Review of Cyberatakes on Objects of Critical Infrastructure
Saved in:
| Date: | 2019 |
|---|---|
| Main Author: | Yu. Komarov |
| Format: | Article |
| Language: | English |
| Published: |
2019
|
| Series: | Electronic modeling |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0001070055 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
Requirements for a Cyber Threat Taxonomy of Critical Infrastructure Objects and Analysis of Existing Approaches
by: Yu. Komarov
Published: (2020)
by: Yu. Komarov
Published: (2020)
Theoretical and methodological preconditions of categorisation of objects of critical infrastructure in credit and banking sphere
by: Yu. A. Ivanov
Published: (2019)
by: Yu. A. Ivanov
Published: (2019)
Evaluation of Risks of Cyber Security of Information Systemsof Objects of Critical Infrastructure
by: V. V. Mokhor, et al.
Published: (2019)
by: V. V. Mokhor, et al.
Published: (2019)
Analysis of scenarios of the use of unmanned aircraft against critical infrastructure objects
by: M. M. Diviziniuk, et al.
Published: (2024)
by: M. M. Diviziniuk, et al.
Published: (2024)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: O. V. Saliieva, et al.
Published: (2020)
by: O. V. Saliieva, et al.
Published: (2020)
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: O. V. Saliieva, et al.
Published: (2020)
by: O. V. Saliieva, et al.
Published: (2020)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Issue of Criminal Liability for Offences Against Critical Infrastructure Objects in Nuclear Industry
by: O. V. Taran, et al.
Published: (2019)
by: O. V. Taran, et al.
Published: (2019)
Development of methodical support of antiterrorist protection of the objects of critical infrastructure (on the example of the USA)
by: B. D. Leonov, et al.
Published: (2020)
by: B. D. Leonov, et al.
Published: (2020)
The cybersecurity modeling in critical infrastructures
by: H. Kravtsov, et al.
Published: (2015)
by: H. Kravtsov, et al.
Published: (2015)
The cybersecurity modeling in critical infrastructures
by: Kravtsov, H., et al.
Published: (2015)
by: Kravtsov, H., et al.
Published: (2015)
Threat assessment mathematical model for potentially dangerous objects of critical infrastructure in the combat zone
by: Murasov, R.K., et al.
Published: (2023)
by: Murasov, R.K., et al.
Published: (2023)
Protection of Critical infrastructure Objects of Ukraine against Direct Missile Hits Using Underground Structures
by: V. I. Kotsiuruba, et al.
Published: (2023)
by: V. I. Kotsiuruba, et al.
Published: (2023)
Transformations the minimum runoff of the Sluch River and their influence on Novohrad-Volynskyi reservoir as an object of local critical infrastructure
by: V. M. Korbutiak, et al.
Published: (2018)
by: V. M. Korbutiak, et al.
Published: (2018)
Integration of Different Approaches to the Modeling of Critical Infrastructure
by: I. M. Oksanych, et al.
Published: (2024)
by: I. M. Oksanych, et al.
Published: (2024)
Risks of the Country's Critical Infrastructure
by: S. V. Mahdysiuk
Published: (2024)
by: S. V. Mahdysiuk
Published: (2024)
Economic support of the organization and functioning of critical infrastructure
by: N. V. Trushkina, et al.
Published: (2024)
by: N. V. Trushkina, et al.
Published: (2024)
Administrative and legal protection of critical information infrastructure in cyberspace modern
by: Yu. P. Lisovska
Published: (2019)
by: Yu. P. Lisovska
Published: (2019)
Monitoring the Effectiveness of Sustainable Management in Critical Infrastructure: Substantiation of Costs
by: V. V. Mykytenko, et al.
Published: (2022)
by: V. V. Mykytenko, et al.
Published: (2022)
Scientific principles of cybersecurity of critical infrastructure objects (transcript of the report at the meeting of the Presidium of NAS of Ukraine, February 9, 2022)
by: O. O. Letychevskyi
Published: (2022)
by: O. O. Letychevskyi
Published: (2022)
Current state of criminal protection of the critical infrastructure facilities
by: Ye. Kucheryna, et al.
