Determining the ways of counteraction to cyberattacks on the internet global routing
Saved in:
| Date: | 2018 |
|---|---|
| Main Author: | Yu. Zubok |
| Format: | Article |
| Language: | English |
| Published: |
2018
|
| Series: | Electronic modeling |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0000942710 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
Global Internet Routing Cyberattacks Risk Assessment
by: Yu. Zubok
Published: (2019)
by: Yu. Zubok
Published: (2019)
A formal description of the internet global routing objects and processes for global routing cyberattacs impact assessment
by: Yu. Zubok
Published: (2019)
by: Yu. Zubok
Published: (2019)
А formal description of the internet global routing objects and processes for global routing cyberattacs impact assessment
by: Zubok, V. Yu.
Published: (2019)
by: Zubok, V. Yu.
Published: (2019)
Features of the Model of the Offender at the Analysis of Attacks on Global Internet Routing
by: Yu. Zubok
Published: (2019)
by: Yu. Zubok
Published: (2019)
Formation of the topological space of the Internet by the global routing system
by: Yu. Zubok, et al.
Published: (2021)
by: Yu. Zubok, et al.
Published: (2021)
Construction and Visualization of a New Risk-oriented Model of Global Routing in the Internet
by: Yu. Zubok
Published: (2020)
by: Yu. Zubok
Published: (2020)
New metrics for assessment the risks of the Internet route hijack cyberattacs
by: Yu. Zubok
Published: (2020)
by: Yu. Zubok
Published: (2020)
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Yu. Zubok
Published: (2020)
by: Yu. Zubok
Published: (2020)
Internet fraud: technologies of performance, ways of counteraction and prevention
by: O. A. Samoilenko, et al.
Published: (2021)
by: O. A. Samoilenko, et al.
Published: (2021)
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Zubok, V. Yu.
Published: (2020)
by: Zubok, V. Yu.
Published: (2020)
Risk factor analysis of an example of an incident with global routing registry software
by: Yu. Zubok
Published: (2020)
by: Yu. Zubok
Published: (2020)
Risk factor analysis of an example of an incident with global routing registry software
by: Zubok, V. Yu.
Published: (2020)
by: Zubok, V. Yu.
Published: (2020)
A combination of traditional methods and a metric approach to assessing the risks from cyber attacks to global routing
by: Yu. Zubok
Published: (2019)
by: Yu. Zubok
Published: (2019)
A combination of traditional methods and a metric approach to assessing the risks from cyber attacks to global routing.
by: Zubok, V. Yu.
Published: (2019)
by: Zubok, V. Yu.
Published: (2019)
The New Internet Exchange Points Analisys
by: Zubok, V. Yu.
Published: (2013)
by: Zubok, V. Yu.
Published: (2013)
Legal and organizational provision of protection of the critical information infrastructure from cyberattacks
by: S. M. Tsiapa
Published: (2021)
by: S. M. Tsiapa
Published: (2021)
The essence and content of the investigation of cyber incidents and cyberattacks by the Security Service of Ukraine units
by: M. V. Kuleshov
Published: (2019)
by: M. V. Kuleshov
Published: (2019)
Using Bayesian network models for early assessment of cyberattack threats to electricity generation facility
by: Гальчинський, Л. Ю., et al.
Published: (2025)
by: Гальчинський, Л. Ю., et al.
Published: (2025)
International Legal Responsibility for Cyberattacks During Armed Conflict Through the Prism of International Humanitarian Law
by: L. Nevara
Published: (2024)
by: L. Nevara
Published: (2024)
Formation of the topological space of the Іnternet by the global routing system
by: Зубок, В. Ю., et al.
Published: (2021)
by: Зубок, В. Ю., et al.
Published: (2021)
Developing a personal culture as a way to counteract the negative influence of the media on crime
by: O. M. Kostiuk
Published: (2022)
by: O. M. Kostiuk
Published: (2022)
Determination of the optimal set of methods for iterative improvement of the reference route
by: Derevianko, E.M., et al.
Published: (2025)
by: Derevianko, E.M., et al.
Published: (2025)
Confrontation of Major Counteracting Forces in the Globalized Market as a Process of Resolving / Intensifying its Contradictions
by: T. A. Deineka
Published: (2016)
by: T. A. Deineka
Published: (2016)
Practical Aspects of Modeling Changes in the Topology of the Global Computer Network
by: Zubok, V. Yu.
Published: (2012)
by: Zubok, V. Yu.
Published: (2012)
International cooperation in counteraction to transnational cybercrimes
by: A. I. Marushchak
Published: (2018)
by: A. I. Marushchak
Published: (2018)
Bases of criminal legal counteraction to separatism
by: V. N. Kubalskyi
Published: (2020)
by: V. N. Kubalskyi
Published: (2020)
Features of Counteraction to Negative Information Influences
by: V. Palchuk
Published: (2022)
by: V. Palchuk
Published: (2022)
Legal nature of the corruption counteraction in Ukraine
by: T. V. Khabarova
Published: (2016)
by: T. V. Khabarova
Published: (2016)
Route terminal Venice
by: V. Martyniuk
Published: (2011)
by: V. Martyniuk
Published: (2011)
Counteraction to the barefaced aggression of the Russian Federation: political and diplomatic tools of Ukraine in the face of global and regional challenges and threats
by: M. V. Tretiakova
Published: (2018)
by: M. V. Tretiakova
Published: (2018)
DOI - solution of the problem of determination placement of the electronic publication in the Internet
by: L. V. Horodzha
Published: (2018)
by: L. V. Horodzha
Published: (2018)
Political corruption in Greece: forms and counteraction mechanism
by: I. V. Kushnarov
Published: (2017)
by: I. V. Kushnarov
Published: (2017)
Complex method of informational-psychological operations counteraction
by: A. V. Dudatev
Published: (2017)
by: A. V. Dudatev
Published: (2017)
The Role of Strategic Communications in Counteracting Information Aggression
by: O. Voroshylov
Published: (2020)
by: O. Voroshylov
Published: (2020)
Features of Counteracting Fake Information in Social Networks
by: L. Demianenko
Published: (2020)
by: L. Demianenko
Published: (2020)
Ukrainian-Polish interaction as a counteraction to ruscism
by: O. Kukuruz
Published: (2024)
by: O. Kukuruz
Published: (2024)
Strategic Communications in Counteracting Destructive Russian Narratives
by: O. Aulin, et al.
Published: (2023)
by: O. Aulin, et al.
Published: (2023)
Detection of information sources distributing fake information inside global internet network
by: A. M. Soboliev
Published: (2019)
by: A. M. Soboliev
Published: (2019)
Detection of information sources distributing fake information inside global internet network
by: Soboliev, A. М.
Published: (2019)
by: Soboliev, A. М.
Published: (2019)
Problems of UAV routing in search and monitoring
by: L. F. Hulianytskyi, et al.
Published: (2018)
by: L. F. Hulianytskyi, et al.
Published: (2018)
Similar Items
-
Global Internet Routing Cyberattacks Risk Assessment
by: Yu. Zubok
Published: (2019) -
A formal description of the internet global routing objects and processes for global routing cyberattacs impact assessment
by: Yu. Zubok
Published: (2019) -
А formal description of the internet global routing objects and processes for global routing cyberattacs impact assessment
by: Zubok, V. Yu.
Published: (2019) -
Features of the Model of the Offender at the Analysis of Attacks on Global Internet Routing
by: Yu. Zubok
Published: (2019) -
Formation of the topological space of the Internet by the global routing system
by: Yu. Zubok, et al.
Published: (2021)