Requirements for a Cyber Threat Taxonomy of Critical Infrastructure Objects and Analysis of Existing Approaches
Saved in:
| Date: | 2020 |
|---|---|
| Main Author: | Yu. Komarov |
| Format: | Article |
| Language: | English |
| Published: |
2020
|
| Series: | Electronic modeling |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0001128604 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
Cyber security of critical infrastructure during cyber warfare
by: Ya. S. Manuilov
Published: (2023)
by: Ya. S. Manuilov
Published: (2023)
Review of Cyberatakes on Objects of Critical Infrastructure
by: Yu. Komarov
Published: (2019)
by: Yu. Komarov
Published: (2019)
Evaluation of Risks of Cyber Security of Information Systemsof Objects of Critical Infrastructure
by: V. V. Mokhor, et al.
Published: (2019)
by: V. V. Mokhor, et al.
Published: (2019)
Complex approach for state critical information infrastructure cyber defence system constructing
by: I. P. Sinitsyn, et al.
Published: (2017)
by: I. P. Sinitsyn, et al.
Published: (2017)
Complex approach for state critical information infrastructure cyber defence system constructing
by: Synitsyn, I.P., et al.
Published: (2018)
by: Synitsyn, I.P., et al.
Published: (2018)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: O. V. Saliieva, et al.
Published: (2020)
by: O. V. Saliieva, et al.
Published: (2020)
Threat assessment mathematical model for potentially dangerous objects of critical infrastructure in the combat zone
by: Murasov, R.K., et al.
Published: (2023)
by: Murasov, R.K., et al.
Published: (2023)
Removal threats of providing heat of infrastructural objects
by: V. H. Demchenko
Published: (2017)
by: V. H. Demchenko
Published: (2017)
Combating cyber security threats on a global level
by: O. D. Dovhan, et al.
Published: (2020)
by: O. D. Dovhan, et al.
Published: (2020)
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: O. V. Saliieva, et al.
Published: (2020)
by: O. V. Saliieva, et al.
Published: (2020)
Current issues of cyber threat risk assessment: analysis of foreign experience
by: O. A. Panchenko
Published: (2021)
by: O. A. Panchenko
Published: (2021)
Analysis of scenarios of the use of unmanned aircraft against critical infrastructure objects
by: M. M. Diviziniuk, et al.
Published: (2024)
by: M. M. Diviziniuk, et al.
Published: (2024)
Information space and cyber space as a source of modern threats
by: A. B. Kachynskyi, et al.
Published: (2019)
by: A. B. Kachynskyi, et al.
Published: (2019)
Modeling the suitability of territories for the deployment of Ukraine's critical infrastructure in the face of military threats
by: Borovyk, Karolina, et al.
Published: (2024)
by: Borovyk, Karolina, et al.
Published: (2024)
Requirements for an ubiquitous computing infrastructure
by: Maffioletti, S.
Published: (2001)
by: Maffioletti, S.
Published: (2001)
Integration of Different Approaches to the Modeling of Critical Infrastructure
by: I. M. Oksanych, et al.
Published: (2024)
by: I. M. Oksanych, et al.
Published: (2024)
A network approach in the study of cascading effects critical infrastructures
by: Хоменко, О. М., et al.
Published: (2024)
by: Хоменко, О. М., et al.
Published: (2024)
Theoretical and methodological preconditions of categorisation of objects of critical infrastructure in credit and banking sphere
by: Yu. A. Ivanov
Published: (2019)
by: Yu. A. Ivanov
Published: (2019)
Rerspectives of use of existing infrastructure objects for the creation of new objects on the control of radioactive waste on ChNPP
by: O. V. Balan, et al.
Published: (2018)
by: O. V. Balan, et al.
Published: (2018)
Development of methodical support of antiterrorist protection of the objects of critical infrastructure (on the example of the USA)
by: B. D. Leonov, et al.
Published: (2020)
by: B. D. Leonov, et al.