Published: (2021)
by: Ye. Kucheryna, et al.
Published: (2021)
Cyber security of critical infrastructure during cyber warfare
by: Ya. S. Manuilov
Published: (2023)
by: Ya. S. Manuilov
Published: (2023)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
Models of the optimal resources allocation for the critical infrastructure protection
by: V. I. Norkin, et al.
Published: (2018)
by: V. I. Norkin, et al.
Published: (2018)
Spatial Management of Sustainable Management in Critical Infrastructure in a Special Period
by: V. V. Mykytenko, et al.
Published: (2022)
by: V. V. Mykytenko, et al.
Published: (2022)
Removal threats of providing heat of infrastructural objects
by: V. H. Demchenko
Published: (2017)
by: V. H. Demchenko
Published: (2017)
Bipolar and industrial policy objectives of sectoral infrastructure
by: K. I. Tkach
Published: (2010)
by: K. I. Tkach
Published: (2010)
Methods for the total risk assessment of cybersecurity of critical infrastructure facilities
by: V. V. Mokhor, et al.
Published: (2019)
by: V. V. Mokhor, et al.
Published: (2019)
A network approach in the study of cascading effects critical infrastructures
by: Хоменко, О. М., et al.
Published: (2024)
by: Хоменко, О. М., et al.
Published: (2024)
Critical-legal thinking: the objectivity of science
by: V. O. Desiatnyk
Published: (2015)
by: V. O. Desiatnyk
Published: (2015)
Improving the security of critical infrastructures through automated organizational management systems
by: O. H. Dodonov, et al.
Published: (2022)
by: O. H. Dodonov, et al.
Published: (2022)
The main stages of innovative research to ensure the safety of critical infrastructure facilities
by: M. M. Diviziniuk, et al.
Published: (2024)
by: M. M. Diviziniuk, et al.
Published: (2024)
Legal and organizational provision of protection of the critical information infrastructure from cyberattacks
by: S. M. Tsiapa
Published: (2021)
by: S. M. Tsiapa
Published: (2021)
Features of decision support in government situational centers to protect critical infrastructure
by: V. F. Hrechaninov
Published: (2021)
by: V. F. Hrechaninov
Published: (2021)
Features of decision support in government situational centers to protect critical infrastructure
by: Гречанінов , В. Ф.
Published: (2021)
by: Гречанінов , В. Ф.
Published: (2021)
Improving the security of critical infrastructures through automated organizational management systems
by: Додонов, О. Г., et al.
Published: (2022)
by: Додонов, О. Г., et al.
Published: (2022)
The critical current of superconductors: an historical review
by: Dew-Hughes, David
Published: (2001)
by: Dew-Hughes, David
Published: (2001)
Criticality of fuel-containing materials in the “Shelter” object
by: V. I. Borysenko, et al.
Published: (2024)
by: V. I. Borysenko, et al.
Published: (2024)
Resources Distribution Model of Critical IT Infrastructure with Clear Parameters Based on the Particle Swarm Algorithm
by: Ya. Yu. Dorohyi, et al.
Published: (2019)
by: Ya. Yu. Dorohyi, et al.
Published: (2019)
Similar Items
-
Requirements for a Cyber Threat Taxonomy of Critical Infrastructure Objects and Analysis of Existing Approaches
by: Yu. Komarov
Published: (2020) -
Theoretical and methodological preconditions of categorisation of objects of critical infrastructure in credit and banking sphere
by: Yu. A. Ivanov
Published: (2019) -
Evaluation of Risks of Cyber Security of Information Systemsof Objects of Critical Infrastructure
by: V. V. Mokhor, et al.
Published: (2019) -
Analysis of scenarios of the use of unmanned aircraft against critical infrastructure objects
by: M. M. Diviziniuk, et al.
Published: (2024) -
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: O. V. Saliieva, et al.
Published: (2020)