首页 > 最新文献

Voprosy kiberbezopasnosti最新文献

英文 中文
Hybrid Crypto-Code Method for Monitoring and Recovery of Data Integrity for Protected Information and Analytical Systems 受保护信息和分析系统数据完整性监测和恢复的混合密码方法
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-6-17-36
S. Dichenko, O. Finko
{"title":"Hybrid Crypto-Code Method for Monitoring and Recovery of Data Integrity for Protected Information and Analytical Systems","authors":"S. Dichenko, O. Finko","doi":"10.21681/2311-3456-2019-6-17-36","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-6-17-36","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131985716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Text Analysis Approach for Identifying Psychological Characteristics (with Aggressiveness as an Example) 心理特征识别的文本分析方法(以攻击性为例)
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-4-72-79
A. Kovalev, Julia Kuznetsova, A. Minin, M. Penkina, I. Smirnov, M. Stankevich, N. Chudova
{"title":"Text Analysis Approach for Identifying Psychological Characteristics (with Aggressiveness as an Example)","authors":"A. Kovalev, Julia Kuznetsova, A. Minin, M. Penkina, I. Smirnov, M. Stankevich, N. Chudova","doi":"10.21681/2311-3456-2019-4-72-79","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-4-72-79","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134408885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Formalization of the Problem of Creating a Data Transmission System in a Robotic System Operating in Conditions of Antagonistic Cyber-Electromagnetic Activity 在对抗网络电磁活动条件下工作的机器人系统中创建数据传输系统问题的形式化
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-6-113-122
V. Golovskoy, Y. Chernuha, D. Semenyuk
{"title":"Formalization of the Problem of Creating a Data Transmission System in a Robotic System Operating in Conditions of Antagonistic Cyber-Electromagnetic Activity","authors":"V. Golovskoy, Y. Chernuha, D. Semenyuk","doi":"10.21681/2311-3456-2019-6-113-122","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-6-113-122","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132170449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Subsystem for Prevention of Computer Attacks Against Objects of Critical Information Infrastructure: Analysis of Functioning and Implementation 关键信息基础设施对象计算机攻击防范子系统:功能与实现分析
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2023-1-13-27
Igor Kotenko, I. Saenko, R. Zakharchenko, Dmitry Velichko
The purpose of the article: conducting a system analysis of the requirements for the subsystem for preventing computer attacks on critical information infrastructure in order to substantiate the directions for further improved scientific and methodological apparatus for the full functioning of the subsystem for preventing computer attacks. Research method: theoretical and systematic analysis of the requirements of legal acts, scientific publications, protection technologies and means of their implementation in departmental systems for detecting and counteringcomputer attacks.The result obtained: the rationale for the need to build mechanisms for preventing computer attacks on critical information infrastructure objects and the requirements for the subsystem for preventing computer attacks was carried out, an approach was proposed to prevent computer attacks at the stages of reconnaissance by an attacker of critical information infrastructure objects, based on the introduction of a security event correlation mechanism with automatic adaptation to the analyzed information infrastructure and the functions it performs at the current time and a detailed specification of the correlation rules.Scope of the proposed approach: a subsystem for preventing computer attacks of departmental systems for detecting and countering computer attacks, which should identify and prevent attempts to conduct computer attacks on critical information infrastructure objects in advance.The scientific novelty consists in a comprehensive analysis of the need to build mechanisms for preventing computer attacks on critical information infrastructure objects, an analysis of the requirements for the computer attack prevention subsystem, its functions and means of implementation. It is shown that the functions of preventing computer attacks in domestic technical solutions are not fully implemented, and that there is a substitution of the concept of “subsystem for preventing computer