Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
Saved in:
| Date: | 2020 |
|---|---|
| Main Authors: | O. V. Saliieva, Yu. Ye. Yaremchuk |
| Format: | Article |
| Language: | English |
| Published: |
2020
|
| Series: | Data recording, storage & processing |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0001153676 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: O. V. Saliieva, et al.
Published: (2020)
by: O. V. Saliieva, et al.
Published: (2020)
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: O. V. Saliieva, et al.
Published: (2019)
by: O. V. Saliieva, et al.
Published: (2019)
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019)
by: Saliieva, O. V., et al.
Published: (2019)
Threat assessment mathematical model for potentially dangerous objects of critical infrastructure in the combat zone
by: Murasov, R.K., et al.
Published: (2023)
by: Murasov, R.K., et al.
Published: (2023)
Requirements for a Cyber Threat Taxonomy of Critical Infrastructure Objects and Analysis of Existing Approaches
by: Yu. Komarov
Published: (2020)
by: Yu. Komarov
Published: (2020)
Identification of the content and ranking of the threats to the social security system
by: O. I. Iliash
Published: (2012)
by: O. I. Iliash
Published: (2012)
Identification of the content and ranking of the threats to the social security system
by: M. P. Drahun, et al.
Published: (2012)
by: M. P. Drahun, et al.
Published: (2012)
Evaluation of Risks of Cyber Security of Information Systemsof Objects of Critical Infrastructure
by: V. V. Mokhor, et al.
Published: (2019)
by: V. V. Mokhor, et al.
Published: (2019)
Removal threats of providing heat of infrastructural objects
by: V. H. Demchenko
Published: (2017)
by: V. H. Demchenko
Published: (2017)
Review of Cyberatakes on Objects of Critical Infrastructure
by: Yu. Komarov
Published: (2019)
by: Yu. Komarov
Published: (2019)
Objectability of rights providing by permissive documents and ownership`s theory
by: K. I. Apanasenko
Published: (2017)
by: K. I. Apanasenko
Published: (2017)
Modeling the suitability of territories for the deployment of Ukraine's critical infrastructure in the face of military threats
by: Borovyk, Karolina, et al.
Published: (2024)
by: Borovyk, Karolina, et al.
Published: (2024)
Demographic Security of Ukraine: Indicators, Level, Threats
by: O. A. Hrishnova, et al.
Published: (2019)
by: O. A. Hrishnova, et al.
Published: (2019)
Cyber security of critical infrastructure during cyber warfare
by: Ya. S. Manuilov
Published: (2023)
by: Ya. S. Manuilov
Published: (2023)
Combating cyber security threats on a global level
by: O. D. Dovhan, et al.
Published: (2020)
by: O. D. Dovhan, et al.
Published: (2020)
Methodology for Evaluating of Threats Influence on the Energy Security Level
by: O. M. Sukhodolia, et al.
Published: (2021)
by: O. M. Sukhodolia, et al.
Published: (2021)
Permissive legal relationships in the sphere of economic activity and other relationships of the permissible character
by: K. I. Apanasenko
Published: (2017)
by: K. I. Apanasenko
Published: (2017)
Analysis of scenarios of the use of unmanned aircraft against critical infrastructure objects
by: M. M. Diviziniuk, et al.
Published: (2024)
by: M. M. Diviziniuk, et al.
Published: (2024)
Formulating the Threats and Estimating the Level of Foreign Economic Security of Ukraine
by: V. S. Yakovenko, et al.
Published: (2018)
by: V. S. Yakovenko, et al.
Published: (2018)
The method of permissible basis matrices
by: V. I. Kudin
Published: (2014)
by: V. I. Kudin
Published: (2014)
Improving the security of critical infrastructures through automated organizational management systems
by: Додонов, О. Г., et al.
Published: (2022)
by: Додонов, О. Г., et al.
Published: (2022)
Improving the security of critical infrastructures through automated organizational management systems
by: O. H. Dodonov, et al.
Published: (2022)
by: O. H. Dodonov, et al.
Published: (2022)
The Essence of the Concept of "Critical Infrastructure” From the Standpoint of National Security of Ukraine
by: M. O. Kyzym, et al.
Published: (2022)
by: M. O. Kyzym, et al.
Published: (2022)
Development of methodical support of antiterrorist protection of the objects of critical infrastructure (on the example of the USA)
by: B. D. Leonov, et al.
Published: (2020)
by: B. D. Leonov, et al.
Published: (2020)
Theoretical and methodological preconditions of categorisation of objects of critical infrastructure in credit and banking sphere
by: Yu. A. Ivanov
Published: (2019)
by: Yu. A. Ivanov
Published: (2019)
Issue of Criminal Liability for Offences Against Critical Infrastructure Objects in Nuclear Industry
by: O. V. Taran, et al.
Published: (2019)
by: O. V. Taran, et al.
Published: (2019)
Quality of life in the system of social security of Ukraine: indicators, level, threats
by: Ju. M. Kharazishvili, et al.
Published: (2018)
by: Ju. M. Kharazishvili, et al.
Published: (2018)
Quality of life in the system of social security of Ukraine: indicators, level, threats
by: Yu. M. Kharazishvili, et al.
Published: (2018)
by: Yu. M. Kharazishvili, et al.
Published: (2018)
Determination of the maximum permissible cooling rate of railway wheel rims to form a homogeneous structure
by: O. I. Babachenko, et al.
Published: (2020)
by: O. I. Babachenko, et al.
Published: (2020)
Threat as an object of forensic
by: L. V. Azhniuk
Published: (2022)
by: L. V. Azhniuk
Published: (2022)
The cybersecurity modeling in critical infrastructures
by: H. Kravtsov, et al.
Published: (2015)
by: H. Kravtsov, et al.
Published: (2015)
The Weighted Aggregation of Ranked Objects by the Arbitrary Totality of Other Objects
by: V. M. Moskovkin, et al.
Published: (2018)
by: V. M. Moskovkin, et al.
Published: (2018)
Reduction of third order matrices over Bezout ring of stable rank 2
by: A. I. Hatalevych
Published: (2012)
by: A. I. Hatalevych
Published: (2012)
Protection of Critical infrastructure Objects of Ukraine against Direct Missile Hits Using Underground Structures
by: V. I. Kotsiuruba, et al.
Published: (2023)
by: V. I. Kotsiuruba, et al.
Published: (2023)
The Level of Health and the Factors Influencing the Position of Region on this Indicator in the Rankings
by: Ye. Letunovska
Published: (2021)
by: Ye. Letunovska
Published: (2021)
On the issue of determining critical levels for the stability losses in composite materials
by: S. I. Skipochka, et al.
Published: (2013)
by: S. I. Skipochka, et al.
Published: (2013)
Current state of criminal protection of the critical infrastructure facilities
by: Ye. Kucheryna, et al.
Published: (2021)
by: Ye. Kucheryna, et al.
Published: (2021)
Information threats and security services
by: Antonyuk, A.A., et al.
Published: (2015)
by: Antonyuk, A.A., et al.
Published: (2015)
Similar Items
-
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020) -
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: O. V. Saliieva, et al.
Published: (2020) -
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: Saliieva, O. V., et al.
Published: (2020) -
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: O. V. Saliieva, et al.
Published: (2019) -
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019)