Security basic model for applied tasks of the distributed information system
The tasks of modelling and the components of the basic model of applied task protection of a distributed information system have been considered. The measurement and relationship of security parameters, protection, new and reference attacks, anomalies, and threat environments have been proposed. The...
Saved in:
| Date: | 2021 |
|---|---|
| Main Authors: | Rodin, Y.S., Sinitsyn, I.P. |
| Format: | Article |
| Language: | English |
| Published: |
PROBLEMS IN PROGRAMMING
2021
|
| Subjects: | |
| Online Access: | https://pp.isofts.kiev.ua/index.php/ojs1/article/view/457 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Problems in programming |
| Download file: | |
Institution
Problems in programmingSimilar Items
Tasks for information security risks management in making-decision process
by: Rodin, Y.S.
Published: (2018)
by: Rodin, Y.S.
Published: (2018)
Method of information and analytical support for information security risk management of information systems
by: Rodin, Y.S.
Published: (2019)
by: Rodin, Y.S.
Published: (2019)
T-satisfiability test problem for the VL1 logical language of the VRS system
by: Timofeev, V.G.
Published: (2015)
by: Timofeev, V.G.
Published: (2015)
Modern technological aspects of decision support systems
by: Churubrova, S.M.
Published: (2017)
by: Churubrova, S.M.
Published: (2017)
Method of detection of http attacks on a smart home using the algebraic matching method
by: Gorbatiuk, V.O., et al.
Published: (2023)
by: Gorbatiuk, V.O., et al.
Published: (2023)
Increase the temporal efficiency of data structures in memory based on adaptation
by: Shinkarenko, V.I., et al.
Published: (2015)
by: Shinkarenko, V.I., et al.
Published: (2015)
Multilevel additive-multiplicative model of generalized indicators assessment on the basis of balanced scorecard strategic management
by: Stepanuk, M.Y.
Published: (2025)
by: Stepanuk, M.Y.
Published: (2025)
Method for calculating the parameters of phase transitions of discrete technological and information processes of strategic planning with parallelization of computations
by: Stepaniuk, M.Yu.
Published: (2025)
by: Stepaniuk, M.Yu.
Published: (2025)
The method of requirements prioritization in software engineering
by: Nesterenko, O.V.
Published: (2024)
by: Nesterenko, O.V.
Published: (2024)
The concept and evaluating of big data quality in the semantic environment
by: Novitsky, A.V.
Published: (2023)
by: Novitsky, A.V.
Published: (2023)
Game-theoretic approach to the network security problem
by: Ignatenko, O.P.
Published: (2018)
by: Ignatenko, O.P.
Published: (2018)
Потокові моделі мережі Інтернет за умов атак на відмову
by: Andon, P.I., et al.
Published: (2015)
by: Andon, P.I., et al.
Published: (2015)
Security basic model for applied tasks of the distributed information system
by: Rodin, Y.S., et al.
Published: (2021)
by: Rodin, Y.S., et al.
Published: (2021)
Improving of the effectiveness of in-formation provision of defense planning processes through the usage of parallel computing
by: Stepaniuk, M.Y., et al.
Published: (2017)
by: Stepaniuk, M.Y., et al.
Published: (2017)
Decentralized systems in logistics: usage overview and security issues
by: Letichevsky, O.O., et al.
Published: (2020)
by: Letichevsky, O.O., et al.
Published: (2020)
Algebraic modeling in international and local service logistical systems
by: Letychevskyi, O.O., et al.
Published: (2021)
by: Letychevskyi, O.O., et al.
Published: (2021)
Integrated security systems for protecting payment synchronization from MITM attacks
by: Shahmatov, I.O., et al.
Published: (2025)
by: Shahmatov, I.O., et al.
Published: (2025)
Spectrum of sequential number pershopordinal compositional-nominative logics
by: Shkilnyak, S.S.
Published: (2025)
by: Shkilnyak, S.S.
Published: (2025)
Designers sets and multisets of objects
by: Terletskyi, D.O.
Published: (2025)
by: Terletskyi, D.O.
