Neurosymbolic models for ensuring cybersecurity in critical cyberphysical systems
The article presents the results of a comprehensive study on the application of the neuro-symbolic approach for detecting and preventing cyber threats in railway systems, a critical component of cyber-physical infrastructure. The increasing complexity and integration of physical systems with digital...
Saved in:
| Date: | 2025 |
|---|---|
| Main Author: | Yevdokymov, S.O. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
PROBLEMS IN PROGRAMMING
2025
|
| Subjects: | |
| Online Access: | https://pp.isofts.kiev.ua/index.php/ojs1/article/view/765 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Problems in programming |
| Download file: | |
Institution
Problems in programmingSimilar Items
Organizational and legal mechanisms of cybersecurity and cyber defense in Ukraine: essentiality, conditions and development prospects
by: Semenchenko, A.I., et al.
Published: (2020)
by: Semenchenko, A.I., et al.
Published: (2020)
Complex approach for state critical information infrastructure cyber defence system constructing
by: Synitsyn, I.P., et al.
Published: (2018)
by: Synitsyn, I.P., et al.
Published: (2018)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
Digital twins in intrusion detection systems based on deep learning
by: Letychevskyi, O.O., et al.
Published: (2025)
by: Letychevskyi, O.O., et al.
Published: (2025)
Automation of standardized cyber insurance processes
by: Khudyntsev, Mykola, et al.
Published: (2025)
by: Khudyntsev, Mykola, et al.
Published: (2025)
Reputation-based secyrity for heterogtneous structurally complex systems
by: Kussul, O.M.
Published: (2015)
by: Kussul, O.M.
Published: (2015)
Technology system integration of hardware and software data protection
by: Alishоv, N.I., et al.
Published: (2025)
by: Alishоv, N.I., et al.
Published: (2025)
Cyber Resilience Key Metrics in Small and Medium-Sized Enterprises
by: Deruma, Sintija
Published: (2025)
by: Deruma, Sintija
Published: (2025)
Improving the security of critical infrastructures through automated organizational management systems
by: Додонов, О. Г., et al.
Published: (2022)
by: Додонов, О. Г., et al.
Published: (2022)
Features for providing of cyber security
by: Prysiazhniuk, M. M., et al.
Published: (2017)
by: Prysiazhniuk, M. M., et al.
Published: (2017)
Neurosymbolic approach for attack detection in satellite communication systems
by: Mostovyi, O.S.
Published: (2024)
by: Mostovyi, O.S.
Published: (2024)
. Critical infrastructure information systems under modern threats and supporting their functional stability
by: Додонов, О. Г., et al.
Published: (2026)
by: Додонов, О. Г., et al.
Published: (2026)
Method of detection of http attacks on a smart home using the algebraic matching method
by: Gorbatiuk, V.O., et al.
Published: (2023)
by: Gorbatiuk, V.O., et al.
Published: (2023)
The problems of massive construction of the integrated information security system (IISS) and a ways of their solution
by: Koltyk, M.A.
Published: (2025)
by: Koltyk, M.A.
Published: (2025)
System-ontological analysis the subject area of testing integrated information security system (IISS)
by: Koltyk, M.A.
Published: (2025)
by: Koltyk, M.A.
Published: (2025)
Characteristics of information flows of software modules included in the software for automated support of ...
by: Borovskaya, E.N., et al.
Published: (2025)
by: Borovskaya, E.N., et al.
Published: (2025)
Methods and ways for realization of the automated support testing of the integrated information security system
by: Koltyk, M. A.
Published: (2025)
by: Koltyk, M. A.
Published: (2025)
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Ontology-based semantic similarity to metadata analysis in the information security domain
by: Gladun, A.Y., et al.
Published: (2021)
by: Gladun, A.Y., et al.
Published: (2021)
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems
by: Давидюк, А. В., et al.
Published: (2021)
by: Давидюк, А. В., et al.
Published: (2021)
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: Дьогтєва, І. О., et al.
Published: (2021)
by: Дьогтєва, І. О., et al.
