Creation model of threat and violations information for test object using ontology testing integrated information security system (IISS)
Prombles in programming 2014; 4: 48-58
Saved in:
| Date: | 2019 |
|---|---|
| Main Author: | Koltiik, M.A. |
| Format: | Article |
| Language: | Russian |
| Published: |
PROBLEMS IN PROGRAMMING
2019
|
| Subjects: | |
| Online Access: | https://pp.isofts.kiev.ua/index.php/ojs1/article/view/683 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Problems in programming |
| Download file: | |
Institution
Problems in programmingSimilar Items
System-ontological analysis the subject area of testing integrated information security system (IISS)
by: Koltyk, M.A.
Published: (2025)
by: Koltyk, M.A.
Published: (2025)
The problems of massive construction of the integrated information security system (IISS) and a ways of their solution
by: Koltyk, M.A.
Published: (2025)
by: Koltyk, M.A.
Published: (2025)
Methods and ways for realization of the automated support testing of the integrated information security system
by: Koltyk, M. A.
Published: (2025)
by: Koltyk, M. A.
Published: (2025)
Information threats and security services
by: Antonyuk, A.A., et al.
Published: (2015)
by: Antonyuk, A.A., et al.
Published: (2015)
Use of thesauruses for search of complex information objects on Web on the basis of ontologies
by: Rogushina, J.V.
Published: (2019)
by: Rogushina, J.V.
Published: (2019)
The use of ontological knowledge for multi-criteria comparison of complex information objects
by: Rogushina, J.V., et al.
Published: (2023)
by: Rogushina, J.V., et al.
Published: (2023)
Use of thesauruses for search of complex information objects on Web on the basis of ontologies
by: Yu. V. Rohushyna
Published: (2019)
by: Yu. V. Rohushyna
Published: (2019)
Classification of Information Security Threats of Automated System
by: A. B. Stepanjan, et al.
Published: (2013)
by: A. B. Stepanjan, et al.
Published: (2013)
Studying the Information Security Threats to Ukrainian Enterprises by Using Variance Analysis
by: O. M. Sazonets, et al.
Published: (2016)
by: O. M. Sazonets, et al.
Published: (2016)
Modelling of choice on the optimal method for counteract of information security threats
by: Nikiforova, L. O., et al.
Published: (2014)
by: Nikiforova, L. O., et al.
Published: (2014)
Stability of control attributes of code of conditional residues in terms of threats for integrity of information objects
by: Mаtоv, O. Y., et al.
Published: (2015)
by: Mаtоv, O. Y., et al.
Published: (2015)
Information security as an object of crime
by: A. V. Landina
Published: (2016)
by: A. V. Landina
Published: (2016)
Тechnology of security confidential information from inside threats
by: Antoniuk, A.A., et al.
Published: (2025)
by: Antoniuk, A.A., et al.
Published: (2025)
Concealed Information Test with Combination of ERP Recording and Autonomic Measurements
by: Farahani, E.D., et al.
Published: (2013)
by: Farahani, E.D., et al.
Published: (2013)
Concealed Information Test with Combination of ERP Recording and Autonomic Measurements
by: E. D. Farahani, et al.
Published: (2013)
by: E. D. Farahani, et al.
Published: (2013)
Ontology-based semantic similarity to metadata analysis in the information security domain
by: Gladun, A.Y., et al.
Published: (2021)
by: Gladun, A.Y., et al.
Published: (2021)
Ontology-based semantic similarity to metadata analysis in the information security domain
by: Ya. Gladun, et al.
Published: (2021)
by: Ya. Gladun, et al.
Published: (2021)
Ontology-based semantic similarity to metadata analysis in the information security domain
by: Gladun, A.Y., et al.
Published: (2021)
by: Gladun, A.Y., et al.
Published: (2021)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
Creation and testing modernized measuring probes with overconducting antennas
by: M. I. Mudrenko, et al.
Published: (2018)
by: M. I. Mudrenko, et al.
Published: (2018)
Hash functions and integrity of information objects
by: Mаtоv, O. Ya., et al.
Published: (2014)
by: Mаtоv, O. Ya., et al.
