Integration of Different Approaches to the Modeling of Critical Infrastructure
Saved in:
| Date: | 2024 |
|---|---|
| Main Authors: | I. M. Oksanych, V. F. Grechaninov, A. V. Lopushanskyi, S. E. Novgorodskij, V. F. Holovskyi |
| Format: | Article |
| Language: | English |
| Published: |
2024
|
| Series: | Control Systems and Computers |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0001498677 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
The cybersecurity modeling in critical infrastructures
by: Kravtsov, H., et al.
Published: (2015)
by: Kravtsov, H., et al.
Published: (2015)
The cybersecurity modeling in critical infrastructures
by: H. Kravtsov, et al.
Published: (2015)
by: H. Kravtsov, et al.
Published: (2015)
Use of Cloud Technologies to Solve Issues of Information Integration in Multi-Level Management Systems
by: V. F. Hrechaninov, et al.
Published: (2022)
by: V. F. Hrechaninov, et al.
Published: (2022)
Models of the optimal resources allocation for the critical infrastructure protection
by: V. I. Norkin, et al.
Published: (2018)
by: V. I. Norkin, et al.
Published: (2018)
A network approach in the study of cascading effects critical infrastructures
by: Хоменко, О. М., et al.
Published: (2024)
by: Хоменко, О. М., et al.
Published: (2024)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
Complex approach for state critical information infrastructure cyber defence system constructing
by: Synitsyn, I.P., et al.
Published: (2018)
by: Synitsyn, I.P., et al.
Published: (2018)
Complex approach for state critical information infrastructure cyber defence system constructing
by: I. P. Sinitsyn, et al.
Published: (2017)
by: I. P. Sinitsyn, et al.
Published: (2017)
Methods for the total risk assessment of cybersecurity of critical infrastructure facilities
by: V. V. Mokhor, et al.
Published: (2019)
by: V. V. Mokhor, et al.
Published: (2019)
Features of decision support in government situational centers to protect critical infrastructure
by: V. F. Hrechaninov
Published: (2021)
by: V. F. Hrechaninov
Published: (2021)
Economic support of the organization and functioning of critical infrastructure
by: N. V. Trushkina, et al.
Published: (2024)
by: N. V. Trushkina, et al.
Published: (2024)
Evaluation of Risks of Cyber Security of Information Systemsof Objects of Critical Infrastructure
by: V. V. Mokhor, et al.
Published: (2019)
by: V. V. Mokhor, et al.
Published: (2019)
Risks of the Country's Critical Infrastructure
by: S. V. Mahdysiuk
Published: (2024)
by: S. V. Mahdysiuk
Published: (2024)
Review of Cyberatakes on Objects of Critical Infrastructure
by: Yu. Komarov
Published: (2019)
by: Yu. Komarov
Published: (2019)
Requirements for a Cyber Threat Taxonomy of Critical Infrastructure Objects and Analysis of Existing Approaches
by: Yu. Komarov
Published: (2020)
by: Yu. Komarov
Published: (2020)
Threat assessment mathematical model for potentially dangerous objects of critical infrastructure in the combat zone
by: Murasov, R.K., et al.
Published: (2023)
by: Murasov, R.K., et al.
Published: (2023)
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: O. V. Saliieva, et al.
Published: (2020)
by: O. V. Saliieva, et al.
Published: (2020)
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Modeling the suitability of territories for the deployment of Ukraine's critical infrastructure in the face of military threats
by: Borovyk, Karolina, et al.
Published: (2024)
by: Borovyk, Karolina, et al.
Published: (2024)
Resources Distribution Model of Critical IT Infrastructure with Clear Parameters Based on the Particle Swarm Algorithm
by: Ya. Yu. Dorohyi, et al.
Published: (2019)
by: Ya. Yu. Dorohyi, et al.
Published: (2019)
Monitoring the Effectiveness of Sustainable Management in Critical Infrastructure: Substantiation of Costs
by: V. V. Mykytenko, et al.
Published: (2022)
by: V. V. Mykytenko, et al.
Published: (2022)
The main stages of innovative research to ensure the safety of critical infrastructure facilities
by: M. M. Diviziniuk, et al.
