILURE PROGRESSION
by: Bardyk, Ye., et al.
Published: (2023)
by: Bardyk, Ye., et al.
Published: (2023)
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems
by: Давидюк, А. В., et al.
Published: (2021)
by: Давидюк, А. В., et al.
Published: (2021)
A structural and analytical simulation and animation of technological processes in engineering complexes
by: Denisenko, A. V.
Published: (2016)
by: Denisenko, A. V.
Published: (2016)
Distributed Transactions Modeling with the Use of Petri Nets
by: Iwaniak, M., et al.
Published: (2012)
by: Iwaniak, M., et al.
Published: (2012)
Coloured Petri Net Model of Two-Phase Commit Protocol With Multiple Participants
by: Iwaniak, M., et al.
Published: (2013)
by: Iwaniak, M., et al.
Published: (2013)
Animation information technology of complex technical systems based on the discrete- continuous networks, FLASH-technology and means of DCNET
by: Denisenko, A. V.
Published: (2014)
by: Denisenko, A. V.
Published: (2014)
Model of two-component system with component deactivation by hidden failure control
by: Обжерин, Юрий Евгеньевич, et al.
Published: (2014)
by: Обжерин, Юрий Евгеньевич, et al.
Published: (2014)
Model of two-component system with component deactivation by hidden failure control
by: Обжерин, Юрий Евгеньевич, et al.
Published: (2014)
by: Обжерин, Юрий Евгеньевич, et al.
Published: (2014)
Mathematical modeling of transport and logistics infrastructure for the post-war reconstruction of Ukraine
by: Horoshkova, Lidiia A., et al.
Published: (2024)
by: Horoshkova, Lidiia A., et al.
Published: (2024)
Information technology of IT-infrastructure management architecture elements
by: Dovgiy, Stanislav O., et al.
Published: (2022)
by: Dovgiy, Stanislav O., et al.
Published: (2022)
Application of scenario approach in development of management decisions (A scenario of ship formation management)
by: Додонов, О. Г., et al.
Published: (2022)
by: Додонов, О. Г., et al.
Published: (2022)
Foggy computing and their mathematical modeling
by: Матов, О. Я.
Published: (2021)
by: Матов, О. Я.
Published: (2021)
An implicit numerical scheme for gas flow simulation in cascade of vibrating airfoils
by: Быков, Ю. А., et al.
Published: (2015)
by: Быков, Ю. А., et al.
Published: (2015)
An implicit numerical scheme for gas flow simulation in cascade of vibrating airfoils
by: Быков, Ю. А., et al.
Published: (2015)
by: Быков, Ю. А., et al.
Published: (2015)
Methodological basis of orthotransformed space images application for the environmental assessment and software of research
by: Lunova, Oksana, et al.
Published: (2019)
by: Lunova, Oksana, et al.
Published: (2019)
R-S correspondence for the Hyper-octahedral group of type \(B_n\) - A different approach
by: Parvathi, M., et al.
Published: (2018)
by: Parvathi, M., et al.
Published: (2018)
Armed conflict as an environmental risk factor at water supply facilities in еastern Ukraine (case study of “Voda Donbassa” utility company’s Siverskyi Donets – Donbas canal)
by: Buglak, Olexandra V., et al.
Published: (2019)
by: Buglak, Olexandra V., et al.
Published: (2019)
EVALUATION TECHNIQUE FOR THE F2 LAYER CRITICAL FREQUENCY BY THE DIFFERENCE OF IONOSPHERE ALFVEN RESONANCE EIGENFREQUENCIES
by: Baru, N. A., et al.
Published: (2014)
by: Baru, N. A., et al.
Published: (2014)
Calculation of the ecological and economic effect of collecting rainwater with «green» roofs
by: Kravchenko, Marina V., et al.
Published: (2024)
by: Kravchenko, Marina V., et al.
Published: (2024)
Problems compatibility of complex analytics of scenarios and theoretical basis of its solution
by: Сенченко , В. Р.
Published: (2021)
by: Сенченко , В. Р.
Published: (2021)
On classifying the non-Tits \(P\)-critical posets
by: Bondarenko, V. M., et al.
Published: (2022)
by: Bondarenko, V. M., et al.
Published: (2022)
Evaluation of the intensity of the external water exchange reservoirs of the Dnieper cascade in terms
by: Obukhov, E., et al.
Published: (2017)
by: Obukhov, E., et al.
Published: (2017)
Renewable energy sources for backup energy supply of small wastewater plants and individual households
by: Voloshkina, Olena S., et al.
Published: (2023)
by: Voloshkina, Olena S., et al.
Published: (2023)
Tiled orders over discrete valuation rings, finite Markov chains and partially ordered sets. I
by: Chernousova, Zh. T., et al.
Published: (2018)
by: Chernousova, Zh. T., et al.
Published: (2018)
Ontological approach to the description of the reservoir's passport
by: Tikhonov, Y.L.
Published: (2018)
by: Tikhonov, Y.L.
Published: (2018)
Diagnosis of inhomogeneous one-dimensional discrete chains by photon scattering
by: Gerasymov, Oleg I., et al.
Published: (2022)
by: Gerasymov, Oleg I., et al.
Published: (2022)
Numerical simulation of flow in a compressor cascade under wide range of flow conditions
by: Папазов, С. В., et al.
Published: (2014)
by: Папазов, С. В., et al.
Published: (2014)
Numerical simulation of flow in a compressor cascade under wide range of flow conditions
by: Папазов, С. В., et al.
Published: (2014)
by: Папазов, С. В., et al.
Published: (2014)
Decision on making support for road safety strategy building and urban transport infrastructure development
by: Tsyganok, V. V., et al.
Published: (2019)
by: Tsyganok, V. V., et al.
Published: (2019)
SIMULATION OF AN AC DRIVE SYSTEM COMPRISING A CASCADE MULTILEVEL VOLTAGE INVERTER
by: Zhemerov, George G., et al.
Published: (2013)
by: Zhemerov, George G., et al.
Published: (2013)
DETERMINING THE INTENSITY OF A POINT-LIKE SOURCE OBSERVED ON THE BACKGROUND OF AN EXTENDED SOURCE
by: Kornienko, Y. V., et al.
Published: (2015)
by: Kornienko, Y. V., et al.
Published: (2015)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
Similar Items
-
A methodology and architecture of the platform for modeling interdependencies in critical infrastructures when cascading effects occur
by: Сенченко, В. Р., et al.
Published: (2025) -
A review of methods and technologies for scenario analysis of cascading effects
by: Сенченко, В. Р., et al.
Published: (2024) -
Improving the security of critical infrastructures through automated organizational management systems
by: Додонов, О. Г., et al.
Published: (2022) -
Features of decision support in government situational centers to protect critical infrastructure
by: Гречанінов , В. Ф.
Published: (2021) -
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: Saliieva, O. V., et al.
Published: (2020)