Information protection by enhancing the effectiveness of counteracting cyber attacks
Saved in:
| Date: | 2019 |
|---|---|
| Main Author: | V. D. Havlovskyi |
| Format: | Article |
| Language: | English |
| Published: |
2019
|
| Series: | Information and law |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0001030553 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021)
by: Шиян, А. А., et al.
Published: (2021)
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: I. O. Dohtieva, et al.
Published: (2021)
by: I. O. Dohtieva, et al.
Published: (2021)
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: Дьогтєва, І. О., et al.
Published: (2021)
by: Дьогтєва, І. О., et al.
Published: (2021)
Organizational and legal framework for addressing cyber attacks in the European Union
by: S. H. Petrov
Published: (2020)
by: S. H. Petrov
Published: (2020)
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Zubok, V. Yu.
Published: (2020)
by: Zubok, V. Yu.
Published: (2020)
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Yu. Zubok
Published: (2020)
by: Yu. Zubok
Published: (2020)
Simulation and Visualization of Cyber Attacks in the Energy Sector Using Computer Distributed Training Systems
by: V. A. Gureev, et al.
Published: (2019)
by: V. A. Gureev, et al.
Published: (2019)
A combination of traditional methods and a metric approach to assessing the risks from cyber attacks to global routing.
by: Zubok, V. Yu.
Published: (2019)
by: Zubok, V. Yu.
Published: (2019)
A combination of traditional methods and a metric approach to assessing the risks from cyber attacks to global routing
by: Yu. Zubok
Published: (2019)
by: Yu. Zubok
Published: (2019)
Features of Counteraction to Negative Information Influences
by: V. Palchuk
Published: (2022)
by: V. Palchuk
Published: (2022)
Genetic algorithm for SDN protection against network attacks
by: S. I. Zabelin
Published: (2016)
by: S. I. Zabelin
Published: (2016)
Complex method of informational-psychological operations counteraction
by: A. V. Dudatev
Published: (2017)
by: A. V. Dudatev
Published: (2017)
Information in the natural cyber systems (to definition of the term information)
by: Ja. Reshetnik
Published: (2020)
by: Ja. Reshetnik
Published: (2020)
The Role of Strategic Communications in Counteracting Information Aggression
by: O. Voroshylov
Published: (2020)
by: O. Voroshylov
Published: (2020)
Features of Counteracting Fake Information in Social Networks
by: L. Demianenko
Published: (2020)
by: L. Demianenko
Published: (2020)
The relationship between information security and cyber security
by: A. V. Tarasiuk
Published: (2019)
by: A. V. Tarasiuk
Published: (2019)
Integrated security systems for protecting payment synchronization from MITM attacks
by: Shahmatov, I.O., et al.
Published: (2025)
by: Shahmatov, I.O., et al.
Published: (2025)
Cyber security graph model of information resources
by: A. V. Nesterenko, et al.
Published: (2020)
by: A. V. Nesterenko, et al.
Published: (2020)
Legal problems of insurance protection against cyber risks in space activities
by: N. D. Krasilich
Published: (2021)
by: N. D. Krasilich
Published: (2021)
On the issue of protection of cyberspace Ukraine
by: V. D. Havlovskyi
Published: (2016)
by: V. D. Havlovskyi
Published: (2016)
Libraries in the Information Counteraction to Negative Influences in Social Networks
by: O. Pryhornytska
Published: (2018)
by: O. Pryhornytska
Published: (2018)
Improvement of protection for WEB resources from attacks based on combined heuristic and statistical approach
by: Prysiazhnyi, D. P.
Published: (2016)
by: Prysiazhnyi, D. P.
Published: (2016)
Cyber socialization: information-technical, educational and legal aspects
by: O. Petriaiev
Published: (2020)
by: O. Petriaiev
Published: (2020)
Fake Information in Social Media: Identifi cation, Evaluation, Counteraction
by: O. Pryhornytska
Published: (2017)
by: O. Pryhornytska
Published: (2017)
Modelling of choice on the optimal method for counteract of information security threats
by: Nikiforova, L. O., et al.
Published: (2014)
by: Nikiforova, L. O., et al.
Published: (2014)
Problems of providing protection of cyber space from the activities of terrorist organizations
by: I. M. Ozerchuk
Published: (2021)
by: I. M. Ozerchuk
Published: (2021)
A model of control for counterac-ting against information attacks in cyberspace
by: A. A. Shyian, et al.
Published: (2021)
by: A. A. Shyian, et al.
Published: (2021)
Information technology protection and cyber security (transcript of scientific report at the meeting of the Presidium of NAS of Ukraine, September 25, 2019)
by: M. M. Savchuk
Published: (2019)
by: M. M. Savchuk
Published: (2019)
Information space and cyber space as a source of modern threats
by: A. B. Kachynskyi, et al.
Published: (2019)
by: A. B. Kachynskyi, et al.
Published: (2019)
Cyber security of critical infrastructure during cyber warfare
by: Ya. S. Manuilov
Published: (2023)
by: Ya. S. Manuilov
Published: (2023)
Counteraction to negative information influences on human and society in the conditions of hybrid war
by: S. P. Mosov, et al.
Published: (2018)
by: S. P. Mosov, et al.
Published: (2018)
Evaluation of Risks of Cyber Security of Information Systemsof Objects of Critical Infrastructure
by: V. V. Mokhor, et al.
Published: (2019)
by: V. V. Mokhor, et al.
Published: (2019)
Causes, effects and tools counteraction of conflict of interest in fiscal practice
by: O. Sydorovych
Published: (2014)
by: O. Sydorovych
Published: (2014)
Cyber-physical systems
by: A. A. Letichevskij, et al.
Published: (2017)
by: A. A. Letichevskij, et al.
Published: (2017)
Counteraction to destructive influence during archival storage of information objects on optical media
by: Berezin, B. A., et al.
Published: (2015)
by: Berezin, B. A., et al.
Published: (2015)
Hemostasis indices in transient ischemic attacks
by: I. A. Hryhorova, et al.
Published: (2021)
by: I. A. Hryhorova, et al.
Published: (2021)
Distinguishing attack on the NTRUCipher encryption scheme
by: A. M. Oleksiichuk, et al.
Published: (2022)
by: A. M. Oleksiichuk, et al.
Published: (2022)
Complex approach for state critical information infrastructure cyber defence system constructing
by: I. P. Sinitsyn, et al.
Published: (2017)
by: I. P. Sinitsyn, et al.
Published: (2017)
Complex approach for state critical information infrastructure cyber defence system constructing
by: Synitsyn, I.P., et al.
Published: (2018)
by: Synitsyn, I.P., et al.
Published: (2018)
Legal support of intellectual and value resource in the cyber-modern information capital system
by: Yu. P. Lisovska
Published: (2022)
by: Yu. P. Lisovska
Published: (2022)
Similar Items
-
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021) -
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: I. O. Dohtieva, et al.
Published: (2021) -
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: Дьогтєва, І. О., et al.
Published: (2021) -
Organizational and legal framework for addressing cyber attacks in the European Union
by: S. H. Petrov
Published: (2020) -
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Zubok, V. Yu.
Published: (2020)