Published: (2024)
by: M. M. Diviziniuk, et al.
Published: (2024)
Analysis of scenarios of the use of unmanned aircraft against critical infrastructure objects
by: M. M. Diviziniuk, et al.
Published: (2024)
by: M. M. Diviziniuk, et al.
Published: (2024)
Current state of criminal protection of the critical infrastructure facilities
by: Ye. Kucheryna, et al.
Published: (2021)
by: Ye. Kucheryna, et al.
Published: (2021)
Cyber security of critical infrastructure during cyber warfare
by: Ya. S. Manuilov
Published: (2023)
by: Ya. S. Manuilov
Published: (2023)
Integrating Ukraine into European grid infrastructure
by: Zagorodny, A., et al.
Published: (2009)
by: Zagorodny, A., et al.
Published: (2009)
Spatial Management of Sustainable Management in Critical Infrastructure in a Special Period
by: V. V. Mykytenko, et al.
Published: (2022)
by: V. V. Mykytenko, et al.
Published: (2022)
A methodology and architecture of the platform for modeling interdependencies in critical infrastructures when cascading effects occur
by: Сенченко, В. Р., et al.
Published: (2025)
by: Сенченко, В. Р., et al.
Published: (2025)
On an approach to the problems of water capacity and flooding modeling for different terrains
by: F. N. Gorin, et al.
Published: (2016)
by: F. N. Gorin, et al.
Published: (2016)
Administrative and legal protection of critical information infrastructure in cyberspace modern
by: Yu. P. Lisovska
Published: (2019)
by: Yu. P. Lisovska
Published: (2019)
Legal and organizational provision of protection of the critical information infrastructure from cyberattacks
by: S. M. Tsiapa
Published: (2021)
by: S. M. Tsiapa
Published: (2021)
Development of methodical support of antiterrorist protection of the objects of critical infrastructure (on the example of the USA)
by: B. D. Leonov, et al.
Published: (2020)
by: B. D. Leonov, et al.
Published: (2020)
Improving the security of critical infrastructures through automated organizational management systems
by: O. H. Dodonov, et al.
Published: (2022)
by: O. H. Dodonov, et al.
Published: (2022)
Issue of Criminal Liability for Offences Against Critical Infrastructure Objects in Nuclear Industry
by: O. V. Taran, et al.
Published: (2019)
by: O. V. Taran, et al.
Published: (2019)
Infrastructure FOR XML-models transformation
by: Glybovets, M.M., et al.
Published: (2025)
by: Glybovets, M.M., et al.
Published: (2025)
Applying System Approach to the Studying Agricultural Infrastructure
by: A. V. Tarasenko, et al.
Published: (2016)
by: A. V. Tarasenko, et al.
Published: (2016)
The Role of Public-Private Partnership in the Development of Critical Infrastructure to Achieve the Sustainable Development Goals in Ukraine
by: I. H. Lukianenko, et al.
Published: (2020)
by: I. H. Lukianenko, et al.
Published: (2020)
Features of decision support in government situational centers to protect critical infrastructure
by: Гречанінов , В. Ф.
Published: (2021)
by: Гречанінов , В. Ф.
Published: (2021)
Improving the security of critical infrastructures through automated organizational management systems
by: Додонов, О. Г., et al.
Published: (2022)
by: Додонов, О. Г., et al.
Published: (2022)
The Essence of the Concept of "Critical Infrastructure” From the Standpoint of National Security of Ukraine
by: M. O. Kyzym, et al.
Published: (2022)
by: M. O. Kyzym, et al.
Published: (2022)
Similar Items
-
The cybersecurity modeling in critical infrastructures
by: Kravtsov, H., et al.
Published: (2015) -
The cybersecurity modeling in critical infrastructures
by: H. Kravtsov, et al.
Published: (2015) -
Use of Cloud Technologies to Solve Issues of Information Integration in Multi-Level Management Systems
by: V. F. Hrechaninov, et al.
Published: (2022) -
Models of the optimal resources allocation for the critical infrastructure protection
by: V. I. Norkin, et al.
Published: (2018) -
A network approach in the study of cascading effects critical infrastructures
by: Хоменко, О. М., et al.
Published: (2024)