Using Bayesian network models for early assessment of cyberattack threats to electricity generation facility
Recent trends in Ukraine and worldwide show a sharp increase in cyber incidents and cyber-attacks targeting modern critical infrastructure, particularly in the energy sector. That is why ensuring the cyber resilience of energy distribution systems has become particularly relevant. This study present...
Saved in:
| Date: | 2025 |
|---|---|
| Main Authors: | Гальчинський, Л. Ю., Личик, В. В. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2025
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/345591 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Modeling technology based on fuzzy object-oriented Bayesian belief networks
by: Yershov, S.V., et al.
Published: (2018)
by: Yershov, S.V., et al.
Published: (2018)
Neural and Bayesian networks in the problem of credit risk analysis
by: Kuznietsova, N. V., et al.
Published: (2015)
by: Kuznietsova, N. V., et al.
Published: (2015)
Game-theoretic approach to the network security problem
by: Ignatenko, O.P.
Published: (2018)
by: Ignatenko, O.P.
Published: (2018)
Visibility Graph as a Tool for the Network Analysis of Measurement Series
by: Snarskii, A. A., et al.
Published: (2013)
by: Snarskii, A. A., et al.
Published: (2013)
A network approach in the study of cascading effects critical infrastructures
by: Хоменко, О. М., et al.
Published: (2024)
by: Хоменко, О. М., et al.
Published: (2024)
Building of Networks of Natural Hierarchies of Terms Based on Analysis of Texts Corpora
by: Lande, D. V., et al.
Published: (2014)
by: Lande, D. V., et al.
Published: (2014)
Optimization of the central thermal supply system as decision for the nonlinear network transporting problem
by: Levchuk A.P., et al.
Published: (2008)
by: Levchuk A.P., et al.
Published: (2008)
Visual support of optimal decisions in spatial networks
by: Dodonov, A. G., et al.
Published: (2017)
by: Dodonov, A. G., et al.
Published: (2017)
Method of detection of http attacks on a smart home using the algebraic matching method
by: Gorbatiuk, V.O., et al.
Published: (2023)
by: Gorbatiuk, V.O., et al.
Published: (2023)
ANALYSIS OF THE IMPACT OF DISTRIBUTED GENERATION ON NETWORK OPERATING PARAMETERS
by: Samkov , O., et al.
Published: (2025)
by: Samkov , O., et al.
Published: (2025)
Determining the weights of links in networks of terms
by: Lande, D. V., et al.
Published: (2019)
by: Lande, D. V., et al.
Published: (2019)
Improvement of cereal harvest programming methods using computer simulation information technology
by: Terentiev, Oleksandr M., et al.
Published: (2023)
by: Terentiev, Oleksandr M., et al.
Published: (2023)
Complex approach for state critical information infrastructure cyber defence system constructing
by: Synitsyn, I.P., et al.
Published: (2018)
by: Synitsyn, I.P., et al.
Published: (2018)
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: Дьогтєва, І. О., et al.
Published: (2021)
by: Дьогтєва, І. О., et al.
Published: (2021)
Restoring Links in Scale-Free Networks
by: Nechaev, O., et al.
Published: (2012)
by: Nechaev, O., et al.
Published: (2012)
Investigation of the factors of informal communication inside social networks for identification of agents carrying privacy threats
by: Nikiforova, L. A., et al.
Published: (2016)
by: Nikiforova, L. A., et al.
Published: (2016)
Research of network relaxation time as a charac-teristic of network nodes.
by: Lande, D. V., et al.
Published: (2019)
by: Lande, D. V., et al.
Published: (2019)
Automation of standardized cyber insurance processes
by: Khudyntsev, Mykola, et al.
Published: (2025)
by: Khudyntsev, Mykola, et al.
Published: (2025)
SPRING SEARCH ALGORITHM FOR SIMULTANEOUS PLACEMENT OF DISTRIBUTED GENERATION AND CAPACITORS
by: Dehghani, M., et al.
Published: (2018)
by: Dehghani, M., et al.
Published: (2018)
Game theoretic modeling of AIMD network equilibrium
by: Ignatenko, O.P.
