A model of control for counterac-ting against information attacks in cyberspace
Saved in:
| Date: | 2021 |
|---|---|
| Main Authors: | A. A. Shyian, L. O. Nikiforova, I. O. Dohtieva, Ya. Yu. Yaremchuk |
| Format: | Article |
| Language: | English |
| Published: |
2021
|
| Series: | Data recording, storage & processing |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0001273342 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021)
by: Шиян, А. А., et al.
Published: (2021)
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: I. O. Dohtieva, et al.
Published: (2021)
by: I. O. Dohtieva, et al.
Published: (2021)
A systematic approach to the analysis of phenomena of the information and cyberspaces
by: A. B. Kachynskyi, et al.
Published: (2020)
by: A. B. Kachynskyi, et al.
Published: (2020)
Administrative and legal protection of critical information infrastructure in cyberspace modern
by: Yu. P. Lisovska
Published: (2019)
by: Yu. P. Lisovska
Published: (2019)
On the issue of protection of cyberspace Ukraine
by: V. D. Havlovskyi
Published: (2016)
by: V. D. Havlovskyi
Published: (2016)
Principle of relevance as an information indicator of quality of administrative and legal standards in modern cyberspace
by: Yu. P. Lisovska
Published: (2022)
by: Yu. P. Lisovska
Published: (2022)
The use of force in cyberspace under international law
by: Yu. Yatsyshyn
Published: (2018)
by: Yu. Yatsyshyn
Published: (2018)
Genetic algorithm for SDN protection against network attacks
by: S. I. Zabelin
Published: (2016)
by: S. I. Zabelin
Published: (2016)
Security of Poseidon hash function against non-binary differential and linear attacks
by: L. Kovalchuk, et al.
Published: (2021)
by: L. Kovalchuk, et al.
Published: (2021)
Security of Poseidon hash function against non-binary differential and linear attacks
by: Kovalchuk, L., et al.
Published: (2021)
by: Kovalchuk, L., et al.
Published: (2021)
Information protection by enhancing the effectiveness of counteracting cyber attacks
by: V. D. Havlovskyi
Published: (2019)
by: V. D. Havlovskyi
Published: (2019)
Security estimates of a Ring-LWE symmetric cryptosystem against chosen plaintext attack
by: S. M. Ignatenko
Published: (2020)
by: S. M. Ignatenko
Published: (2020)
Hydrograph fore - cas ting using the SWAT model (Soil and Water As sessment Tool) on the example of the Desna basin
by: V. V. Osypov, et al.
Published: (2020)
by: V. V. Osypov, et al.
Published: (2020)
Expansion of Parthenocissus quinquefolia (L.) Planch. into plan¬tings of Kryvyi Rih area
by: I. I. Korshykov, et al.
Published: (2017)
by: I. I. Korshykov, et al.
Published: (2017)
Analytical support of the microcredit¬ting process using a fuzzy inference system
by: E. R. Aliev, et al.
Published: (2021)
by: E. R. Aliev, et al.
Published: (2021)
Security Justification for Strumok Stream Cipher Against Correlation Attacks Over Finite Fields of Characteristic 2
by: A. M. Oleksiichuk, et al.
Published: (2019)
by: A. M. Oleksiichuk, et al.
Published: (2019)
A three-layer defense mechanism based on web servers against distributed denial of service attacks
by: A. T. Rakhmanov, et al.
Published: (2019)
by: A. T. Rakhmanov, et al.
Published: (2019)
Features of the Model of the Offender at the Analysis of Attacks on Global Internet Routing
by: Yu. Zubok
Published: (2019)
by: Yu. Zubok
Published: (2019)
Modeling of Attack Detection System based on Hybridization of Binary Classifiers
by: O. I. Belei, et al.
Published: (2020)
by: O. I. Belei, et al.
Published: (2020)
Hemostasis indices in transient ischemic attacks
by: I. A. Hryhorova, et al.
Published: (2021)
by: I. A. Hryhorova, et al.