attacks” by the concept of “control and technical measures”. It is substantiated that for the implementation of the functions of preventing computer attacks, there is a technological backlog in the form of a ready-made technology based on the technology for building SIEM systems. It is shown that there is a need to refine the scientific and methodological apparatus for implementing computer warning functions based on artificial intelligence methods and big data technologies.Contribution: Kotenko I.V. - analysis of the functionality of the subsystem for preventing computer attacks, setting the task and proposals for developing the functionality of the subsystem for preventing computer attacks on critical information infrastructure objects; Saenko I.B. - analysis of the subsystem for preventing computer attacks in the general context of the theory of information security, substantiation of the implementation of the functions of preventing computer attacks based on the technology of building SIEM systems a
本文的目的是:对防止关键信息基础设施受到计算机攻击的子系统的需求进行系统分析,以确定进一步改进科学和方法设备的方向,使防止计算机攻击的子系统充分发挥作用。研究方法:从理论上和系统地分析部门系统中检测和打击计算机攻击的法律行为、科学出版物、保护技术及其实施手段的要求。得到的结果是:阐述了建立防止计算机攻击关键信息基础设施对象机制的基本原理和防止计算机攻击子系统的要求,提出了在攻击者对关键信息基础设施对象进行侦察阶段防止计算机攻击的方法;介绍了一种能够自动适应所分析的信息基础设施及其当前所执行的功能的安全事件关联机制,并详细规范了相关规则。建议方法的范围:一个防止部门系统的电脑攻击的分系统,用以侦测及对抗电脑攻击,该分系统应预先识别及防止对关键资讯基建对象进行电脑攻击的企图。科学的新颖性在于全面分析了构建计算机防范关键信息基础设施对象攻击机制的需求,分析了计算机防范攻击子系统的需求、功能和实现方式。研究表明,国内技术方案中防范计算机攻击的功能没有得到充分实现,“防范计算机攻击子系统”的概念被“控制与技术措施”的概念所替代。事实证明,为了实现防止计算机攻击的功能,在构建SIEM系统的技术基础上,存在以现成技术形式存在的技术积压。研究表明,需要完善基于人工智能方法和大数据技术实现计算机预警功能的科学和方法设备。贡献:Kotenko I.V. -分析了防止计算机攻击的子系统的功能,设定了任务和建议,以开发防止关键信息基础设施对象受到计算机攻击的子系统的功能;Saenko I.B. -在信息安全理论的大背景下,分析了防止计算机攻击的子系统,基于构建SIEM系统和大数据的技术,验证了防止计算机攻击功能的实现;Zakharchenko R.I.——分析技术解决方案,确保实现防止计算机攻击的子系统,Velichko D.V.——在关键信息基础设施对象的攻击者侦察阶段检测计算机攻击的方法。所有作者都参与了这篇文章的写作。
{"title":"Subsystem for Prevention of Computer Attacks Against Objects of Critical Information Infrastructure: Analysis of Functioning and Implementation","authors":"Igor Kotenko, I. Saenko, R. Zakharchenko, Dmitry Velichko","doi":"10.21681/2311-3456-2023-1-13-27","DOIUrl":"https://doi.org/10.21681/2311-3456-2023-1-13-27","url":null,"abstract":"The purpose of the article: conducting a system analysis of the requirements for the subsystem for preventing computer attacks on critical information infrastructure in order to substantiate the directions for further improved scientific and methodological apparatus for the full functioning of the subsystem for preventing computer attacks. Research method: theoretical and systematic analysis of the requirements of legal acts, scientific publications, protection technologies and means of their implementation in departmental systems for detecting and counteringcomputer attacks.The result obtained: the rationale for the need to build mechanisms for preventing computer attacks on critical information infrastructure objects and the requirements for the subsystem for preventing computer attacks was carried out, an approach was proposed to prevent computer attacks at the stages of reconnaissance by an attacker of critical information infrastructure objects, based on the introduction of a security event correlation mechanism with automatic adaptation to the analyzed information infrastructure and the functions it performs at the current time and a detailed specification of the correlation rules.Scope of the proposed approach: a subsystem for preventing computer attacks of departmental systems for detecting and countering computer attacks, which should identify and prevent attempts to conduct computer attacks on critical information infrastructure objects in advance.The scientific novelty consists in a comprehensive analysis of the need to build mechanisms for preventing computer attacks on critical information infrastructure objects, an analysis of the requirements for the computer attack prevention subsystem, its functions and means of implementation. It is shown that the functions of preventing computer attacks in domestic technical solutions are not fully implemented, and that there is a substitution of the concept of “subsystem for preventing computer attacks” by the concept of “control and technical measures”. It is substantiated that for the implementation of the functions of preventing computer attacks, there is a technological backlog in the form of a ready-made technology based on