Methods and ways for realization of the automated support testing of the integrated information security system
Describesthe steps for creatingof the integrated information security system and an approach to the development of the software for support of testing of the integrated information security system, defined a tasks which canbe implemented with using the method of automatedsupport. Also, it is suggest...
Saved in:
| Date: | 2025 |
|---|---|
| Main Author: | Koltyk, M. A. |
| Format: | Article |
| Language: | Russian |
| Published: |
PROBLEMS IN PROGRAMMING
2025
|
| Subjects: | |
| Online Access: | https://pp.isofts.kiev.ua/index.php/ojs1/article/view/789 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Problems in programming |
| Download file: | |
Institution
Problems in programmingSimilar Items
System-ontological analysis the subject area of testing integrated information security system (IISS)
by: Koltyk, M.A.
Published: (2025)
by: Koltyk, M.A.
Published: (2025)
The problems of massive construction of the integrated information security system (IISS) and a ways of their solution
by: Koltyk, M.A.
Published: (2025)
by: Koltyk, M.A.
Published: (2025)
Characteristics of information flows of software modules included in the software for automated support of ...
by: Borovskaya, E.N., et al.
Published: (2025)
by: Borovskaya, E.N., et al.
Published: (2025)
Technology system integration of hardware and software data protection
by: Alishоv, N.I., et al.
Published: (2025)
by: Alishоv, N.I., et al.
Published: (2025)
Developing a conceptual framework for resilience in information systems
by: Korobeynikov, F.O.
Published: (2024)
by: Korobeynikov, F.O.
Published: (2024)
Reputation-based secyrity for heterogtneous structurally complex systems
by: Kussul, O.M.
Published: (2015)
by: Kussul, O.M.
Published: (2015)
The Code is based on random numbers with irregular distribution
by: Mikhersky, R.M.
Published: (2025)
by: Mikhersky, R.M.
Published: (2025)
Semantic approach to automated formation of information security systems documentation
by: Bova, Yu.V., et al.
Published: (2026)
by: Bova, Yu.V., et al.
Published: (2026)
Information security policy in the systems of information and analytical maintenance for support of organizational decisions
by: Churubrova, S.M.
Published: (2018)
by: Churubrova, S.M.
Published: (2018)
Digital twins in intrusion detection systems based on deep learning
by: Letychevskyi, O.O., et al.
Published: (2025)
by: Letychevskyi, O.O., et al.
Published: (2025)
Neurosymbolic models for ensuring cybersecurity in critical cyberphysical systems
by: Yevdokymov, S.O.
Published: (2025)
by: Yevdokymov, S.O.
Published: (2025)
Complex approach for state critical information infrastructure cyber defence system constructing
by: Synitsyn, I.P., et al.
Published: (2018)
by: Synitsyn, I.P., et al.
Published: (2018)
Integrated security systems for protecting payment synchronization from MITM attacks
by: Shahmatov, I.O., et al.
Published: (2025)
by: Shahmatov, I.O., et al.
Published: (2025)
Approaches to realization Yen’s algorithm for systems with the shared memory
by: Pogorilyy, S.D., et al.
Published: (2025)
by: Pogorilyy, S.D., et al.
Published: (2025)
Automated translation from Ukrainian to sign language: algorithmic implementation
by: Krak, Yu.V., et al.
Published: (2025)
by: Krak, Yu.V., et al.
Published: (2025)
Building automated monitoring systems structural elements method MDP-planning
by: Dosin, D.G., et al.
Published: (2019)
by: Dosin, D.G., et al.
Published: (2019)
Matching data between electronic documents and database tables with automated SQL-query generation
by: Marulin, S.Yu.
Published: (2025)
by: Marulin, S.Yu.
Published: (2025)
Ontology-based semantic similarity to metadata analysis in the information security domain
by: Gladun, A.Y., et al.
Published: (2021)
by: Gladun, A.Y., et al.
Published: (2021)
T-satisfiability test problem for the VL1 logical language of the VRS system
by: Timofeev, V.G.
Published: (2015)
by: Timofeev, V.G.
Published: (2015)
Virtual museum of informatics history in Siberia
by: Kasyanov, V.N., et al.
Published: (2015)
by: Kasyanov, V.N., et al.
Published: (2015)
Modern technological aspects of decision support systems
by: Churubrova, S.M.
