Semantic approach to automated formation of information security systems documentation
The article investigates the problem of automated generation of complex documentation for information secu rity systems based on semantic analysis of the regulatory and legal framework. A systematic analysis of the re quirements of regulatory documents and international standards for information sec...
Saved in:
| Date: | 2026 |
|---|---|
| Main Authors: | Bova, Yu.V., Yatsenko, O.A. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
PROBLEMS IN PROGRAMMING
2026
|
| Subjects: | |
| Online Access: | https://pp.isofts.kiev.ua/index.php/ojs1/article/view/878 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Problems in programming |
| Download file: | |
Institution
Problems in programmingSimilar Items
Reputation-based secyrity for heterogtneous structurally complex systems
by: Kussul, O.M.
Published: (2015)
by: Kussul, O.M.
Published: (2015)
Developing a conceptual framework for resilience in information systems
by: Korobeynikov, F.O.
Published: (2024)
by: Korobeynikov, F.O.
Published: (2024)
System of classification for personnel selection based upon Ukrainian language ana-lyze
by: Zhezherun, O.P., et al.
Published: (2021)
by: Zhezherun, O.P., et al.
Published: (2021)
Technology system integration of hardware and software data protection
by: Alishоv, N.I., et al.
Published: (2025)
by: Alishоv, N.I., et al.
Published: (2025)
Integration of large language models with semantic processing tools as an instrument for knowledge digitization
by: Sinitsyn, I.P., et al.
Published: (2025)
by: Sinitsyn, I.P., et al.
Published: (2025)
Approach to the building intelligent decision support systems on the basis of ontology
by: Lytvyn, V.V.
Published: (2025)
by: Lytvyn, V.V.
Published: (2025)
Information system for hostilities mechanized forces modelling based on ontology
by: Oborska, O.V.
Published: (2019)
by: Oborska, O.V.
Published: (2019)
Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems
by: Chepkov, Ihor B., et al.
Published: (2019)
by: Chepkov, Ihor B., et al.
Published: (2019)
Information security policy in the systems of information and analytical maintenance for support of organizational decisions
by: Churubrova, S.M.
Published: (2018)
by: Churubrova, S.M.
Published: (2018)
Complex approach for state critical information infrastructure cyber defence system constructing
by: Synitsyn, I.P., et al.
Published: (2018)
by: Synitsyn, I.P., et al.
Published: (2018)
Ontology-based semantic similarity to metadata analysis in the information security domain
by: Gladun, A.Y., et al.
Published: (2021)
by: Gladun, A.Y., et al.
Published: (2021)
Methods to Improve of the Information Component Survivabilityof Corporate Information-Analytical Systems
by: Lande, D. V.
Published: (2012)
by: Lande, D. V.
Published: (2012)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
Neurosymbolic models for ensuring cybersecurity in critical cyberphysical systems
by: Yevdokymov, S.O.
Published: (2025)
by: Yevdokymov, S.O.
Published: (2025)
The problems of massive construction of the integrated information security system (IISS) and a ways of their solution
by: Koltyk, M.A.
Published: (2025)
by: Koltyk, M.A.
Published: (2025)
System-ontological analysis the subject area of testing integrated information security system (IISS)
by: Koltyk, M.A.
Published: (2025)
by: Koltyk, M.A.
Published: (2025)
Methods and ways for realization of the automated support testing of the integrated information security system
by: Koltyk, M. A.
Published: (2025)
by: Koltyk, M. A.
Published: (2025)
Characteristics of information flows of software modules included in the software for automated support of ...
by: Borovskaya, E.N., et al.
Published: (2025)
by: Borovskaya, E.N., et al.
Published: (2025)
Methods and techniques for management of ontolodgy-based knowledge representation models in the context of BIG data
by: Novitsky, A.V.
Published: (2022)
by: Novitsky, A.V.
Published: (2022)
Ontological modeling of adult learning ecosystem as a personalization tool
by: Rogushina, J.V., et al.
Published: (2026)
by: Rogushina, J.V., et al.
Published: (2026)
Mathematical models and methods for solving some problems on the information security
by: Никифоров, О. В., et al.
