Complex approach for state critical information infrastructure cyber defence system constructing
Complex Approach for problems solving to enable Cyber Defence for State Critical Information Infrastructure Objects through best world and home practices, and also approved hardware and software and only software Cyber Defence Tools is presented. Cyber Security Guidance Intellectual Information Tech...
Saved in:
| Date: | 2018 |
|---|---|
| Main Authors: | Synitsyn, I.P., Ignatenko, P.P., Slabospitskaya, О.A., Artemenko, A.V. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
PROBLEMS IN PROGRAMMING
2018
|
| Subjects: | |
| Online Access: | https://pp.isofts.kiev.ua/index.php/ojs1/article/view/301 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Problems in programming |
| Download file: | |
Institution
Problems in programmingSimilar Items
Automation of standardized cyber insurance processes
by: Khudyntsev, Mykola, et al.
Published: (2025)
by: Khudyntsev, Mykola, et al.
Published: (2025)
Features for providing of cyber security
by: Prysiazhniuk, M. M., et al.
Published: (2017)
by: Prysiazhniuk, M. M., et al.
Published: (2017)
Neurosymbolic models for ensuring cybersecurity in critical cyberphysical systems
by: Yevdokymov, S.O.
Published: (2025)
by: Yevdokymov, S.O.
Published: (2025)
Organizational and legal mechanisms of cybersecurity and cyber defense in Ukraine: essentiality, conditions and development prospects
by: Semenchenko, A.I., et al.
Published: (2020)
by: Semenchenko, A.I., et al.
Published: (2020)
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: Дьогтєва, І. О., et al.
Published: (2021)
by: Дьогтєва, І. О., et al.
Published: (2021)
Cyber Resilience Key Metrics in Small and Medium-Sized Enterprises
by: Deruma, Sintija
Published: (2025)
by: Deruma, Sintija
Published: (2025)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
Improvement of protection for WEB resources from attacks based on combined heuristic and statistical approach
by: Prysiazhnyi, D. P.
Published: (2016)
by: Prysiazhnyi, D. P.
Published: (2016)
Method of detection of http attacks on a smart home using the algebraic matching method
by: Gorbatiuk, V.O., et al.
Published: (2023)
by: Gorbatiuk, V.O., et al.
Published: (2023)
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021)
by: Шиян, А. А., et al.
Published: (2021)
Ontology-based semantic similarity to metadata analysis in the information security domain
by: Gladun, A.Y., et al.
Published: (2021)
by: Gladun, A.Y., et al.
Published: (2021)
Technology system integration of hardware and software data protection
by: Alishоv, N.I., et al.
Published: (2025)
by: Alishоv, N.I., et al.
Published: (2025)
Developing a conceptual framework for resilience in information systems
by: Korobeynikov, F.O.
Published: (2024)
by: Korobeynikov, F.O.
Published: (2024)
Reputation-based secyrity for heterogtneous structurally complex systems
by: Kussul, O.M.
Published: (2015)
by: Kussul, O.M.
Published: (2015)
Using Bayesian network models for early assessment of cyberattack threats to electricity generation facility
by: Гальчинський, Л. Ю., et al.
Published: (2025)
by: Гальчинський, Л. Ю., et al.
Published: (2025)
Information security policy in the systems of information and analytical maintenance for support of organizational decisions
by: Churubrova, S.M.
Published: (2018)
by: Churubrova, S.M.
Published: (2018)
System-ontological analysis the subject area of testing integrated information security system (IISS)
by: Koltyk, M.A.
Published: (2025)
by: Koltyk, M.A.
Published: (2025)
Characteristics of information flows of software modules included in the software for automated support of ...
by: Borovskaya, E.N., et al.
Published: (2025)
by: Borovskaya, E.N., et al.
Published: (2025)
Methods and ways for realization of the automated support testing of the integrated information security system
by: Koltyk, M. A.
Published: (2025)
by: Koltyk, M. A.
Published: (2025)
The problems of massive construction of the integrated information security system (IISS) and a ways of their solution
by: Koltyk, M.A.
Published: (2025)
by: Koltyk, M.A.
Published: (2025)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
Game-theoretic approach to the network security problem
by: Ignatenko, O.P.
Published: (2018)
by: Ignatenko, O.P.