Published: (2021)
Features of decision support in government situational centers to protect critical infrastructure
by: Гречанінов , В. Ф.
Published: (2021)
by: Гречанінов , В. Ф.
Published: (2021)
Developing a conceptual framework for resilience in information systems
by: Korobeynikov, F.O.
Published: (2024)
by: Korobeynikov, F.O.
Published: (2024)
A methodology and architecture of the platform for modeling interdependencies in critical infrastructures when cascading effects occur
by: Сенченко, В. Р., et al.
Published: (2025)
by: Сенченко, В. Р., et al.
Published: (2025)
Armed conflict as an environmental risk factor at water supply facilities in еastern Ukraine (case study of “Voda Donbassa” utility company’s Siverskyi Donets – Donbas canal)
by: Buglak, Olexandra V., et al.
Published: (2019)
by: Buglak, Olexandra V., et al.
Published: (2019)
Information security policy in the systems of information and analytical maintenance for support of organizational decisions
by: Churubrova, S.M.
Published: (2018)
by: Churubrova, S.M.
Published: (2018)
Using Bayesian network models for early assessment of cyberattack threats to electricity generation facility
by: Гальчинський, Л. Ю., et al.
Published: (2025)
by: Гальчинський, Л. Ю., et al.
Published: (2025)
Semantic approach to automated formation of information security systems documentation
by: Bova, Yu.V., et al.
Published: (2026)
by: Bova, Yu.V., et al.
Published: (2026)
The Code is based on random numbers with irregular distribution
by: Mikhersky, R.M.
Published: (2025)
by: Mikhersky, R.M.
Published: (2025)
Modeling the suitability of territories for the deployment of Ukraine's critical infrastructure in the face of military threats
by: Borovyk, Karolina, et al.
Published: (2024)
by: Borovyk, Karolina, et al.
Published: (2024)
Integrated security systems for protecting payment synchronization from MITM attacks
by: Shahmatov, I.O., et al.
Published: (2025)
by: Shahmatov, I.O., et al.
Published: (2025)
Methods to Improve of the Information Component Survivabilityof Corporate Information-Analytical Systems
by: Lande, D. V.
Published: (2012)
by: Lande, D. V.
Published: (2012)
The cybersecurity modeling in critical infrastructures
by: H. Kravtsov, et al.
Published: (2015)
by: H. Kravtsov, et al.
Published: (2015)
The cybersecurity modeling in critical infrastructures
by: Kravtsov, H., et al.
Published: (2015)
by: Kravtsov, H., et al.
Published: (2015)
A network approach in the study of cascading effects critical infrastructures
by: Хоменко, О. М., et al.
Published: (2024)
by: Хоменко, О. М., et al.
Published: (2024)
Use of ontological knowledge in machine learning methods for intelligent analysis of Big Data
by: Rogushina, J.V.
Published: (2019)
by: Rogushina, J.V.
Published: (2019)
Application of deep learning technology for creating intellectual autonomous machines
by: Bilokon, O.S.
Published: (2020)
by: Bilokon, O.S.
Published: (2020)
Neurosymbolic Approach in Biological Research
by: Yu. H. Tarasich, et al.
Published: (2023)
by: Yu. H. Tarasich, et al.
Published: (2023)
About a system approach to the development and ground tests of on-board automated naval complexes for detection and target designation
by: Dodonov, A. G., et al.
Published: (2017)
by: Dodonov, A. G., et al.
Published: (2017)
Similar Items
-
Organizational and legal mechanisms of cybersecurity and cyber defense in Ukraine: essentiality, conditions and development prospects
by: Semenchenko, A.I., et al.
Published: (2020) -
Complex approach for state critical information infrastructure cyber defence system constructing
by: Synitsyn, I.P., et al.
Published: (2018) -
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024) -
Digital twins in intrusion detection systems based on deep learning
by: Letychevskyi, O.O., et al.
Published: (2025) -
Automation of standardized cyber insurance processes
by: Khudyntsev, Mykola, et al.
Published: (2025)