A combination of traditional methods and a metric approach to assessing the risks from cyber attacks to global routing
Saved in:
| Date: | 2019 |
|---|---|
| Main Author: | Yu. Zubok |
| Format: | Article |
| Language: | English |
| Published: |
2019
|
| Series: | Data recording, storage & processing |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0001025816 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
A combination of traditional methods and a metric approach to assessing the risks from cyber attacks to global routing.
by: Zubok, V. Yu.
Published: (2019)
by: Zubok, V. Yu.
Published: (2019)
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Yu. Zubok
Published: (2020)
by: Yu. Zubok
Published: (2020)
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Zubok, V. Yu.
Published: (2020)
by: Zubok, V. Yu.
Published: (2020)
Global Internet Routing Cyberattacks Risk Assessment
by: Yu. Zubok
Published: (2019)
by: Yu. Zubok
Published: (2019)
New metrics for assessment the risks of the Internet route hijack cyberattacs
by: Yu. Zubok
Published: (2020)
by: Yu. Zubok
Published: (2020)
Features of the Model of the Offender at the Analysis of Attacks on Global Internet Routing
by: Yu. Zubok
Published: (2019)
by: Yu. Zubok
Published: (2019)
A formal description of the internet global routing objects and processes for global routing cyberattacs impact assessment
by: Yu. Zubok
Published: (2019)
by: Yu. Zubok
Published: (2019)
Construction and Visualization of a New Risk-oriented Model of Global Routing in the Internet
by: Yu. Zubok
Published: (2020)
by: Yu. Zubok
Published: (2020)
А formal description of the internet global routing objects and processes for global routing cyberattacs impact assessment
by: Zubok, V. Yu.
Published: (2019)
by: Zubok, V. Yu.
Published: (2019)
Risk factor analysis of an example of an incident with global routing registry software
by: Yu. Zubok
Published: (2020)
by: Yu. Zubok
Published: (2020)
Risk factor analysis of an example of an incident with global routing registry software
by: Zubok, V. Yu.
Published: (2020)
by: Zubok, V. Yu.
Published: (2020)
Determining the ways of counteraction to cyberattacks on the internet global routing
by: Yu. Zubok
Published: (2018)
by: Yu. Zubok
Published: (2018)
Information protection by enhancing the effectiveness of counteracting cyber attacks
by: V. D. Havlovskyi
Published: (2019)
by: V. D. Havlovskyi
Published: (2019)
Organizational and legal framework for addressing cyber attacks in the European Union
by: S. H. Petrov
Published: (2020)
by: S. H. Petrov
Published: (2020)
Formation of the topological space of the Internet by the global routing system
by: Yu. Zubok, et al.
Published: (2021)
by: Yu. Zubok, et al.
Published: (2021)
Simulation and Visualization of Cyber Attacks in the Energy Sector Using Computer Distributed Training Systems
by: V. A. Gureev, et al.
Published: (2019)
by: V. A. Gureev, et al.
Published: (2019)
Current issues of cyber threat risk assessment: analysis of foreign experience
by: O. A. Panchenko
Published: (2021)
by: O. A. Panchenko
Published: (2021)
Combating cyber security threats on a global level
by: O. D. Dovhan, et al.
Published: (2020)
by: O. D. Dovhan, et al.
Published: (2020)
Improvement of protection for WEB resources from attacks based on combined heuristic and statistical approach
by: Prysiazhnyi, D. P.
Published: (2016)
by: Prysiazhnyi, D. P.
Published: (2016)
Traditional Culture in Ukrainian Tourist Routes
by: I. Shcherbak
Published: (2011)
by: I. Shcherbak
Published: (2011)
Systematizing metrics, methods and approaches to assess the economic security of the enterprise
by: B. S. Dub
Published: (2019)
by: B. S. Dub
Published: (2019)
Cyber Resilience Key Metrics in Small and Medium-Sized Enterprises
by: Deruma, Sintija
Published: (2025)
by: Deruma, Sintija
Published: (2025)
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: Дьогтєва, І. О., et al.
Published: (2021)
by: Дьогтєва, І. О., et al.
Published: (2021)
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: I. O. Dohtieva, et al.
Published: (2021)
by: I. O. Dohtieva, et al.
Published: (2021)
Global Attacks on Decentralized Systems Built on Peer-to-peer Networks
by: P. I. Stetsenko
Published: (2017)
by: P. I. Stetsenko
Published: (2017)
A novel approach to the assessment of the stability and the risks of losses in ecosystems
by: Ya. P. Didukh
Published: (2014)
by: Ya. P. Didukh
Published: (2014)
Method of detection of http attacks on a smart home using the algebraic matching method
by: Gorbatiuk, V.O., et al.
Published: (2023)
by: Gorbatiuk, V.O., et al.
Published: (2023)
Method of detection of http attacks on a smart home using the algebraic matching method
by: Gorbatiuk, V.O., et al.
Published: (2022)
by: Gorbatiuk, V.O., et al.
Published: (2022)
Neurosymbolic approach for attack detection in satellite communication systems
by: Mostovyi, O.S.
Published: (2024)
by: Mostovyi, O.S.
Published: (2024)
The Methodical Approach to Risk Assessment in the Development and Implementation of Venture Project
by: I. V. Hontareva, et al.
Published: (2018)
by: I. V. Hontareva, et al.
Published: (2018)
A method of risk assessment in defense planning tasks
by: Нестеренко, О. В., et al.
Published: (2021)
by: Нестеренко, О. В., et al.
Published: (2021)
A method of risk assessment in defense planning tasks
by: O. V. Nesterenko, et al.
Published: (2021)
by: O. V. Nesterenko, et al.
Published: (2021)
Methods for Shecking the Resistance to http-Attacks on a Smart Home by Algebraic Comparison
by: V. O. Horbatiuk, et al.
Published: (2022)
by: V. O. Horbatiuk, et al.
Published: (2022)
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems
by: A. V. Davydiuk, et al.
Published: (2021)
by: A. V. Davydiuk, et al.
Published: (2021)
Legal problems of insurance protection against cyber risks in space activities
by: N. D. Krasilich
Published: (2021)
by: N. D. Krasilich
Published: (2021)
Evaluation of Risks of Cyber Security of Information Systemsof Objects of Critical Infrastructure
by: V. V. Mokhor, et al.
Published: (2019)
by: V. V. Mokhor, et al.
Published: (2019)
Requirements for a Cyber Threat Taxonomy of Critical Infrastructure Objects and Analysis of Existing Approaches
by: Yu. Komarov
Published: (2020)
by: Yu. Komarov
Published: (2020)
A Methodical Approach to the Assessment of Organizational Culture
by: A. O. Melnyk
Published: (2021)
by: A. O. Melnyk
Published: (2021)
Methods of assessment of tax risks
by: E. A. Beltjukov, et al.
Published: (2010)
by: E. A. Beltjukov, et al.
Published: (2010)
Integrated Approach to the Problem of Planning the Route of UAV
by: A. N. Kozub, et al.
Published: (2013)
by: A. N. Kozub, et al.
Published: (2013)
Similar Items
-
A combination of traditional methods and a metric approach to assessing the risks from cyber attacks to global routing.
by: Zubok, V. Yu.
Published: (2019) -
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Yu. Zubok
Published: (2020) -
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Zubok, V. Yu.
Published: (2020) -
Global Internet Routing Cyberattacks Risk Assessment
by: Yu. Zubok
Published: (2019) -
New metrics for assessment the risks of the Internet route hijack cyberattacs
by: Yu. Zubok
Published: (2020)