Complex approach for state critical information infrastructure cyber defence system constructing
Complex Approach for problems solving to enable Cyber Defence for State Critical Information Infrastructure Objects through best world and home practices, and also approved hardware and software and only software Cyber Defence Tools is presented. Cyber Security Guidance Intellectual Information Tech...
Saved in:
| Date: | 2018 |
|---|---|
| Main Authors: | Synitsyn, I.P., Ignatenko, P.P., Slabospitskaya, О.A., Artemenko, A.V. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
PROBLEMS IN PROGRAMMING
2018
|
| Subjects: | |
| Online Access: | https://pp.isofts.kiev.ua/index.php/ojs1/article/view/301 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Problems in programming |
| Download file: | |
Institution
Problems in programmingSimilar Items
Automation of standardized cyber insurance processes
by: Khudyntsev, Mykola, et al.
Published: (2025)
by: Khudyntsev, Mykola, et al.
Published: (2025)
Features for providing of cyber security
by: Prysiazhniuk, M. M., et al.
Published: (2017)
by: Prysiazhniuk, M. M., et al.
Published: (2017)
Neurosymbolic models for ensuring cybersecurity in critical cyberphysical systems
by: Yevdokymov, S.O.
Published: (2025)
by: Yevdokymov, S.O.
Published: (2025)
Organizational and legal mechanisms of cybersecurity and cyber defense in Ukraine: essentiality, conditions and development prospects
by: Semenchenko, A.I., et al.
Published: (2020)
by: Semenchenko, A.I., et al.
Published: (2020)
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: Дьогтєва, І. О., et al.
Published: (2021)
by: Дьогтєва, І. О., et al.
Published: (2021)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
Cyber Resilience Key Metrics in Small and Medium-Sized Enterprises
by: Deruma, Sintija
Published: (2025)
by: Deruma, Sintija
Published: (2025)
Improvement of protection for WEB resources from attacks based on combined heuristic and statistical approach
by: Prysiazhnyi, D. P.
Published: (2016)
by: Prysiazhnyi, D. P.
Published: (2016)
Method of detection of http attacks on a smart home using the algebraic matching method
by: Gorbatiuk, V.O., et al.
Published: (2023)
by: Gorbatiuk, V.O., et al.
Published: (2023)
Technology system integration of hardware and software data protection
by: Alishоv, N.I., et al.
Published: (2025)
by: Alishоv, N.I., et al.
Published: (2025)
Ontology-based semantic similarity to metadata analysis in the information security domain
by: Gladun, A.Y., et al.
Published: (2021)
by: Gladun, A.Y., et al.
Published: (2021)
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021)
by: Шиян, А. А., et al.
Published: (2021)
Developing a conceptual framework for resilience in information systems
by: Korobeynikov, F.O.
Published: (2024)
by: Korobeynikov, F.O.
Published: (2024)
Reputation-based secyrity for heterogtneous structurally complex systems
by: Kussul, O.M.
Published: (2015)
by: Kussul, O.M.
Published: (2015)
Using Bayesian network models for early assessment of cyberattack threats to electricity generation facility
by: Гальчинський, Л. Ю., et al.
Published: (2025)
by: Гальчинський, Л. Ю., et al.
Published: (2025)
Information security policy in the systems of information and analytical maintenance for support of organizational decisions
by: Churubrova, S.M.
Published: (2018)
by: Churubrova, S.M.
Published: (2018)
The problems of massive construction of the integrated information security system (IISS) and a ways of their solution
by: Koltyk, M.A.
Published: (2025)
by: Koltyk, M.A.
Published: (2025)
System-ontological analysis the subject area of testing integrated information security system (IISS)
by: Koltyk, M.A.
Published: (2025)
by: Koltyk, M.A.
Published: (2025)
Methods and ways for realization of the automated support testing of the integrated information security system
by: Koltyk, M. A.
Published: (2025)
by: Koltyk, M. A.
Published: (2025)
Characteristics of information flows of software modules included in the software for automated support of ...
by: Borovskaya, E.N., et al.
Published: (2025)
by: Borovskaya, E.N., et al.
Published: (2025)
Game-theoretic approach to the network security problem
by: Ignatenko, O.P.