Published: (2017)
by: Churubrova, S.M.
Published: (2017)
An intellectual information technology for organizational decisions expert-analytical support
by: Ilyina, O.P., et al.
Published: (2025)
by: Ilyina, O.P., et al.
Published: (2025)
Regression testing: techniques and future research directions
by: Moroz, H.B., et al.
Published: (2025)
by: Moroz, H.B., et al.
Published: (2025)
Approach to the building intelligent decision support systems on the basis of ontology
by: Lytvyn, V.V.
Published: (2025)
by: Lytvyn, V.V.
Published: (2025)
An approach to website vulnerability detection based on static and dynamic analysis
by: Popereshnyak, S.V., et al.
Published: (2026)
by: Popereshnyak, S.V., et al.
Published: (2026)
Information resources distribution between automated workstations in local corporative networks
by: Pursky, O.I., et al.
Published: (2023)
by: Pursky, O.I., et al.
Published: (2023)
Traversal of arbitrary sequences of UCM symbolic transitions for test generation
by: Guba, A.A.
Published: (2025)
by: Guba, A.A.
Published: (2025)
Канонічні та матричні задання квазігруп четвертого порядку
by: Sokhatsky, F. M.; Інститут прикладних проблем механіки і математики ім. Я. С. Підстригача НАН України, Львів, et al.
Published: (2024)
by: Sokhatsky, F. M.; Інститут прикладних проблем механіки і математики ім. Я. С. Підстригача НАН України, Львів, et al.
Published: (2024)
Ontology-oriented data integration on the Semantic Web
by: Chystyakova, I.S.
Published: (2025)
by: Chystyakova, I.S.
Published: (2025)
Development of integrated system of scientific periodicals based on the OJS
by: Kudim, K.A., et al.
Published: (2017)
by: Kudim, K.A., et al.
Published: (2017)
Information system for hostilities mechanized forces modelling based on ontology
by: Oborska, O.V.
Published: (2019)
by: Oborska, O.V.
Published: (2019)
Integration of Semantic WEB technologies with Business Intelligence 2.0 systems
by: Rogushina, J.V., et al.
Published: (2025)
by: Rogushina, J.V., et al.
Published: (2025)
Method of information and analytical support for information security risk management of information systems
by: Rodin, Y.S.
Published: (2019)
by: Rodin, Y.S.
Published: (2019)
On unification of processing methods of the structured information
by: Doroshenko, A.Yu., et al.
Published: (2025)
by: Doroshenko, A.Yu., et al.
Published: (2025)
The practice investigation of the information technology efficiency for automated definition of terms in the semantic content of educational materials
by: Krak, Yu.V., et al.
Published: (2018)
by: Krak, Yu.V., et al.
Published: (2018)
The practice implementation of the information technology for automated definition of semantic terms sets in the content of educational materials
by: Krak, Yu.V., et al.
Published: (2018)
by: Krak, Yu.V., et al.
Published: (2018)
Method for calculating the parameters of phase transitions of discrete technological and information processes of strategic planning with parallelization of computations
by: Stepaniuk, M.Yu.
Published: (2025)
by: Stepaniuk, M.Yu.
Published: (2025)
Mathematical foundations for designing and development of intelligent systems of information analysis
by: Terletskyi, D.O., et al.
Published: (2025)
by: Terletskyi, D.O., et al.
Published: (2025)
Efficient increasing of the mutation score during model-based test suite generation
by: Kolchin, A., et al.
Published: (2020)
by: Kolchin, A., et al.
Published: (2020)
Special attention is given to the project of the Informational System "Planned for Science in the NAPN of Ukraine"
by: Zadorozhna, N.T., et al.
Published: (2015)
by: Zadorozhna, N.T., et al.
Published: (2015)
Similar Items
-
System-ontological analysis the subject area of testing integrated information security system (IISS)
by: Koltyk, M.A.
Published: (2025) -
The problems of massive construction of the integrated information security system (IISS) and a ways of their solution
by: Koltyk, M.A.
Published: (2025) -
Characteristics of information flows of software modules included in the software for automated support of ...
by: Borovskaya, E.N., et al.
Published: (2025) -
Technology system integration of hardware and software data protection
by: Alishоv, N.I., et al.
Published: (2025) -
Developing a conceptual framework for resilience in information systems
by: Korobeynikov, F.O.
Published: (2024)