Fuzzing technique and its usage in cybersecurity tasks
Saved in:
| Date: | 2022 |
|---|---|
| Main Authors: | O. O. Letychevskyi, V. S. Peschanenko, Ya. V. Hryniuk |
| Format: | Article |
| Language: | English |
| Published: |
2022
|
| Series: | Cybernetics and Systems Analysis |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0001301517 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
Scientific principles of cybersecurity of critical infrastructure objects (transcript of the report at the meeting of the Presidium of NAS of Ukraine, February 9, 2022)
by: O. O. Letychevskyi
Published: (2022)
by: O. O. Letychevskyi
Published: (2022)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
Usage of AI-planning techniques to solve problems of Web-services composition
by: O. V. Zakharova
Published: (2016)
by: O. V. Zakharova
Published: (2016)
Usage of AI-planning techniques to solve problems of Web-services composition
by: Zakharova, O.V.
Published: (2018)
by: Zakharova, O.V.
Published: (2018)
Decentralized systems in logistics: usage overview and security issues
by: O. O. Letychevskyi, et al.
Published: (2020)
by: O. O. Letychevskyi, et al.
Published: (2020)
Cybersecurity in the Electric Power Systems of Ukraine
by: Yu. H. Kutsan, et al.
Published: (2019)
by: Yu. H. Kutsan, et al.
Published: (2019)
The cybersecurity modeling in critical infrastructures
by: Kravtsov, H., et al.
Published: (2015)
by: Kravtsov, H., et al.
Published: (2015)
The cybersecurity modeling in critical infrastructures
by: H. Kravtsov, et al.
Published: (2015)
by: H. Kravtsov, et al.
Published: (2015)
Cybersecurity and means of preventing and combating to cybercrime and cyberterorrism
by: P. D. Bilenchuk, et al.
Published: (2018)
by: P. D. Bilenchuk, et al.
Published: (2018)
Neurosymbolic models for ensuring cybersecurity in critical cyberphysical systems
by: Yevdokymov, S.O.
Published: (2025)
by: Yevdokymov, S.O.
Published: (2025)
Cybersecurity of NPP Instrumentation and Control Systems: Risks Assessment
by: A. A. Symonov, et al.
Published: (2022)
by: A. A. Symonov, et al.
Published: (2022)
Semantic Indexing and Cluster Analysis of Cybersecurity Documents
by: Ланде, Д. В., et al.
Published: (2024)
by: Ланде, Д. В., et al.
Published: (2024)
Network and economic component of financial cybersecurity indices
by: Turchynov, Oleksandr, et al.
Published: (2025)
by: Turchynov, Oleksandr, et al.
Published: (2025)
The principles of institutional and functional support of cybersecurity in modern conditions
by: S. V. Hurzhii
Published: (2021)
by: S. V. Hurzhii
Published: (2021)
Methods for the total risk assessment of cybersecurity of critical infrastructure facilities
by: V. V. Mokhor, et al.
Published: (2019)
by: V. V. Mokhor, et al.
Published: (2019)
Optimizing residential energy usage patterns in smart grids using hybrid metaheuristic techniques
by: Kamal, M., et al.
Published: (2026)
by: Kamal, M., et al.
Published: (2026)
Overview of the modern methods of protection and security of software systems
by: O. O. Letychevskyi, et al.
Published: (2019)
by: O. O. Letychevskyi, et al.
Published: (2019)
Creating a new concept and paradigm for building cybersecurity systems
by: V. V. Khilenko
Published: (2019)
by: V. V. Khilenko
Published: (2019)
Features of the logistics system of national cybersecurity Ukraine in modern conditions
by: V. V. Petrov, et al.
Published: (2017)
by: V. V. Petrov, et al.
Published: (2017)
The import substitution of software as an important component of strengthening state cybersecurity
by: V. P. Shevchenko
Published: (2021)
by: V. P. Shevchenko
Published: (2021)
Ratings of Political Leaders: Characteristics of Its Usage in the Ukrainian Mediaspace
by: M. Kushnarova, et al.
Published: (2020)
by: M. Kushnarova, et al.