the technology for building SIEM systems. It is shown that there is a need to refine the scientific and methodological apparatus for implementing computer warning functions based on artificial intelligence methods and big data technologies.Contribution: Kotenko I.V. - analysis of the functionality of the subsystem for preventing computer attacks, setting the task and proposals for developing the functionality of the subsystem for preventing computer attacks on critical information infrastructure objects; Saenko I.B. - analysis of the subsystem for preventing computer attacks in the general context of the theory of information security, substantiation of the implementation of the functions of preventing computer attacks based on the technology of building SIEM systems a","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133946304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EVOLUTION OF CYBERSPACE MANAGEMENT SYSTEMS 网络空间管理制度的演变
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-1-76-86
P. Zakalkin
The purpose of the study: to identify the main systems that control cyberspace and the key elements whose management will allow controlling a given segment of cyberspace. Research method: theory of complex systems; synergetic. Result: The paper considers the main control systems that play a key role in the management of cyberspace, highlights the structural elements of cyberspace and their interrelations with each other. Regional and local Internet registrars are considered, their coherence graph is presented, as well as the coherence graph by country. Based on the study, the author’s vision of the organizational structure of the cyberspace management system (in relation to domain names and IP addresses). Autonomous systems and traffic exchange points are considered, the structure of external connectivity of autonomous systems and its change over time are given on examples. The largest telecommunication alliances are presented, which have an impact on the activities of telecom operators (directly or indirectly) and, as a result, on the set of resources and services (as well as their cost) received by end users provided by telecommunication operators. Scientific novelty: the considered structure of the cyberspace management system made it possible to identify the main systems that control cyberspace and the key elements whose management will allow controlling a given segment of cyberspace.
这项研究的目的是:确定控制网络空间的主要系统和关键要素,其管理将允许控制网络空间的给定部分。研究方法:复杂系统理论;协同作用的。结果:本文考虑了在网络空间管理中起关键作用的主要控制系统,突出了网络空间的结构要素及其相互关系。考虑了区域和本地互联网注册商,给出了它们的一致性图,以及国家的一致性图。在研究的基础上,作者对网络空间管理系统的组织结构(涉及域名和IP地址)进行了展望。考虑了自治系统和交通交换点,给出了自治系统的外部连通性结构及其随时间的变化。介绍了最大的电信联盟,它们对电信运营商的活动(直接或间接)产生影响,从而对电信运营商提供的最终用户获得的资源和服务(及其成本)产生影响。科学新颖性:网络空间管理系统的考虑结构使识别控制网络空间的主要系统和关键要素成为可能,其管理将允许控制网络空间的给定部分。
{"title":"EVOLUTION OF CYBERSPACE MANAGEMENT SYSTEMS","authors":"P. Zakalkin","doi":"10.21681/2311-3456-2022-1-76-86","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-1-76-86","url":null,"abstract":"The purpose of the study: to identify the main systems that control cyberspace and the key elements whose management will allow controlling a given segment of cyberspace. Research method: theory of complex systems; synergetic. Result: The paper considers the main control systems that play a key role in the management of cyberspace, highlights the structural elements of cyberspace and their interrelations with each other. Regional and local Internet registrars are considered, their coherence graph is presented, as well as the coherence graph by country. Based on the study, the author’s vision of the organizational structure of the cyberspace management system (in relation to domain names and IP addresses). Autonomous systems and traffic exchange points are considered, the structure of external connectivity of autonomous systems and its change over time are given on examples. The largest telecommunication alliances are presented, which have an impact on the activities of telecom operators (directly or indirectly) and, as a result, on the set of resources and services (as well as their cost) received by end users provided by telecommunication operators. Scientific novelty: the considered structure of the cyberspace management system made it possible to identify the main systems that control cyberspace and the key elements whose management will allow controlling a given segment of cyberspace.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"11 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129190205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Three-Level Parallel Programming System for the Hybrid 21-Core Scalar-Vector Microprocessor NM6408MP 混合21核标量矢量微处理器NM6408MP的三级并行编程系统
