Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
Saved in:
| Date: | 2021 |
|---|---|
| Main Authors: | I. O. Dohtieva, A. A. Shyian, V. S. Kataiev |
| Format: | Article |
| Language: | English |
| Published: |
2021
|
| Series: | Data recording, storage & processing |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0001369263 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: Дьогтєва, І. О., et al.
Published: (2021)
by: Дьогтєва, І. О., et al.
Published: (2021)
Information protection by enhancing the effectiveness of counteracting cyber attacks
by: V. D. Havlovskyi
Published: (2019)
by: V. D. Havlovskyi
Published: (2019)
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Zubok, V. Yu.
Published: (2020)
by: Zubok, V. Yu.
Published: (2020)
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Yu. Zubok
Published: (2020)
by: Yu. Zubok
Published: (2020)
A model of control for counterac-ting against information attacks in cyberspace
by: A. A. Shyian, et al.
Published: (2021)
by: A. A. Shyian, et al.
Published: (2021)
The essence and content of the investigation of cyber incidents and cyberattacks by the Security Service of Ukraine units
by: M. V. Kuleshov
Published: (2019)
by: M. V. Kuleshov
Published: (2019)
The relationship between information security and cyber security
by: A. V. Tarasiuk
Published: (2019)
by: A. V. Tarasiuk
Published: (2019)
Organizational and legal framework for addressing cyber attacks in the European Union
by: S. H. Petrov
Published: (2020)
by: S. H. Petrov
Published: (2020)
Cyber security graph model of information resources
by: A. V. Nesterenko, et al.
Published: (2020)
by: A. V. Nesterenko, et al.
Published: (2020)
Simulation and Visualization of Cyber Attacks in the Energy Sector Using Computer Distributed Training Systems
by: V. A. Gureev, et al.
Published: (2019)
by: V. A. Gureev, et al.
Published: (2019)
Cyber security of critical infrastructure during cyber warfare
by: Ya. S. Manuilov
Published: (2023)
by: Ya. S. Manuilov
Published: (2023)
Features for providing of cyber security
by: Prysiazhniuk, M. M., et al.
Published: (2017)
by: Prysiazhniuk, M. M., et al.
Published: (2017)
Features for providing of cyber security
by: M. M. Prysiazhniuk, et al.
Published: (2017)
by: M. M. Prysiazhniuk, et al.
Published: (2017)
Evaluation of Risks of Cyber Security of Information Systemsof Objects of Critical Infrastructure
by: V. V. Mokhor, et al.
Published: (2019)
by: V. V. Mokhor, et al.
Published: (2019)
Information and Library Support of virtual research teams
by: N. Veretennikova
Published: (2016)
by: N. Veretennikova
Published: (2016)
Current US experience in cyber security
by: S. M. Stezhko, et al.
Published: (2021)
by: S. M. Stezhko, et al.
Published: (2021)
A combination of traditional methods and a metric approach to assessing the risks from cyber attacks to global routing.
by: Zubok, V. Yu.
Published: (2019)
by: Zubok, V. Yu.
Published: (2019)
A combination of traditional methods and a metric approach to assessing the risks from cyber attacks to global routing
by: Yu. Zubok
Published: (2019)
by: Yu. Zubok
Published: (2019)
Advanced information technologies for the training of cyber defence specialists of the security and defence sector of Ukraine
by: O. M. Bashkyrov, et al.
Published: (2024)
by: O. M. Bashkyrov, et al.
Published: (2024)
Overview of novels of domestic legislation in the field of cyber security (on the example of the Cyber Security Strategy of Ukraine for 2021 – 2025)
by: Ya. S. Manuilov
Published: (2021)
by: Ya. S. Manuilov
Published: (2021)
Construction of distribution functions with controlled intensity of refuses
by: I. O. Dohtieva
Published: (2015)
by: I. O. Dohtieva
Published: (2015)
European experience of strengthening cyber security capacities in modern conditions
by: O. M. Kuznietsov
Published: (2021)
by: O. M. Kuznietsov
Published: (2021)
Recognition of pathogen attacks by plant immune sensors and their initiation of the immune response
by: S. M. Shamrai
Published: (2022)
by: S. M. Shamrai
Published: (2022)
Corporate cyber security culture for scientific and research institutions
by: O. D. Dovhan, et al.
Published: (2018)
by: O. D. Dovhan, et al.
Published: (2018)
Combating cyber security threats on a global level
by: O. D. Dovhan, et al.
Published: (2020)
by: O. D. Dovhan, et al.
Published: (2020)
Information in the natural cyber systems (to definition of the term information)
by: Ja. Reshetnik
Published: (2020)
by: Ja. Reshetnik
Published: (2020)
Securing Ukraine through Cyber Financial Crimes Mitigation
by: P. P. Debbins
Published: (2019)
by: P. P. Debbins
Published: (2019)
Integrated security systems for protecting payment synchronization from MITM attacks
by: Shahmatov, I.O., et al.
Published: (2025)
by: Shahmatov, I.O., et al.
Published: (2025)
Information intellectual system of analysis of the scientific and scientific-pedagogical activities of the academic team
by: A. V. Yushko, et al.
Published: (2024)
by: A. V. Yushko, et al.
Published: (2024)
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021)
by: Шиян, А. А., et al.
Published: (2021)
Global culture of cyber security In the Syber Srime Rrevention System in Ukraine
by: O. D. Dovhan, et al.
Published: (2018)
by: O. D. Dovhan, et al.
Published: (2018)
Cyber socialization: information-technical, educational and legal aspects
by: O. Petriaiev
Published: (2020)
by: O. Petriaiev
Published: (2020)
Some issues of improving state planning in the sphere of cyber security in conditions of hybrid threats
by: S. M. Hriboiedov
Published: (2021)
by: S. M. Hriboiedov
Published: (2021)
Security of Poseidon hash function against non-binary differential and linear attacks
by: L. Kovalchuk, et al.
Published: (2021)
by: L. Kovalchuk, et al.
Published: (2021)
Security of Poseidon hash function against non-binary differential and linear attacks
by: Kovalchuk, L., et al.
Published: (2021)
by: Kovalchuk, L., et al.
Published: (2021)
Information space and cyber space as a source of modern threats
by: A. B. Kachynskyi, et al.
Published: (2019)
by: A. B. Kachynskyi, et al.
Published: (2019)
Information technology protection and cyber security (transcript of scientific report at the meeting of the Presidium of NAS of Ukraine, September 25, 2019)
by: M. M. Savchuk
Published: (2019)
by: M. M. Savchuk
Published: (2019)
Cyber security as an important factor of ensuring the life of the domestic energy industry
by: S. M. Stezhko, et al.
Published: (2021)
by: S. M. Stezhko, et al.
Published: (2021)
Problems of legal regulation and development of cyber security of Ukraine at the current stage
by: O. V. Kostenko
Published: (2019)
by: O. V. Kostenko
Published: (2019)
The Aircraft Landing Management in Conditions of Increasing the Air Traffic Intensity
by: D. O. Volosheniuk, et al.
Published: (2017)
by: D. O. Volosheniuk, et al.
Published: (2017)
Similar Items
-
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: Дьогтєва, І. О., et al.
Published: (2021) -
Information protection by enhancing the effectiveness of counteracting cyber attacks
by: V. D. Havlovskyi
Published: (2019) -
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Zubok, V. Yu.
Published: (2020) -
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Yu. Zubok
Published: (2020) -
A model of control for counterac-ting against information attacks in cyberspace
by: A. A. Shyian, et al.
Published: (2021)