Published: (2018)
by: Ignatenko, O.P.
Published: (2018)
Automatic construction of terminological network as a domain model
by: Lande, D. V., et al.
Published: (2015)
by: Lande, D. V., et al.
Published: (2015)
Problems and prospects of the artificial neuron networks using in energy
by: Voronovskiy G.K., et al.
Published: (2006)
by: Voronovskiy G.K., et al.
Published: (2006)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
A generalized methodology of sign language recognition on video streams based on neural networks and transformers
by: Кузнєцова, Н. В., et al.
Published: (2023)
by: Кузнєцова, Н. В., et al.
Published: (2023)
Modeling and visualizing maximum multi-product flows in the networks
by: Dodonov, E. О., et al.
Published: (2018)
by: Dodonov, E. О., et al.
Published: (2018)
An evaluation of task performance capabilities in a network-centric system with neural networks usage
by: Бойченко, А. В., et al.
Published: (2025)
by: Бойченко, А. В., et al.
Published: (2025)
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019)
by: Saliieva, O. V., et al.
Published: (2019)
New application of artificial neural network-based direct power control for permanent magnet synchronous generator
by: Akkouchi, K., et al.
Published: (2021)
by: Akkouchi, K., et al.
Published: (2021)
Recurrent neural network model for music generation
by: Komarskiy, O.C., et al.
Published: (2022)
by: Komarskiy, O.C., et al.
Published: (2022)
Research of functioning processes of wireless sensor networks
by: Semko, Viktor V., et al.
Published: (2021)
by: Semko, Viktor V., et al.
Published: (2021)
Networks determined by dynamics of thematic information flows
by: Lande, D. V., et al.
Published: (2020)
by: Lande, D. V., et al.
Published: (2020)
A method of formation and clusterization of correlation networks of concepts
by: Ланде, Д. В., et al.
Published: (2021)
by: Ланде, Д. В., et al.
Published: (2021)
Features for providing of cyber security
by: Prysiazhniuk, M. M., et al.
Published: (2017)
by: Prysiazhniuk, M. M., et al.
Published: (2017)
Information technology to ensure the survivability of sensor networks
by: Petrivskyi, V.Y., et al.
Published: (2022)
by: Petrivskyi, V.Y., et al.
Published: (2022)
Method for political propaganda detection in internet content using neural network natural language processing tools
by: Krak, Iu.V., et al.
Published: (2024)
by: Krak, Iu.V., et al.
Published: (2024)
Diagnostic Model Synthesis Based on Neuro-Fuzzy Network with High Generalization Prop-erties
by: Subbotin, S. A.
Published: (2012)
by: Subbotin, S. A.
Published: (2012)
20 kV NOMINAL VOLTAGE ELECTRICAL NETWORKS WITH ENERGY STORAGE SOURCES
by: Iskova, M. S., et al.
Published: (2023)
by: Iskova, M. S., et al.
Published: (2023)
Complex networks with modified rule of preferred connection
by: Snarsky, A. A., et al.
Published: (2015)
by: Snarsky, A. A., et al.
Published: (2015)
EVOLUTION OF WIRELESS (CELLULAR) COMMUNICATION NETWORKS
by: Chernogor, L. F., et al.
Published: (2025)
by: Chernogor, L. F., et al.
Published: (2025)
On evaluation of technological electric power losses in distributive power networks for forming tariffs, discriminated for different time ranges of 24-hour electric power load period
by: Zagurskyi V.G., et al.
Published: (2001)
by: Zagurskyi V.G., et al.
Published: (2001)
Similar Items
-
Modeling technology based on fuzzy object-oriented Bayesian belief networks
by: Yershov, S.V., et al.
Published: (2018) -
Neural and Bayesian networks in the problem of credit risk analysis
by: Kuznietsova, N. V., et al.
Published: (2015) -
Game-theoretic approach to the network security problem
by: Ignatenko, O.P.
Published: (2018) -
Visibility Graph as a Tool for the Network Analysis of Measurement Series
by: Snarskii, A. A., et al.
Published: (2013) -
A network approach in the study of cascading effects critical infrastructures
by: Хоменко, О. М., et al.
Published: (2024)