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-4-22-34
Dmitry Bikonov, A. Puzikov, A. Sivtsov, L. Eisymont
{"title":"Three-Level Parallel Programming System for the Hybrid 21-Core Scalar-Vector Microprocessor NM6408MP","authors":"Dmitry Bikonov, A. Puzikov, A. Sivtsov, L. Eisymont","doi":"10.21681/2311-3456-2019-4-22-34","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-4-22-34","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"325 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128456097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Major milestone in open source security 开源安全的重要里程碑
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2023-1-2-12
A. Markov
{"title":"Major milestone in open source security","authors":"A. Markov","doi":"10.21681/2311-3456-2023-1-2-12","DOIUrl":"https://doi.org/10.21681/2311-3456-2023-1-2-12","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116661658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self-Healing Cloud Computing 自修复云计算
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2021-1-80-89
S. Petrenko
Purpose of the article: development of tools for building a cyber-stable private cloud. The relevance of building a cyber-resilient private cloud is confirmed by the dynamics of growth in the market volume of relevant solutions. According to PRnewswire, the market for private cloud solutions will reach 183 billion USD by 2025. At the same time, the average annual growth rate of the CAGR will be 29.4% during the forecast period. According to the analytical company Grand view research, the global market for private cloud solutions in 2018 was estimated at 30.24 billion US dollars, and it is expected that in the period from 2019 to 2025, the CAGR will be 29.6%. Research methods: It uses a set of open-source solutions that applies the advanced cloud technologies, including distributed data processing models and methods, container orchestration technologies, softwaredefined data storage architecture, and a universal database. Results: Developed tools for building a cyber-stable private cloud. Considered a possible approach to building a cyber-resilient private cloud based on the well-known and proprietary models and methods of the artificial immune systems (AIS), as well as technologies for distributed data processing, container orchestration, and others. In addition, the unique centralized fault-tolerant logging and monitoring subsystem has been developed for the described platform, as well as an innovative cybersecurity subsystem based on the following original technologies.
本文的目的:开发用于构建网络稳定私有云的工具。相关解决方案市场容量的动态增长证实了构建具有网络弹性的私有云的重要性。据美通社报道,到2025年,私有云解决方案的市场规模将达到1830亿美元。同时,在预测期内,复合年增长率的年均增长率将为29.4%。根据分析公司Grand view的研究,2018年全球私有云解决方案市场估计为302.4亿美元,预计2019年至2025年期间,复合年增长率将达到29.6%。研究方法:采用一套开源解决方案,采用先进的云技术,包括分布式数据处理模型和方法、容器编排技术、软件定义数据存储架构和通用数据库。结果:开发了构建网络稳定私有云的工具。考虑了基于人工免疫系统(AIS)的知名和专有模型和方法,以及分布式数据处理、容器编排等技术,构建具有网络弹性的私有云的可能方法。此外,针对所描述的平台开发了独特的集中式容错日志与监控子系统,以及基于以下原始技术的创新网络安全子系统。
{"title":"Self-Healing Cloud Computing","authors":"S. Petrenko","doi":"10.21681/2311-3456-2021-1-80-89","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-1-80-89","url":null,"abstract":"Purpose of the article: development of tools for building a cyber-stable private cloud. The relevance of building a cyber-resilient private cloud is confirmed by the dynamics of growth in the market volume of relevant solutions. According to PRnewswire, the market for private cloud solutions will reach 183 billion USD by 2025. At the same time, the average annual growth rate of the CAGR will be 29.4% during the forecast period. According to the analytical company Grand view research, the global market for private cloud solutions in 2018 was estimated at 30.24 billion US dollars, and it is expected that in the period from 2019 to 2025, the CAGR will be 29.6%. Research methods: It uses a set of open-source solutions that applies the advanced cloud technologies, including distributed data processing models and methods, container orchestration technologies, softwaredefined data storage architecture, and a universal database. Results: Developed tools for building a cyber-stable private cloud. Considered a possible approach to building a cyber-resilient private cloud based on the well-known and proprietary models and methods of the artificial immune systems (AIS), as well as technologies for distributed data processing, container orchestration, and others. In addition, the unique centralized fault-tolerant logging and monitoring subsystem has been developed for the described platform, as well as an innovative cybersecurity subsystem based on the following original technologies.