Reputation-based secyrity for heterogtneous structurally complex systems
In this paper we present the service-oriented infrastructure within the Wide Area Grid (WAG) project that was carried out within the Working Group on Information Systems and Services of the Committee on Earth Observation Satellites (CEOS). The study focuses on enabling trust for this infrastructure...
Saved in:
| Date: | 2015 |
|---|---|
| Main Author: | Kussul, O.M. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
PROBLEMS IN PROGRAMMING
2015
|
| Subjects: | |
| Online Access: | https://pp.isofts.kiev.ua/index.php/ojs1/article/view/92 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Problems in programming |
| Download file: | |
Institution
Problems in programmingSimilar Items
Reputation-based secyrity for heterogtneous structurally complex systems
by: Kussul, O.M.
Published: (2012)
by: Kussul, O.M.
Published: (2012)
Reputation-based secyrity for heterogtneous structurally complex systems
by: O. M. Kussul
Published: (2012)
by: O. M. Kussul
Published: (2012)
Technology system integration of hardware and software data protection
by: Alishоv, N.I., et al.
Published: (2025)
by: Alishоv, N.I., et al.
Published: (2025)
System-ontological analysis the subject area of testing integrated information security system (IISS)
by: Koltyk, M.A.
Published: (2025)
by: Koltyk, M.A.
Published: (2025)
Methods and ways for realization of the automated support testing of the integrated information security system
by: Koltyk, M. A.
Published: (2025)
by: Koltyk, M. A.
Published: (2025)
The problems of massive construction of the integrated information security system (IISS) and a ways of their solution
by: Koltyk, M.A.
Published: (2025)
by: Koltyk, M.A.
Published: (2025)
Characteristics of information flows of software modules included in the software for automated support of ...
by: Borovskaya, E.N., et al.
Published: (2025)
by: Borovskaya, E.N., et al.
Published: (2025)
Developing a conceptual framework for resilience in information systems
by: Korobeynikov, F.O.
Published: (2024)
by: Korobeynikov, F.O.
Published: (2024)
Neurosymbolic models for ensuring cybersecurity in critical cyberphysical systems
by: Yevdokymov, S.O.
Published: (2025)
by: Yevdokymov, S.O.
Published: (2025)
The Code is based on random numbers with irregular distribution
by: Mikhersky, R.M.
Published: (2025)
by: Mikhersky, R.M.
Published: (2025)
Complex approach for state critical information infrastructure cyber defence system constructing
by: Synitsyn, I.P., et al.
Published: (2018)
by: Synitsyn, I.P., et al.
Published: (2018)
Digital twins in intrusion detection systems based on deep learning
by: Letychevskyi, O.O., et al.
Published: (2025)
by: Letychevskyi, O.O., et al.
Published: (2025)
Information security policy in the systems of information and analytical maintenance for support of organizational decisions
by: Churubrova, S.M.
Published: (2018)
by: Churubrova, S.M.
Published: (2018)
Integrated security systems for protecting payment synchronization from MITM attacks
by: Shahmatov, I.O., et al.
Published: (2025)
by: Shahmatov, I.O., et al.
Published: (2025)
Semantic approach to automated formation of information security systems documentation
by: Bova, Yu.V., et al.
Published: (2026)
by: Bova, Yu.V., et al.
Published: (2026)
An approach to website vulnerability detection based on static and dynamic analysis
by: Popereshnyak, S.V., et al.
Published: (2026)
by: Popereshnyak, S.V., et al.
Published: (2026)
Ontology-based semantic similarity to metadata analysis in the information security domain
by: Gladun, A.Y., et al.
Published: (2021)
by: Gladun, A.Y., et al.
Published: (2021)
Software and technical complex for automatic georeferencing of space system «Sich-2» remote sensing data
by: Kussul, N.M., et al.
Published: (2025)
by: Kussul, N.M., et al.
Published: (2025)
Game-theoretic approach to the network security problem
by: Ignatenko, O.P.
Published: (2018)
by: Ignatenko, O.P.
Published: (2018)
Organizational and legal mechanisms of cybersecurity and cyber defense in Ukraine: essentiality, conditions and development prospects
by: Semenchenko, A.I., et al.
Published: (2020)
by: Semenchenko, A.I., et al.