Published: (2018)
Creating Web Application for Organizing Teamwork Online Using Microsoft Azure Cloud Services
by: Tiutiunnyk, P.B., et al.
Published: (2021)
by: Tiutiunnyk, P.B., et al.
Published: (2021)
Development of a Digital Twin of The Technological Process of Consumable Pattern Casting Using Production Data
by: Doroshenko, V.S., et al.
Published: (2020)
by: Doroshenko, V.S., et al.
Published: (2020)
Information Technology of Video Data Processing for Traffic Intensity Monitoring
by: Stelmakh, O.P., et al.
Published: (2020)
by: Stelmakh, O.P., et al.
Published: (2020)
Потокові моделі мережі Інтернет за умов атак на відмову
by: Andon, P.I., et al.
Published: (2015)
by: Andon, P.I., et al.
Published: (2015)
Smart Enterprise as a Modern Form of Existence of Traditional Enterprise in the Digital Economy
by: Meytus, V.Yu., et al.
Published: (2020)
by: Meytus, V.Yu., et al.
Published: (2020)
Digital Economy and Digital Twins. Main Research Area
by: Meytus, V.Yu., et al.
Published: (2020)
by: Meytus, V.Yu., et al.
Published: (2020)
Integrated security systems for protecting payment synchronization from MITM attacks
by: Shahmatov, I.O., et al.
Published: (2025)
by: Shahmatov, I.O., et al.
Published: (2025)
The Tools for Intelligent Data Analysis, Modeling and Forecasting Of Social and Economic Processes
by: Savchenko-Synyakova, Ye.A., et al.
Published: (2021)
by: Savchenko-Synyakova, Ye.A., et al.
Published: (2021)
Оцінювання та прогнозування демографічної сфери економічної безпеки
by: Волощук, Р.В.
Published: (2020)
by: Волощук, Р.В.
Published: (2020)
Застосування технологій IoT та хмарних сервісів для радіаційного моніторингу
by: Терьохін, В.Л., et al.
Published: (2021)
by: Терьохін, В.Л., et al.
Published: (2021)
Цифрова бізнес-модель промислового підприємства виробів
by: Музальова, В.О., et al.
Published: (2021)
by: Музальова, В.О., et al.
Published: (2021)
AdvisOnt: Семантизація сервісів агродорадництва для валідації результатів неформального та інформального навчання. I
by: Строкань, О.В., et al.
Published: (2021)
by: Строкань, О.В., et al.
Published: (2021)
Конструювання комплексу інструментальних засобів індуктивного моделювання з використанням онтологій
by: Піднебесна, Г.A.
Published: (2020)
by: Піднебесна, Г.A.
Published: (2020)
The Virtual Sensors for Intelligent Control of the Mobile Robot
by: Sukhoruchkina, O.N.
Published: (2019)
by: Sukhoruchkina, O.N.
Published: (2019)
Metalearning as One of the Task of the Machine Learning Problems
by: Savchenko, Ye.A., et al.
Published: (2019)
by: Savchenko, Ye.A., et al.
Published: (2019)
"Розумне" підприємство – основні властивості та напрямки розвитку
by: Мейтус, В.Ю., et al.
Published: (2020)
by: Мейтус, В.Ю., et al.
Published: (2020)
Automatic Speech Recognition For Ukrainian Broadcast Media Transcribing
by: Sazhok, M.M., et al.
Published: (2019)
by: Sazhok, M.M., et al.
Published: (2019)
Застосування технологій ІоТ для кіберфізичних систем розумного підприємства
by: Майданюк, Н.В.
Published: (2020)
by: Майданюк, Н.В.
Published: (2020)
Similar Items
-
Automation of standardized cyber insurance processes
by: Khudyntsev, Mykola, et al.
Published: (2025) -
Features for providing of cyber security
by: Prysiazhniuk, M. M., et al.
Published: (2017) -
Neurosymbolic models for ensuring cybersecurity in critical cyberphysical systems
by: Yevdokymov, S.O.
Published: (2025) -
Organizational and legal mechanisms of cybersecurity and cyber defense in Ukraine: essentiality, conditions and development prospects
by: Semenchenko, A.I., et al.
Published: (2020) -
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: Дьогтєва, І. О., et al.
Published: (2021)