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126886244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Metagrammatic Approach to the Analysis of Hierarchies for Synthesis of Security Systems nuclear Power Plants 核电厂安全系统综合层次分析的元元方法
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2023-1-82-92
O. Atakishchev, V. Gribunin, Igor Borisenkov, Mikhail Lysachev
The purpose of the work is to analyze the features of the application of the integrated metagrammar approach of hierarchy analysis to solve the problem of structural-parametric synthesis of information security systems of automated control systems of low-power nuclear power plants.Research method: in order to achieve the goal of the work, the metagrammar approach of hierarchy analysis was used, which is an integration of the metagrammar approach and the Saati hierarchy analysis method.The result of the research: the metagrammar approach of hierarchy analysis is presented in the paper, the features of its application to solve the problem of structural-parametric synthesis of information security systems of automated control systems of low-power nuclear power plants are considered in detail.The scientific novelty lies in the development and analysis of the scientific and applied features of a new integrated metagrammar approach to hierarchy analysis, which allows the synthesis of complex structured information security systems in conditions of partial uncertainty.
本工作的目的是分析应用层次分析法的综合元语法方法解决小功率核电站自动化控制系统信息安全系统结构参数综合问题的特点。研究方法:为了达到工作的目的,采用了层次分析法的元语法方法,这是元语法方法和Saati层次分析法的结合。研究结果:提出了层次分析法的元语法方法,详细讨论了其在解决小功率核电站自动化控制系统信息安全系统结构参数综合问题中的应用特点。科学的新颖性在于开发和分析了一种新的综合元语法层次分析方法的科学和应用特点,该方法允许在部分不确定条件下综合复杂的结构化信息安全系统。
{"title":"Metagrammatic Approach to the Analysis of Hierarchies for Synthesis of Security Systems nuclear Power Plants","authors":"O. Atakishchev, V. Gribunin, Igor Borisenkov, Mikhail Lysachev","doi":"10.21681/2311-3456-2023-1-82-92","DOIUrl":"https://doi.org/10.21681/2311-3456-2023-1-82-92","url":null,"abstract":"The purpose of the work is to analyze the features of the application of the integrated metagrammar approach of hierarchy analysis to solve the problem of structural-parametric synthesis of information security systems of automated control systems of low-power nuclear power plants.Research method: in order to achieve the goal of the work, the metagrammar approach of hierarchy analysis was used, which is an integration of the metagrammar approach and the Saati hierarchy analysis method.The result of the research: the metagrammar approach of hierarchy analysis is presented in the paper, the features of its application to solve the problem of structural-parametric synthesis of information security systems of automated control systems of low-power nuclear power plants are considered in detail.The scientific novelty lies in the development and analysis of the scientific and applied features of a new integrated metagrammar approach to hierarchy analysis, which allows the synthesis of complex structured information security systems in conditions of partial uncertainty.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"31 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120984522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile banking: Information Security Risk Assessment 手机银行:信息安全风险评估
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-2-21-28
P. Revenkov, Dmitry Krupenko
{"title":"Mobile banking: Information Security Risk Assessment","authors":"P. Revenkov, Dmitry Krupenko","doi":"10.21681/2311-3456-2019-2-21-28","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-2-21-28","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128012346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Voprosy kiberbezopasnosti
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1