Published: (2020)
Issue of Criminal Liability for Offences Against Critical Infrastructure Objects in Nuclear Industry
by: O. V. Taran, et al.
Published: (2019)
by: O. V. Taran, et al.
Published: (2019)
Domain engineering approach of software requirements analysis
by: O. V. Chebanyuk, et al.
Published: (2020)
by: O. V. Chebanyuk, et al.
Published: (2020)
Domain engineering approach of software requirements analysis
by: Chebanyuk, O.V., et al.
Published: (2020)
by: Chebanyuk, O.V., et al.
Published: (2020)
Some issues of improving state planning in the sphere of cyber security in conditions of hybrid threats
by: S. M. Hriboiedov
Published: (2021)
by: S. M. Hriboiedov
Published: (2021)
Taxonomy of Objects for Sustainable Financing for Risk Management System Simulation
by: A. A. Honta, et al.
Published: (2022)
by: A. A. Honta, et al.
Published: (2022)
Threat as an object of forensic
by: L. V. Azhniuk
Published: (2022)
by: L. V. Azhniuk
Published: (2022)
The cybersecurity modeling in critical infrastructures
by: H. Kravtsov, et al.
Published: (2015)
by: H. Kravtsov, et al.
Published: (2015)
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems
by: A. V. Davydiuk, et al.
Published: (2021)
by: A. V. Davydiuk, et al.
Published: (2021)
Protection of Critical infrastructure Objects of Ukraine against Direct Missile Hits Using Underground Structures
by: V. I. Kotsiuruba, et al.
Published: (2023)
by: V. I. Kotsiuruba, et al.
Published: (2023)
Terms of the Security-Oriented Enterprise Management in Response to Existing Threats
by: V. I. Prytys
Published: (2020)
by: V. I. Prytys
Published: (2020)
Comparative-morphological approaches to the taxonomy of the genus Anemone L. (Ranunculaceae)
by: S. M. Zyman, et al.
Published: (2013)
by: S. M. Zyman, et al.
Published: (2013)
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems
by: Давидюк, А. В., et al.
Published: (2021)
by: Давидюк, А. В., et al.
Published: (2021)
Transformations the minimum runoff of the Sluch River and their influence on Novohrad-Volynskyi reservoir as an object of local critical infrastructure
by: V. M. Korbutiak, et al.
Published: (2018)
by: V. M. Korbutiak, et al.
Published: (2018)
Agile requirement analysis approach using artificial intelligent technologies
by: Chebanyuk, O.V.
Published: (2024)
by: Chebanyuk, O.V.
Published: (2024)
Space as a Form of Existance of Material Objects
by: V. P. Shlapak
Published: (2014)
by: V. P. Shlapak
Published: (2014)
Business compliance support environmental requirements in a critical state of the environment of Donbass
by: V. I. Liashenko, et al.
Published: (2021)
by: V. I. Liashenko, et al.
Published: (2021)
A method of analysis of the shapes of X-ray diffraction lines not requiring a transition to the space of an object
by: N. M. Rozhenko, et al.
Published: (2019)
by: N. M. Rozhenko, et al.
Published: (2019)
Spatial Management of Sustainable Management in Critical Infrastructure in a Special Period
by: V. V. Mykytenko, et al.
Published: (2022)
by: V. V. Mykytenko, et al.
Published: (2022)
Similar Items
-
Cyber security of critical infrastructure during cyber warfare
by: Ya. S. Manuilov
Published: (2023) -
Review of Cyberatakes on Objects of Critical Infrastructure
by: Yu. Komarov
Published: (2019) -
Evaluation of Risks of Cyber Security of Information Systemsof Objects of Critical Infrastructure
by: V. V. Mokhor, et al.
Published: (2019) -
Complex approach for state critical information infrastructure cyber defence system constructing
by: I. P. Sinitsyn, et al.
Published: (2017) -
Complex approach for state critical information infrastructure cyber defence system constructing
by: Synitsyn, I.P., et al.
Published: (2018)