Published: (2020)
China's national cybersecurity policy: institutional pressures
by: Yu. H. Shevchenko
Published: (2022)
by: Yu. H. Shevchenko
Published: (2022)
Priority principles of state cybersecurity policy: organizational and legal aspect
by: Yu. Horun
Published: (2021)
by: Yu. Horun
Published: (2021)
Cybersecurity of space activities and the possibility of ensuring it by means of international law
by: N. R. Malysheva
Published: (2021)
by: N. R. Malysheva
Published: (2021)
Statistical Indicators of Cybersecurity Development in the Context of Digital Transformation of Economy and Society
by: A. M. Yerina, et al.
Published: (2021)
by: A. M. Yerina, et al.
Published: (2021)
Ensuring Cybersecurity in the Era of Artificial Intelligence: Analysis of Technological Approaches and Strategies for Information Protection
by: O. B. Yashchyk, et al.
Published: (2024)
by: O. B. Yashchyk, et al.
Published: (2024)
Algebraic modeling and its application
by: O. O. Letychevskyi
Published: (2021)
by: O. O. Letychevskyi
Published: (2021)
Phenomenon of electoral aksiotechnologies: its nature and practical usage in election campaigns
by: Ye. V. Kutsenko
Published: (2014)
by: Ye. V. Kutsenko
Published: (2014)
A reassessment of public awareness and legislative framework on cybersecurity in South Africa
by: S. A. Olofinbiyi
Published: (2022)
by: S. A. Olofinbiyi
Published: (2022)
Authority of the Security Service of Ukraine as a subject of national cybersecurity system
by: S. H. Petrov
Published: (2019)
by: S. H. Petrov
Published: (2019)
Cybersecurity and Protection of Accounting Data under Conditions of Modern Information Technology
by: Yu. M. Popivniak
Published: (2019)
by: Yu. M. Popivniak
Published: (2019)
The best foreign practices for developing mechanisms of public-private partnership in the field of cybersecurity
by: V. A. Hryhorenko
Published: (2021)
by: V. A. Hryhorenko
Published: (2021)
Organizational and legal mechanisms of cybersecurity and cyber defense in Ukraine: essentiality, conditions and development prospects
by: A. I. Semenchenko, et al.
Published: (2020)
by: A. I. Semenchenko, et al.
Published: (2020)
Organizational and legal mechanisms of cybersecurity and cyber defense in Ukraine: essentiality, conditions and development prospects
by: Semenchenko, A.I., et al.
Published: (2020)
by: Semenchenko, A.I., et al.
Published: (2020)
Legal Support of the National Cybersecurity and Defence System in the Current Economic and Legal Environment
by: V. Rieznikova, et al.
Published: (2024)
by: V. Rieznikova, et al.
Published: (2024)
Activation of international cooperation in the field of cybersecurity: the ways of improvement in today's realities
by: O. M. Poliakov
Published: (2021)
by: O. M. Poliakov
Published: (2021)
Potential of the DRI Tecnologies and Directions of its Usage in Iron and Steel Production (Reviw)
by: V. I. Rudyka
Published: (2017)
by: V. I. Rudyka
Published: (2017)
Sufficient Condition for Partial Optimality for (max, +)-Labeling Problems and its Usage
by: I. Kovtun
Published: (2011)
by: I. Kovtun
Published: (2011)
Assessment of implementation of the cybersecurity strategy of Ukraine taking into account the experience of European and world practices
by: M. V. Hutsaliuk
Published: (2019)
by: M. V. Hutsaliuk
Published: (2019)
Metals nanoaquahelates prospects usage
by: O. I. Brych, et al.
Published: (2015)
by: O. I. Brych, et al.
Published: (2015)
Similar Items
-
Scientific principles of cybersecurity of critical infrastructure objects (transcript of the report at the meeting of the Presidium of NAS of Ukraine, February 9, 2022)
by: O. O. Letychevskyi
Published: (2022) -
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024) -
Usage of AI-planning techniques to solve problems of Web-services composition
by: O. V. Zakharova
Published: (2016) -
Usage of AI-planning techniques to solve problems of Web-services composition
by: Zakharova, O.V.
Published: (2018) -
Decentralized systems in logistics: usage overview and security issues
by: O. O. Letychevskyi, et al.
Published: (2020)