Published: (2018)
by: Ignatenko, O.P.
Published: (2018)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
Потокові моделі мережі Інтернет за умов атак на відмову
by: Andon, P.I., et al.
Published: (2015)
by: Andon, P.I., et al.
Published: (2015)
Integrated security systems for protecting payment synchronization from MITM attacks
by: Shahmatov, I.O., et al.
Published: (2025)
by: Shahmatov, I.O., et al.
Published: (2025)
About applicability of NATO logistics information systems in Ukraine
by: Stepaniuk, M.Y., et al.
Published: (2019)
by: Stepaniuk, M.Y., et al.
Published: (2019)
Security basic model for applied tasks of the distributed information system
by: Rodin, Y.S., et al.
Published: (2021)
by: Rodin, Y.S., et al.
Published: (2021)
Creating Web Application for Organizing Teamwork Online Using Microsoft Azure Cloud Services
by: Tiutiunnyk, P.B., et al.
Published: (2021)
by: Tiutiunnyk, P.B., et al.
Published: (2021)
Development of a Digital Twin of The Technological Process of Consumable Pattern Casting Using Production Data
by: Doroshenko, V.S., et al.
Published: (2020)
by: Doroshenko, V.S., et al.
Published: (2020)
Information Technology of Video Data Processing for Traffic Intensity Monitoring
by: Stelmakh, O.P., et al.
Published: (2020)
by: Stelmakh, O.P., et al.
Published: (2020)
The Tools for Intelligent Data Analysis, Modeling and Forecasting Of Social and Economic Processes
by: Savchenko-Synyakova, Ye.A., et al.
Published: (2021)
by: Savchenko-Synyakova, Ye.A., et al.
Published: (2021)
Цифрова бізнес-модель промислового підприємства виробів
by: Музальова, В.О., et al.
Published: (2021)
by: Музальова, В.О., et al.
Published: (2021)
The Digital Twin and Optimization of Cast Metal Structures in Additive Manufacturing
by: Doroshenko, V.S., et al.
Published: (2020)
by: Doroshenko, V.S., et al.
Published: (2020)
Криптосемантична система захисту текстової інформації
by: Одарченко, Р.С., et al.
Published: (2020)
by: Одарченко, Р.С., et al.
Published: (2020)
"Розумне" підприємство – основні властивості та напрямки розвитку
by: Мейтус, В.Ю., et al.
Published: (2020)
by: Мейтус, В.Ю., et al.
Published: (2020)
Automatic Speech Recognition For Ukrainian Broadcast Media Transcribing
by: Sazhok, M.M., et al.
Published: (2019)
by: Sazhok, M.M., et al.
Published: (2019)
Застосування технологій ІоТ для кіберфізичних систем розумного підприємства
by: Майданюк, Н.В.
Published: (2020)
by: Майданюк, Н.В.
Published: (2020)
Метод виявлення іменних груп в україномовних текстах
by: Погорілий, С.Д., et al.
Published: (2019)
by: Погорілий, С.Д., et al.
Published: (2019)
Аналіз систем підтримки розумного будинку
by: Глибовець, А.М., et al.
Published: (2019)
by: Глибовець, А.М., et al.
Published: (2019)
Metalearning as One of the Task of the Machine Learning Problems
by: Savchenko, Ye.A., et al.
Published: (2019)
by: Savchenko, Ye.A., et al.
Published: (2019)
Ontology Application to Construct Inductive Modeling Tools with Intelligent Interface
by: Pidnebesna, H.A., et al.
Published: (2020)
by: Pidnebesna, H.A., et al.
Published: (2020)
Similar Items
-
Automation of standardized cyber insurance processes
by: Khudyntsev, Mykola, et al.
Published: (2025) -
Features for providing of cyber security
by: Prysiazhniuk, M. M., et al.
Published: (2017) -
Neurosymbolic models for ensuring cybersecurity in critical cyberphysical systems
by: Yevdokymov, S.O.
Published: (2025) -
Organizational and legal mechanisms of cybersecurity and cyber defense in Ukraine: essentiality, conditions and development prospects
by: Semenchenko, A.I., et al.
Published: (2020) -
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: Дьогтєва, І. О., et al.
Published: (2021)