Using Bayesian network models for early assessment of cyberattack threats to electricity generation facility
Recent trends in Ukraine and worldwide show a sharp increase in cyber incidents and cyber-attacks targeting modern critical infrastructure, particularly in the energy sector. That is why ensuring the cyber resilience of energy distribution systems has become particularly relevant. This study present...
Saved in:
| Date: | 2025 |
|---|---|
| Main Authors: | Гальчинський, Л. Ю., Личик, В. В. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2025
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/345591 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Neural and Bayesian networks in the problem of credit risk analysis
by: Kuznietsova, N. V., et al.
Published: (2015)
by: Kuznietsova, N. V., et al.
Published: (2015)
A network approach in the study of cascading effects critical infrastructures
by: Хоменко, О. М., et al.
Published: (2024)
by: Хоменко, О. М., et al.
Published: (2024)
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: Дьогтєва, І. О., et al.
Published: (2021)
by: Дьогтєва, І. О., et al.
Published: (2021)
Visibility Graph as a Tool for the Network Analysis of Measurement Series
by: Snarskii, A. A., et al.
Published: (2013)
by: Snarskii, A. A., et al.
Published: (2013)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
Building of Networks of Natural Hierarchies of Terms Based on Analysis of Texts Corpora
by: Lande, D. V., et al.
Published: (2014)
by: Lande, D. V., et al.
Published: (2014)
Improvement of cereal harvest programming methods using computer simulation information technology
by: Terentiev, Oleksandr M., et al.
Published: (2023)
by: Terentiev, Oleksandr M., et al.
Published: (2023)
Visual support of optimal decisions in spatial networks
by: Dodonov, A. G., et al.
Published: (2017)
by: Dodonov, A. G., et al.
Published: (2017)
Determining the weights of links in networks of terms
by: Lande, D. V., et al.
Published: (2019)
by: Lande, D. V., et al.
Published: (2019)
Investigation of the factors of informal communication inside social networks for identification of agents carrying privacy threats
by: Nikiforova, L. A., et al.
Published: (2016)
by: Nikiforova, L. A., et al.
Published: (2016)
Automation of standardized cyber insurance processes
by: Khudyntsev, Mykola, et al.
Published: (2025)
by: Khudyntsev, Mykola, et al.
Published: (2025)
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019)
by: Saliieva, O. V., et al.
Published: (2019)
Usage of intellectual analysis of ecological-economic data in the pension insurance system and for forecasting expenditures on social protection and social security
by: Zarudnii, Oleksii B.
Published: (2024)
by: Zarudnii, Oleksii B.
Published: (2024)
Research of network relaxation time as a charac-teristic of network nodes.
by: Lande, D. V., et al.
Published: (2019)
by: Lande, D. V., et al.
Published: (2019)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
Restoring Links in Scale-Free Networks
by: Nechaev, O., et al.
Published: (2012)
by: Nechaev, O., et al.
Published: (2012)
SPRING SEARCH ALGORITHM FOR SIMULTANEOUS PLACEMENT OF DISTRIBUTED GENERATION AND CAPACITORS
by: Dehghani, M., et al.
Published: (2018)
by: Dehghani, M., et al.
Published: (2018)
Features for providing of cyber security
by: Prysiazhniuk, M. M., et al.
Published: (2017)
by: Prysiazhniuk, M. M., et al.
Published: (2017)
A quantitative assessment of the network structures functional resilience by analyzing of the sensitivity of an optimization model
by: Додонов, О. Г., et al.
Published: (2024)
by: Додонов, О. Г., et al.
Published: (2024)
Automatic construction of terminological network as a domain model
by: Lande, D. V., et al.
Published: (2015)
by: Lande, D. V., et al.
Published: (2015)
A generalized methodology of sign language recognition on video streams based on neural networks and transformers
by: Кузнєцова, Н. В., et al.
Published: (2023)
by: Кузнєцова, Н. В., et al.
Published: (2023)
Clustering with Kohonen Neural Network and Modified Hierarchical Algorithm Chameleon in Various Subject Areas
by: Ляховець, А. В.
Published: (2013)
by: Ляховець, А. В.