Published: (2014)
Information technology for the proctor to detect violations during the exam
by: D. Muratuly, et al.
Published: (2022)
by: D. Muratuly, et al.
Published: (2022)
Administrative responsibility for violation of legislation on information in border sphere
by: I. P. Kushnir
Published: (2019)
by: I. P. Kushnir
Published: (2019)
Non-destructive testing of higher hazard objects
by: V. A. Troitskij, et al.
Published: (2015)
by: V. A. Troitskij, et al.
Published: (2015)
Creation and test of applied software of network of wireless sensors for agriculture
by: Romanov, V.O., et al.
Published: (2022)
by: Romanov, V.O., et al.
Published: (2022)
Creation and test of applied software of network of wireless sensors for agriculture
by: Romanov, V.O., et al.
Published: (2023)
by: Romanov, V.O., et al.
Published: (2023)
The Using of Cloud Technologies as a Way to Improve the Security of Test Training Systems
by: N. A. Maslova, et al.
Published: (2013)
by: N. A. Maslova, et al.
Published: (2013)
Information space in Ukraine: challenges and threats
by: V. M. Tarasiuk
Published: (2018)
by: V. M. Tarasiuk
Published: (2018)
Method for replacing objects in 4F correlator: testing
by: Yezhov, P.V., et al.
Published: (2005)
by: Yezhov, P.V., et al.
Published: (2005)
Ontological tools of network information resources and their use in educational and research activities
by: Ye. Stryzhak, et al.
Published: (2013)
by: Ye. Stryzhak, et al.
Published: (2013)
"Corona-test" of the financial system of Ukraine: external threats
by: O. M. Sharov
Published: (2020)
by: O. M. Sharov
Published: (2020)
Information Processing System for Psychophysical Research with Two- and Three-dimensional Presentation of Test Signals
by: V. T. Lazurik, et al.
Published: (2020)
by: V. T. Lazurik, et al.
Published: (2020)
Information Processing System for Psychophysical Research with Two- and Three-dimensional Presentation of Test Signals
by: Lazurik, V.T., et al.
Published: (2020)
by: Lazurik, V.T., et al.
Published: (2020)
Semantic Recognition of Information Object Based on Ontological Representation of Domain Knowledge in Problems of Intellectual Management
by: V. I. Gritsenko, et al.
Published: (2014)
by: V. I. Gritsenko, et al.
Published: (2014)
Scientific substantiation and practical testing of the use of information and communication technologies in the development of economic competence of heads of secondary education institutions
by: V. V. Dyvak, et al.
Published: (2020)
by: V. V. Dyvak, et al.
Published: (2020)
Scientific substantiation and practical testing of the use of information and communication technologies in the development of economic competence of heads of secondary education institutions
by: Dyvak, V.V., et al.
Published: (2020)
by: Dyvak, V.V., et al.
Published: (2020)
Testing Emistim S on the test-crops in the laboratory conditions
by: S. N. Rassokha
Published: (2003)
by: S. N. Rassokha
Published: (2003)
Informal Employment as a Threat to Social Security in the Labor Market in Ukraine within an Economic Transformation
by: K. V. Bondarevska
Published: (2020)
by: K. V. Bondarevska
Published: (2020)
Ontological and theoretical foundations of the science information law
by: O. M. Seleznova
Published: (2014)
by: O. M. Seleznova
Published: (2014)
Ontology of war and peace in the information space of today
by: T. Kots
Published: (2019)
by: T. Kots
Published: (2019)
Similar Items
-
System-ontological analysis the subject area of testing integrated information security system (IISS)
by: Koltyk, M.A.
Published: (2025) -
The problems of massive construction of the integrated information security system (IISS) and a ways of their solution
by: Koltyk, M.A.
Published: (2025) -
Methods and ways for realization of the automated support testing of the integrated information security system
by: Koltyk, M. A.
Published: (2025) -
Information threats and security services
by: Antonyuk, A.A., et al.
Published: (2015) -
Use of thesauruses for search of complex information objects on Web on the basis of ontologies
by: Rogushina, J.V.
Published: (2019)