Published: (2021)
Construction of distribution functions with controlled intensity of refuses
by: I. O. Dohtieva
Published: (2015)
by: I. O. Dohtieva
Published: (2015)
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: Дьогтєва, І. О., et al.
Published: (2021)
by: Дьогтєва, І. О., et al.
Published: (2021)
Distinguishing attack on the NTRUCipher encryption scheme
by: A. M. Oleksiichuk, et al.
Published: (2022)
by: A. M. Oleksiichuk, et al.
Published: (2022)
A method for security evaluation of SNOW 2.0-like ciphers against correlation attacks over finite extensions of the field of two elements
by: A. N. Aleksejchuk, et al.
Published: (2020)
by: A. N. Aleksejchuk, et al.
Published: (2020)
Construction of a multi-agent attack detection system based on artificial intelligence models
by: O. Belej, et al.
Published: (2021)
by: O. Belej, et al.
Published: (2021)
Neurosymbolic approach for attack detection in satellite communication systems
by: Mostovyi, O.S.
Published: (2024)
by: Mostovyi, O.S.
Published: (2024)
A discrete mathematical model SIRS with the evolution of regions to attack infectious diseases
by: Y. Benfatah, et al.
Published: (2023)
by: Y. Benfatah, et al.
Published: (2023)
Mathematical model of noise interference for information protection against leakage by technical channels
by: S. A. Ivanchenko
Published: (2017)
by: S. A. Ivanchenko
Published: (2017)
Neural Network System for Transient Ischemic Attacks Diagnostics
by: V. A. Golovko, et al.
Published: (2014)
by: V. A. Golovko, et al.
Published: (2014)
CONDUCTIVITY OF SOLID FLUORIDE-CONDUCTING PHASES BaxPb0.86-xSn1.14F4
by: Nahornyi, Anton, et al.
Published: (2022)
by: Nahornyi, Anton, et al.
Published: (2022)
Construction of subsystem determination of attacks in cyberphysical systems by neural network methods
by: O. Belej, et al.
Published: (2021)
by: O. Belej, et al.
Published: (2021)
Mathematical algorithm for detecting XSS attacks on web applications
by: Kh. Khamdamov, et al.
Published: (2021)
by: Kh. Khamdamov, et al.
Published: (2021)
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Yu. Zubok
Published: (2020)
by: Yu. Zubok
Published: (2020)
Public resistance against anti-Ukrainian information warfare
by: O. O. Zorych
Published: (2015)
by: O. O. Zorych
Published: (2015)
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Zubok, V. Yu.
Published: (2020)
by: Zubok, V. Yu.
Published: (2020)
Hierarchy of factors of DDOS-attacks typical implementation scenarios. Volume 2
by: A. B. Kachynskyi, et al.
Published: (2018)
by: A. B. Kachynskyi, et al.
Published: (2018)
Hierarchy of factors of DDOS-attacks typical implementation scenarios. Volume 1
by: A. B. Kachynskyi, et al.
Published: (2017)
by: A. B. Kachynskyi, et al.
Published: (2017)
Pathogenetic predictor of endothelial dysfunction in patients with cardioembolic and atherothrombotic transient ischemic attacks
by: I. A. Hryhorova, et al.
Published: (2019)
by: I. A. Hryhorova, et al.
Published: (2019)
Modelling of choice on the optimal method for counteract of information security threats
by: Nikiforova, L. O., et al.
Published: (2014)
by: Nikiforova, L. O., et al.
Published: (2014)
Integrated security systems for protecting payment synchronization from MITM attacks
by: Shahmatov, I.O., et al.
Published: (2025)
by: Shahmatov, I.O., et al.
Published: (2025)
Similar Items
-
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021) -
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: I. O. Dohtieva, et al.
Published: (2021) -
A systematic approach to the analysis of phenomena of the information and cyberspaces
by: A. B. Kachynskyi, et al.
Published: (2020) -
Administrative and legal protection of critical information infrastructure in cyberspace modern
by: Yu. P. Lisovska
Published: (2019) -
On the issue of protection of cyberspace Ukraine
by: V. D. Havlovskyi
Published: (2016)