Published: (2020)
Development of integrated system of scientific periodicals based on the OJS
by: Kudim, K.A., et al.
Published: (2017)
by: Kudim, K.A., et al.
Published: (2017)
Special attention is given to the project of the Informational System "Planned for Science in the NAPN of Ukraine"
by: Zadorozhna, N.T., et al.
Published: (2015)
by: Zadorozhna, N.T., et al.
Published: (2015)
Information system for hostilities mechanized forces modelling based on ontology
by: Oborska, O.V.
Published: (2019)
by: Oborska, O.V.
Published: (2019)
Канонічні та матричні задання квазігруп четвертого порядку
by: Sokhatsky, F. M.; Інститут прикладних проблем механіки і математики ім. Я. С. Підстригача НАН України, Львів, et al.
Published: (2024)
by: Sokhatsky, F. M.; Інститут прикладних проблем механіки і математики ім. Я. С. Підстригача НАН України, Львів, et al.
Published: (2024)
Development of formal models, algorithms, procedures, engineering and functioning of the software system “Instrumental complex for ontological engineering purpose”
by: Palagin, O.V., et al.
Published: (2025)
by: Palagin, O.V., et al.
Published: (2025)
Building automated monitoring systems structural elements method MDP-planning
by: Dosin, D.G., et al.
Published: (2019)
by: Dosin, D.G., et al.
Published: (2019)
Features of building recommendation systems based on neural network technology using multithreading
by: Komleva, N.O., et al.
Published: (2023)
by: Komleva, N.O., et al.
Published: (2023)
Increase the temporal efficiency of data structures in memory based on adaptation
by: Shinkarenko, V.I., et al.
Published: (2015)
by: Shinkarenko, V.I., et al.
Published: (2015)
Metods of interaction and coordination in multi-agent system based on fussy logic of higher type
by: Parasiuk, I.N., et al.
Published: (2025)
by: Parasiuk, I.N., et al.
Published: (2025)
Development of agent recommendation system of virtual university based on JADE
by: Glybovets, M.M., et al.
Published: (2017)
by: Glybovets, M.M., et al.
Published: (2017)
Toolkit for simulation of heterogeneous GPU-based environments
by: Okonsky, I.V., et al.
Published: (2025)
by: Okonsky, I.V., et al.
Published: (2025)
Flow based bonet traffic detection using AI
by: Panchuk, B.O.
Published: (2023)
by: Panchuk, B.O.
Published: (2023)
Analysis of storage and display frameworks based on aspect-oriented technologies
by: Glybovets, M.M., et al.
Published: (2025)
by: Glybovets, M.M., et al.
Published: (2025)
Weather anomaly monitoring method based on sensor network technology
by: Rahozin, D.V.
Published: (2017)
by: Rahozin, D.V.
Published: (2017)
Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems
by: Chepkov, Ihor B., et al.
Published: (2019)
by: Chepkov, Ihor B., et al.
Published: (2019)
Security basic model for applied tasks of the distributed information system
by: Rodin, Y.S., et al.
Published: (2021)
by: Rodin, Y.S., et al.
Published: (2021)
Constraint programming in insertion modeling system
by: Letichevsky, O.A., et al.
Published: (2025)
by: Letichevsky, O.A., et al.
Published: (2025)
Partial evaluation in insertion modeling system
by: Peschanenko, V.S.
Published: (2025)
by: Peschanenko, V.S.
Published: (2025)
Managing scientific workflows in grid systems
by: Tverdokhlib, E.M., et al.
Published: (2025)
by: Tverdokhlib, E.M., et al.
Published: (2025)
One approach for advanced internet-programs creation on example of widget-programs developing
by: Glybovets, M.M., et al.
Published: (2025)
by: Glybovets, M.M., et al.
Published: (2025)
Similar Items
-
Reputation-based secyrity for heterogtneous structurally complex systems
by: Kussul, O.M.
Published: (2012) -
Reputation-based secyrity for heterogtneous structurally complex systems
by: O. M. Kussul
Published: (2012) -
Technology system integration of hardware and software data protection
by: Alishоv, N.I., et al.
Published: (2025) -
System-ontological analysis the subject area of testing integrated information security system (IISS)
by: Koltyk, M.A.
Published: (2025) -
Methods and ways for realization of the automated support testing of the integrated information security system
by: Koltyk, M. A.
Published: (2025)