Cyber security graph model of information resources
Saved in:
| Date: | 2020 |
|---|---|
| Main Authors: | A. V. Nesterenko, I. E. Netesin |
| Format: | Article |
| Language: | English |
| Published: |
2020
|
| Series: | International Scientific Technical Journal «Problems of Control and Informatics» |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0001260178 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
The relationship between information security and cyber security
by: A. V. Tarasiuk
Published: (2019)
by: A. V. Tarasiuk
Published: (2019)
Features for providing of cyber security
by: Prysiazhniuk, M. M., et al.
Published: (2017)
by: Prysiazhniuk, M. M., et al.
Published: (2017)
Cyber security of critical infrastructure during cyber warfare
by: Ya. S. Manuilov
Published: (2023)
by: Ya. S. Manuilov
Published: (2023)
Features for providing of cyber security
by: M. M. Prysiazhniuk, et al.
Published: (2017)
by: M. M. Prysiazhniuk, et al.
Published: (2017)
Evaluation of Risks of Cyber Security of Information Systemsof Objects of Critical Infrastructure
by: V. V. Mokhor, et al.
Published: (2019)
by: V. V. Mokhor, et al.
Published: (2019)
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: I. O. Dohtieva, et al.
Published: (2021)
by: I. O. Dohtieva, et al.
Published: (2021)
Legal support of intellectual and value resource in the cyber-modern information capital system
by: Yu. P. Lisovska
Published: (2022)
by: Yu. P. Lisovska
Published: (2022)
Current US experience in cyber security
by: S. M. Stezhko, et al.
Published: (2021)
by: S. M. Stezhko, et al.
Published: (2021)
Overview of novels of domestic legislation in the field of cyber security (on the example of the Cyber Security Strategy of Ukraine for 2021 – 2025)
by: Ya. S. Manuilov
Published: (2021)
by: Ya. S. Manuilov
Published: (2021)
Advanced information technologies for the training of cyber defence specialists of the security and defence sector of Ukraine
by: O. M. Bashkyrov, et al.
Published: (2024)
by: O. M. Bashkyrov, et al.
Published: (2024)
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: Дьогтєва, І. О., et al.
Published: (2021)
by: Дьогтєва, І. О., et al.
Published: (2021)
Combating cyber security threats on a global level
by: O. D. Dovhan, et al.
Published: (2020)
by: O. D. Dovhan, et al.
Published: (2020)
Corporate cyber security culture for scientific and research institutions
by: O. D. Dovhan, et al.
Published: (2018)
by: O. D. Dovhan, et al.
Published: (2018)
Information in the natural cyber systems (to definition of the term information)
by: Ja. Reshetnik
Published: (2020)
by: Ja. Reshetnik
Published: (2020)
Securing Ukraine through Cyber Financial Crimes Mitigation
by: P. P. Debbins
Published: (2019)
by: P. P. Debbins
Published: (2019)
A mathematical model of cyber security computer network control in power supply of traction substations
by: O. I. Stasiuk, et al.
Published: (2017)
by: O. I. Stasiuk, et al.
Published: (2017)
Graph Model of Information-Psychological Warfare
by: Качинський, А. Б., et al.
Published: (2025)
by: Качинський, А. Б., et al.
Published: (2025)
Information protection by enhancing the effectiveness of counteracting cyber attacks
by: V. D. Havlovskyi
Published: (2019)
by: V. D. Havlovskyi
Published: (2019)
European experience of strengthening cyber security capacities in modern conditions
by: O. M. Kuznietsov
Published: (2021)
by: O. M. Kuznietsov
Published: (2021)
Information space and cyber space as a source of modern threats
by: A. B. Kachynskyi, et al.
Published: (2019)
by: A. B. Kachynskyi, et al.
Published: (2019)
Cyber socialization: information-technical, educational and legal aspects
by: O. Petriaiev
Published: (2020)
by: O. Petriaiev
Published: (2020)
Global culture of cyber security In the Syber Srime Rrevention System in Ukraine
by: O. D. Dovhan, et al.
Published: (2018)
by: O. D. Dovhan, et al.
Published: (2018)
Problems of legal regulation and development of cyber security of Ukraine at the current stage
by: O. V. Kostenko
Published: (2019)
by: O. V. Kostenko
Published: (2019)
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Zubok, V. Yu.
Published: (2020)
by: Zubok, V. Yu.
Published: (2020)
Cyber security as an important factor of ensuring the life of the domestic energy industry
by: S. M. Stezhko, et al.
Published: (2021)
by: S. M. Stezhko, et al.
Published: (2021)
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Yu. Zubok
Published: (2020)
by: Yu. Zubok
Published: (2020)
Information technology protection and cyber security (transcript of scientific report at the meeting of the Presidium of NAS of Ukraine, September 25, 2019)
by: M. M. Savchuk
Published: (2019)
by: M. M. Savchuk
Published: (2019)
The essence and content of the investigation of cyber incidents and cyberattacks by the Security Service of Ukraine units
by: M. V. Kuleshov
Published: (2019)
by: M. V. Kuleshov
Published: (2019)
Cyber-physical systems
by: A. A. Letichevskij, et al.
Published: (2017)
by: A. A. Letichevskij, et al.
Published: (2017)
The Use of Resource Allocation Problems in the Information Security Systems
by: N. O. Maslova
Published: (2017)
by: N. O. Maslova
Published: (2017)
Legal regulation of interaction between Security Service of Ukraine and a private sector in the field of providing cyber security
by: N. A. Tkachuk
Published: (2018)
by: N. A. Tkachuk
Published: (2018)
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems
by: A. V. Davydiuk, et al.
Published: (2021)
by: A. V. Davydiuk, et al.
Published: (2021)
Complex approach for state critical information infrastructure cyber defence system constructing
by: Synitsyn, I.P., et al.
Published: (2018)
by: Synitsyn, I.P., et al.
Published: (2018)
Social phenomenology of cyber-communication
by: E. Bataeva
Published: (2011)
by: E. Bataeva
Published: (2011)
About the concept of the organizational and technical model of cyber defense
by: Ya. S. Manilov
Published: (2021)
by: Ya. S. Manilov
Published: (2021)
Complex approach for state critical information infrastructure cyber defence system constructing
by: I. P. Sinitsyn, et al.
Published: (2017)
by: I. P. Sinitsyn, et al.
Published: (2017)
Some issues of improving state planning in the sphere of cyber security in conditions of hybrid threats
by: S. M. Hriboiedov
Published: (2021)
by: S. M. Hriboiedov
Published: (2021)
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems
by: Давидюк, А. В., et al.
Published: (2021)
by: Давидюк, А. В., et al.
Published: (2021)
Operational analytics as a data monitoring and event management tool of the cyber security management systems
by: A. B. Kachynskyi, et al.
Published: (2021)
by: A. B. Kachynskyi, et al.
Published: (2021)
Methods for assessing the cyber¬security of distributed computer networks of control of electricity consumption of power supply distances
by: A. I. Stasjuk, et al.
Published: (2017)
by: A. I. Stasjuk, et al.
Published: (2017)
Similar Items
-
The relationship between information security and cyber security
by: A. V. Tarasiuk
Published: (2019) -
Features for providing of cyber security
by: Prysiazhniuk, M. M., et al.
Published: (2017) -
Cyber security of critical infrastructure during cyber warfare
by: Ya. S. Manuilov
Published: (2023) -
Features for providing of cyber security
by: M. M. Prysiazhniuk, et al.
Published: (2017) -
Evaluation of Risks of Cyber Security of Information Systemsof Objects of Critical Infrastructure
by: V. V. Mokhor, et al.
Published: (2019)