Published: (2023)
by: Никифоров, О. В., et al.
Published: (2023)
Automation of standardized cyber insurance processes
by: Khudyntsev, Mykola, et al.
Published: (2025)
by: Khudyntsev, Mykola, et al.
Published: (2025)
Security basic model for applied tasks of the distributed information system
by: Rodin, Y.S., et al.
Published: (2021)
by: Rodin, Y.S., et al.
Published: (2021)
Problems of active protection of information from leakage through vibroacoustic channels
by: Kataiev, V. С., et al.
Published: (2016)
by: Kataiev, V. С., et al.
Published: (2016)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019)
by: Saliieva, O. V., et al.
Published: (2019)
Analysis of formal models and standards for structured electronic document in corporate informational system
by: Sharypanov, A.V., et al.
Published: (2018)
by: Sharypanov, A.V., et al.
Published: (2018)
Features of implementation of simulation processes based on DATA FARMING methodologies
by: Krikovlyuk, E.A., et al.
Published: (2015)
by: Krikovlyuk, E.A., et al.
Published: (2015)
Special attention is given to the project of the Informational System "Planned for Science in the NAPN of Ukraine"
by: Zadorozhna, N.T., et al.
Published: (2015)
by: Zadorozhna, N.T., et al.
Published: (2015)
Designing and program implementation of the subsystem for creation and use of the ontological knowledge base of the scientific employee publications
by: Palagin, O.V., et al.
Published: (2018)
by: Palagin, O.V., et al.
Published: (2018)
Introduction of modern information technologies in scientific research of NAS of Ukraine
by: Zagorodniy, A.G., et al.
Published: (2018)
by: Zagorodniy, A.G., et al.
Published: (2018)
Application of small language models for semantic analysis of Web interface accessibility
by: Kuzikov, B.O., et al.
Published: (2025)
by: Kuzikov, B.O., et al.
Published: (2025)
Development of the information system for semantic identification and documentation of the results of non-formal and informal education
by: Pryima, S.M., et al.
Published: (2020)
by: Pryima, S.M., et al.
Published: (2020)
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021)
by: Шиян, А. А., et al.
Published: (2021)
Information-Technology Approach to Complex Substantiation of Requirements for Automated Systems
by: Самохвалов, Ю. Я., et al.
Published: (2012)
by: Самохвалов, Ю. Я., et al.
Published: (2012)
Methods and tools for developing an information system for validation of non-formal learning outcomes
by: Pryima, S.M., et al.
Published: (2020)
by: Pryima, S.M., et al.
Published: (2020)
Ontological approach to the organization of information interaction of existing and created automated systems in the Ministry of Defense and the Armed Forces of Ukraine
by: Гречанінов , В. Ф.
Published: (2021)
by: Гречанінов , В. Ф.
Published: (2021)
Semantic alignment of ontologies meaningful categories with the generalization of descriptive structures
by: Manziuk, E.A., et al.
Published: (2023)
by: Manziuk, E.A., et al.
Published: (2023)
Organizational and legal mechanisms of cybersecurity and cyber defense in Ukraine: essentiality, conditions and development prospects
by: Semenchenko, A.I., et al.
Published: (2020)
by: Semenchenko, A.I., et al.
Published: (2020)
Integrated security systems for protecting payment synchronization from MITM attacks
by: Shahmatov, I.O., et al.
Published: (2025)
by: Shahmatov, I.O., et al.
Published: (2025)
Similar Items
-
Reputation-based secyrity for heterogtneous structurally complex systems
by: Kussul, O.M.
Published: (2015) -
Developing a conceptual framework for resilience in information systems
by: Korobeynikov, F.O.
Published: (2024) -
System of classification for personnel selection based upon Ukrainian language ana-lyze
by: Zhezherun, O.P., et al.
Published: (2021) -
Technology system integration of hardware and software data protection
by: Alishоv, N.I., et al.
Published: (2025) -
Integration of large language models with semantic processing tools as an instrument for knowledge digitization
by: Sinitsyn, I.P., et al.
Published: (2025)