Complex approach for state critical information infrastructure cyber defence system constructing
Saved in:
| Date: | 2017 |
|---|---|
| Main Authors: | I. P. Sinitsyn, P. P. Ihnatenko, O. O. Slabospytska, O. V. Artemenko |
| Format: | Article |
| Language: | English |
| Published: |
2017
|
| Series: | Problems in programming |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0000773891 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
Complex approach for state critical information infrastructure cyber defence system constructing
by: Synitsyn, I.P., et al.
Published: (2018)
by: Synitsyn, I.P., et al.
Published: (2018)
Advanced information technologies for the training of cyber defence specialists of the security and defence sector of Ukraine
by: O. M. Bashkyrov, et al.
Published: (2024)
by: O. M. Bashkyrov, et al.
Published: (2024)
Cyber security of critical infrastructure during cyber warfare
by: Ya. S. Manuilov
Published: (2023)
by: Ya. S. Manuilov
Published: (2023)
Evaluation of Risks of Cyber Security of Information Systemsof Objects of Critical Infrastructure
by: V. V. Mokhor, et al.
Published: (2019)
by: V. V. Mokhor, et al.
Published: (2019)
Requirements for a Cyber Threat Taxonomy of Critical Infrastructure Objects and Analysis of Existing Approaches
by: Yu. Komarov
Published: (2020)
by: Yu. Komarov
Published: (2020)
Information Technology for Cost Expert-Analytical Estimation of Computer Systems Applied Software Development and Usage
by: P. I. Andon, et al.
Published: (2018)
by: P. I. Andon, et al.
Published: (2018)
Administrative and legal protection of critical information infrastructure in cyberspace modern
by: Yu. P. Lisovska
Published: (2019)
by: Yu. P. Lisovska
Published: (2019)
Integration of Different Approaches to the Modeling of Critical Infrastructure
by: I. M. Oksanych, et al.
Published: (2024)
by: I. M. Oksanych, et al.
Published: (2024)
Current state of criminal protection of the critical infrastructure facilities
by: Ye. Kucheryna, et al.
Published: (2021)
by: Ye. Kucheryna, et al.
Published: (2021)
Information security of state: defences Ukrainian information field (for example, features information and communication technologies in modern Donbass)
by: L. O. Kochubei
Published: (2015)
by: L. O. Kochubei
Published: (2015)
Information in the natural cyber systems (to definition of the term information)
by: Ja. Reshetnik
Published: (2020)
by: Ja. Reshetnik
Published: (2020)
Information as a tool of state policy: a critical approach
by: O. M. Stoiko
Published: (2018)
by: O. M. Stoiko
Published: (2018)
Functions of the Ministry of defence of Ukraine
by: P. O. Barbul
Published: (2019)
by: P. O. Barbul
Published: (2019)
A network approach in the study of cascading effects critical infrastructures
by: Хоменко, О. М., et al.
Published: (2024)
by: Хоменко, О. М., et al.
Published: (2024)
Economy and defence in the NATO member states
by: Ja. Usiak, et al.
Published: (2014)
by: Ja. Usiak, et al.
Published: (2014)
Legal and organizational provision of protection of the critical information infrastructure from cyberattacks
by: S. M. Tsiapa
Published: (2021)
by: S. M. Tsiapa
Published: (2021)
Legal support of intellectual and value resource in the cyber-modern information capital system
by: Yu. P. Lisovska
Published: (2022)
by: Yu. P. Lisovska
Published: (2022)
The cybersecurity modeling in critical infrastructures
by: H. Kravtsov, et al.
Published: (2015)
by: H. Kravtsov, et al.
Published: (2015)
Cyber socialization: information-technical, educational and legal aspects
by: O. Petriaiev
Published: (2020)
by: O. Petriaiev
Published: (2020)
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems
by: Давидюк, А. В., et al.
Published: (2021)
by: Давидюк, А. В., et al.
Published: (2021)
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems
by: A. V. Davydiuk, et al.
Published: (2021)
by: A. V. Davydiuk, et al.
Published: (2021)
Defence of thesis
by: L. F. Frankevych
Published: (2018)
by: L. F. Frankevych
Published: (2018)
Defence of dissertations
by: D. I. Rytsar
Published: (2012)
by: D. I. Rytsar
Published: (2012)
Defence of dissertations
by: D. I. Rytsar
Published: (2013)
by: D. I. Rytsar
Published: (2013)
Defence of dissertations
by: D. I. Rytsar
Published: (2016)
by: D. I. Rytsar
Published: (2016)
Defence of dissertations
by: D. I. Rytsar
Published: (2014)
by: D. I. Rytsar
Published: (2014)
Defence of dissertations
by: D. I. Rytsar
Published: (2015)
by: D. I. Rytsar
Published: (2015)
Defence of theses
by: V. Poprotska
Published: (1994)
by: V. Poprotska
Published: (1994)
Defence of dissertations
by: D. I. Rytsar
Published: (2011)
by: D. I. Rytsar
Published: (2011)
Defence of dissertations
by: D. I. Rytsar
Published: (2010)
by: D. I. Rytsar
Published: (2010)
Food infrastructure in the system of development state mechanism of food complex
by: O. S. Senyshyn
Published: (2016)
by: O. S. Senyshyn
Published: (2016)
Cyber security graph model of information resources
by: A. V. Nesterenko, et al.
Published: (2020)
by: A. V. Nesterenko, et al.
Published: (2020)
The relationship between information security and cyber security
by: A. V. Tarasiuk
Published: (2019)
by: A. V. Tarasiuk
Published: (2019)
Review of Cyberatakes on Objects of Critical Infrastructure
by: Yu. Komarov
Published: (2019)
by: Yu. Komarov
Published: (2019)
Models of the optimal resources allocation for the critical infrastructure protection
by: V. I. Norkin, et al.
Published: (2018)
by: V. I. Norkin, et al.
Published: (2018)
Cyber-physical systems
by: A. A. Letichevskij, et al.
Published: (2017)
by: A. A. Letichevskij, et al.
Published: (2017)
Information protection by enhancing the effectiveness of counteracting cyber attacks
by: V. D. Havlovskyi
Published: (2019)
by: V. D. Havlovskyi
Published: (2019)
Fundamentals for Cost Estimating of Applied Software Development and Modification
by: P. I. Andon, et al.
Published: (2016)
by: P. I. Andon, et al.
Published: (2016)
The role of the defence counselor in the representation in criminal proceedings
by: V. P. Mashyka
Published: (2019)
by: V. P. Mashyka
Published: (2019)
Improving the security of critical infrastructures through automated organizational management systems
by: O. H. Dodonov, et al.
Published: (2022)
by: O. H. Dodonov, et al.
Published: (2022)
Similar Items
-
Complex approach for state critical information infrastructure cyber defence system constructing
by: Synitsyn, I.P., et al.
Published: (2018) -
Advanced information technologies for the training of cyber defence specialists of the security and defence sector of Ukraine
by: O. M. Bashkyrov, et al.
Published: (2024) -
Cyber security of critical infrastructure during cyber warfare
by: Ya. S. Manuilov
Published: (2023) -
Evaluation of Risks of Cyber Security of Information Systemsof Objects of Critical Infrastructure
by: V. V. Mokhor, et al.
Published: (2019) -
Requirements for a Cyber Threat Taxonomy of Critical Infrastructure Objects and Analysis of Existing Approaches
by: Yu. Komarov
Published: (2020)