Published: (2013)
Modeling and visualizing maximum multi-product flows in the networks
by: Dodonov, E. О., et al.
Published: (2018)
by: Dodonov, E. О., et al.
Published: (2018)
Improvement of protection for WEB resources from attacks based on combined heuristic and statistical approach
by: Prysiazhnyi, D. P.
Published: (2016)
by: Prysiazhnyi, D. P.
Published: (2016)
ANALYSIS OF THE IMPACT OF DISTRIBUTED GENERATION ON NETWORK OPERATING PARAMETERS
by: Samkov , O., et al.
Published: (2025)
by: Samkov , O., et al.
Published: (2025)
Networks determined by dynamics of thematic information flows
by: Lande, D. V., et al.
Published: (2020)
by: Lande, D. V., et al.
Published: (2020)
Research of functioning processes of wireless sensor networks
by: Semko, Viktor V., et al.
Published: (2021)
by: Semko, Viktor V., et al.
Published: (2021)
A method of formation and clusterization of correlation networks of concepts
by: Ланде, Д. В., et al.
Published: (2021)
by: Ланде, Д. В., et al.
Published: (2021)
EVOLUTION OF WIRELESS (CELLULAR) COMMUNICATION NETWORKS
by: Chernogor, L. F., et al.
Published: (2025)
by: Chernogor, L. F., et al.
Published: (2025)
20 kV NOMINAL VOLTAGE ELECTRICAL NETWORKS WITH ENERGY STORAGE SOURCES
by: Iskova, M. S., et al.
Published: (2023)
by: Iskova, M. S., et al.
Published: (2023)
Complex networks with modified rule of preferred connection
by: Snarsky, A. A., et al.
Published: (2015)
by: Snarsky, A. A., et al.
Published: (2015)
Cyber Resilience Key Metrics in Small and Medium-Sized Enterprises
by: Deruma, Sintija
Published: (2025)
by: Deruma, Sintija
Published: (2025)
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021)
by: Шиян, А. А., et al.
Published: (2021)
JUSTIFICATION OF THE NEW EXPLORATORY TECHNOLOGY AND ITS ADAPTATION TO THE CONVENTIONAL AND UNCONVENTIONAL OIL AND GAS FACILITIES OF IMPACT STRUCTURES OF UKRAINE
by: Bagriy, I.D.
Published: (2015)
by: Bagriy, I.D.
Published: (2015)
Diagnostic Model Synthesis Based on Neuro-Fuzzy Network with High Generalization Prop-erties
by: Subbotin, S. A.
Published: (2012)
by: Subbotin, S. A.
Published: (2012)
Elements of the structural models of devices approximation problems for identification and control of parameters of facilities management
by: Жиленков, А. А., et al.
Published: (2013)
by: Жиленков, А. А., et al.
Published: (2013)
Elements of the structural models of devices approximation problems for identification and control of parameters of facilities management
by: Жиленков, А. А., et al.
Published: (2013)
by: Жиленков, А. А., et al.
Published: (2013)
Graphical data aggregation and analysis in dedicated mobile device networks.
by: Pogorilyy, S. D., et al.
Published: (2019)
by: Pogorilyy, S. D., et al.
Published: (2019)
Environmental and operational safety of tailing storage facilities: analysis of accidents, causes and technical state diagnostic methods
by: Rudakov, Leonid M.
Published: (2023)
by: Rudakov, Leonid M.
Published: (2023)
Information-Technology Approach to Complex Substantiation of Requirements for Automated Systems
by: Самохвалов, Ю. Я., et al.
Published: (2012)
by: Самохвалов, Ю. Я., et al.
Published: (2012)
Similar Items
-
Neural and Bayesian networks in the problem of credit risk analysis
by: Kuznietsova, N. V., et al.
Published: (2015) -
A network approach in the study of cascading effects critical infrastructures
by: Хоменко, О. М., et al.
Published: (2024) -
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: Дьогтєва, І. О., et al.
Published: (2021) -
Visibility Graph as a Tool for the Network Analysis of Measurement Series
by: Snarskii, A. A., et al.
Published: (2013) -
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)