Published: (2025)
Mathematical foundations for designing and development of intelligent systems of information analysis
by: Terletskyi, D.O., et al.
Published: (2025)
by: Terletskyi, D.O., et al.
Published: (2025)
First-order composition-nominative logics with generalized renominations
by: Nikitchenko, M.S., et al.
Published: (2025)
by: Nikitchenko, M.S., et al.
Published: (2025)
Special relations of logical consequence in logics of quasi-ary predicates
by: Shkilniak, S.S.
Published: (2025)
by: Shkilniak, S.S.
Published: (2025)
Logical consequence relations in logics of monotone predicates and logics of antitone predicates
by: Shkilniak, O.S.
Published: (2018)
by: Shkilniak, O.S.
Published: (2018)
Logical consequence relations in logics of quasiary predicates
by: Shkilniak, O.S.
Published: (2018)
by: Shkilniak, O.S.
Published: (2018)
Use of ontologies for personification of semantic retrieval
by: Rogushina, J.V.
Published: (2018)
by: Rogushina, J.V.
Published: (2018)
Logical view for construction-synthesis model of data structures
by: Shynkarenko, V.I., et al.
Published: (2025)
by: Shynkarenko, V.I., et al.
Published: (2025)
First-order logics with partial predicates for checking variable definedness
by: Shkilniak, S.S.
Published: (2025)
by: Shkilniak, S.S.
Published: (2025)
Algebraic patterns of binary code vulnerabilities
by: Yakovlev, V.M.
Published: (2020)
by: Yakovlev, V.M.
Published: (2020)
Challenges and opportunities in the programming environment SEMANTIC WEB
by: Andon, P.I., et al.
Published: (2015)
by: Andon, P.I., et al.
Published: (2015)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
Pure first-order logics of quasiary predicates
by: Nikitchenko, M.S., et al.
Published: (2018)
by: Nikitchenko, M.S., et al.
Published: (2018)
Classification of means and methods of the Web semantic retrieval
by: Rogushina, J.V.
Published: (2018)
by: Rogushina, J.V.
Published: (2018)
Integration of large language models with semantic processing tools as an instrument for knowledge digitization
by: Sinitsyn, I.P., et al.
Published: (2025)
by: Sinitsyn, I.P., et al.
Published: (2025)
Application of Petri component nets in the checking task of parallel distributed systems
by: Lukyanova, E.A.
Published: (2025)
by: Lukyanova, E.A.
Published: (2025)
Distributional semantic modeling: a revised technique to train term/word vector space models applying the ontology-related approach
by: Palagin, O.V., et al.
Published: (2020)
by: Palagin, O.V., et al.
Published: (2020)
Complex approach for state critical information infrastructure cyber defence system constructing
by: Synitsyn, I.P., et al.
Published: (2018)
by: Synitsyn, I.P., et al.
Published: (2018)
DS-theory. Research of R-data division factors in order to generate applied algorithms. Part 1
by: Kolesnyk, V.G.
Published: (2017)
by: Kolesnyk, V.G.
Published: (2017)
Characteristics for choice of models in the ansables classification
by: Barmak, O.V., et al.
Published: (2018)
by: Barmak, O.V., et al.
Published: (2018)
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021)
by: Шиян, А. А., et al.
Published: (2021)
Semantic alignment of ontologies meaningful categories with the generalization of descriptive structures
by: Manziuk, E.A., et al.
Published: (2023)
by: Manziuk, E.A., et al.
Published: (2023)
Similar Items
-
Tasks for information security risks management in making-decision process
by: Rodin, Y.S.
Published: (2018) -
Method of information and analytical support for information security risk management of information systems
by: Rodin, Y.S.
Published: (2019) -
T-satisfiability test problem for the VL1 logical language of the VRS system
by: Timofeev, V.G.
Published: (2015) -
Modern technological aspects of decision support systems
by: Churubrova, S.M.
Published: (2017) -
Method of detection of http attacks on a smart home using the algebraic matching method
by: Gorbatiuk, V.O., et al.
Published: (2023)