Features of the Model of the Offender at the Analysis of Attacks on Global Internet Routing
Saved in:
| Date: | 2019 |
|---|---|
| Main Author: | Yu. Zubok |
| Format: | Article |
| Language: | English |
| Published: |
2019
|
| Series: | Electronic modeling |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0001045051 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Yu. Zubok
Published: (2020)
by: Yu. Zubok
Published: (2020)
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Zubok, V. Yu.
Published: (2020)
by: Zubok, V. Yu.
Published: (2020)
Global Internet Routing Cyberattacks Risk Assessment
by: Yu. Zubok
Published: (2019)
by: Yu. Zubok
Published: (2019)
Determining the ways of counteraction to cyberattacks on the internet global routing
by: Yu. Zubok
Published: (2018)
by: Yu. Zubok
Published: (2018)
A formal description of the internet global routing objects and processes for global routing cyberattacs impact assessment
by: Yu. Zubok
Published: (2019)
by: Yu. Zubok
Published: (2019)
Construction and Visualization of a New Risk-oriented Model of Global Routing in the Internet
by: Yu. Zubok
Published: (2020)
by: Yu. Zubok
Published: (2020)
А formal description of the internet global routing objects and processes for global routing cyberattacs impact assessment
by: Zubok, V. Yu.
Published: (2019)
by: Zubok, V. Yu.
Published: (2019)
Formation of the topological space of the Internet by the global routing system
by: Yu. Zubok, et al.
Published: (2021)
by: Yu. Zubok, et al.
Published: (2021)
A combination of traditional methods and a metric approach to assessing the risks from cyber attacks to global routing
by: Yu. Zubok
Published: (2019)
by: Yu. Zubok
Published: (2019)
A combination of traditional methods and a metric approach to assessing the risks from cyber attacks to global routing.
by: Zubok, V. Yu.
Published: (2019)
by: Zubok, V. Yu.
Published: (2019)
New metrics for assessment the risks of the Internet route hijack cyberattacs
by: Yu. Zubok
Published: (2020)
by: Yu. Zubok
Published: (2020)
Risk factor analysis of an example of an incident with global routing registry software
by: Yu. Zubok
Published: (2020)
by: Yu. Zubok
Published: (2020)
Risk factor analysis of an example of an incident with global routing registry software
by: Zubok, V. Yu.
Published: (2020)
by: Zubok, V. Yu.
Published: (2020)
Victim-offender mediation as the mean for resolving criminal conflicts
by: Yu. V. Vasylenko
Published: (2019)
by: Yu. V. Vasylenko
Published: (2019)
The New Internet Exchange Points Analisys
by: Zubok, V. Yu.
Published: (2013)
by: Zubok, V. Yu.
Published: (2013)
Global Attacks on Decentralized Systems Built on Peer-to-peer Networks
by: P. I. Stetsenko
Published: (2017)
by: P. I. Stetsenko
Published: (2017)
Development of ideas as Makarenko in theory educations minor offenders in establishments opened type
by: M. S. Halii
Published: (2013)
by: M. S. Halii
Published: (2013)
Practical Aspects of Modeling Changes in the Topology of the Global Computer Network
by: Zubok, V. Yu.
Published: (2012)
by: Zubok, V. Yu.
Published: (2012)
The influence of educational process in educational institutions as a factor of delinquency juvenile female offender
by: A. V. Dvorkova
Published: (2013)
by: A. V. Dvorkova
Published: (2013)
Formation of the topological space of the Іnternet by the global routing system
by: Зубок, В. Ю., et al.
Published: (2021)
by: Зубок, В. Ю., et al.
Published: (2021)
Modeling of Attack Detection System based on Hybridization of Binary Classifiers
by: O. I. Belei, et al.
Published: (2020)
by: O. I. Belei, et al.
Published: (2020)
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021)
by: Шиян, А. А., et al.
Published: (2021)
A model of control for counterac-ting against information attacks in cyberspace
by: A. A. Shyian, et al.
Published: (2021)
by: A. A. Shyian, et al.
Published: (2021)
Characteristics offender who has committed a violent crime against the media authority of public authorities
by: M. V. Dovhal
Published: (2016)
by: M. V. Dovhal
Published: (2016)
Negligence crime is committed by several offenders as a phenomenon of objective reality and the problem of the theory of criminal law
by: S. R. Bahirov
Published: (2016)
by: S. R. Bahirov
Published: (2016)
Features of modern tools of internet marketing
by: O. Vikarchuk, et al.
Published: (2021)
by: O. Vikarchuk, et al.
Published: (2021)
Distinguishing attack on the NTRUCipher encryption scheme
by: A. M. Oleksiichuk, et al.
Published: (2022)
by: A. M. Oleksiichuk, et al.
Published: (2022)
Hemostasis indices in transient ischemic attacks
by: I. A. Hryhorova, et al.
Published: (2021)
by: I. A. Hryhorova, et al.
Published: (2021)
A discrete mathematical model SIRS with the evolution of regions to attack infectious diseases
by: Y. Benfatah, et al.
Published: (2023)
by: Y. Benfatah, et al.
Published: (2023)
Modelling of the Single-Layer and Two-Layer Routing Problems
by: I. V. Kozin, et al.
Published: (2016)
by: I. V. Kozin, et al.
Published: (2016)
Mathematical instruments for analysis of the internet of things
by: H. V. Mamonova, et al.
Published: (2020)
by: H. V. Mamonova, et al.
Published: (2020)
Route terminal Venice
by: V. Martyniuk
Published: (2011)
by: V. Martyniuk
Published: (2011)
Construction of a multi-agent attack detection system based on artificial intelligence models
by: O. Belej, et al.
Published: (2021)
by: O. Belej, et al.
Published: (2021)
Modelling of time-dependent problems of search of optimal routes: overview
by: L. F. Hulianytskyi, et al.
Published: (2017)
by: L. F. Hulianytskyi, et al.
Published: (2017)
Mathematical models of problems of building closed routes on the transport network
by: A. V. Morozov
Published: (2015)
by: A. V. Morozov
Published: (2015)
Information protection by enhancing the effectiveness of counteracting cyber attacks
by: V. D. Havlovskyi
Published: (2019)
by: V. D. Havlovskyi
Published: (2019)
Mathematical algorithm for detecting XSS attacks on web applications
by: Kh. Khamdamov, et al.
Published: (2021)
by: Kh. Khamdamov, et al.
Published: (2021)
Neural Network System for Transient Ischemic Attacks Diagnostics
by: V. A. Golovko, et al.
Published: (2014)
by: V. A. Golovko, et al.
Published: (2014)
Genetic algorithm for SDN protection against network attacks
by: S. I. Zabelin
Published: (2016)
by: S. I. Zabelin
Published: (2016)
Neurosymbolic approach for attack detection in satellite communication systems
by: Mostovyi, O.S.
Published: (2024)
by: Mostovyi, O.S.
Published: (2024)
Similar Items
-
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Yu. Zubok
Published: (2020) -
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Zubok, V. Yu.
Published: (2020) -
Global Internet Routing Cyberattacks Risk Assessment
by: Yu. Zubok
Published: (2019) -
Determining the ways of counteraction to cyberattacks on the internet global routing
by: Yu. Zubok
Published: (2018) -
A formal description of the internet global routing objects and processes for global routing cyberattacs impact assessment
by: Yu. Zubok
Published: (2019)