Methods and technologies for ensuring cybersecurity of industrial and web-oriented systems and networks
Abstract
Keywords
Full Text:
PDFReferences
Bhamare, D., Zolanvari, M., Erbad, A., Jain, R., Khan, K., & Meskin, N. Cybersecurity for industrial control systems: A survey. Computers & security, 2020, vol. 89, article no. 101677. DOI: 10.1016/j.cose.2019.101677.
Thames, L., Schaefer, D. Cybersecurity for industry 4.0. Analysis for Design and Manufacturing. Heidelberg, Springer Publ., 2017. 265 p.
Gansac, V., Udroiu, A. M., Pistol, S. E-learning platform for cybersecurity of scada systems. International Scientific Conference "Strategies XXI". "Carol I" National Defence University, 2020, pp. 346-350.
Huang, A. Teaching, learning, and assessment with virtualization technology. Journal of Educational Technology Systems, 2019, vol. 47, no. 4, pp. 523-538.
Yu, H., Guo, J., Wu, L., Wu, S., Peng, B. Application of Server Virtualization Technology in Power Information Construction. Journal of Physics: Conference Series, 2021, vol. 1744, no. 2, article no. 022008.
Davydova, I. The formation of a practical and theoretical-practical component of the educational process in the context of legal education reform in Ukraine. Dilemas Contemporáneos: Educación, Política y Valores, 2020, vol. 7, iss. 2, pp. 1-25.
Niczeporuk, A., Kalinowska-Ozgowicz, E. Technologia informacyjna do wykrywania wirusów metamorficznych w lokalnych sieciach komputerowych. Wyniki badań interdyscyplinarnych w aspekcie edukacji techniczno-informatycznej i bezpieczeństwa. Politechnika Lubelska, Wydawnictwo Politechniki Lubelskiej, 2020, pp. 34-68.
Kim, S. G. A Study on Open API Security Protocol based on Multi-Channel. Journal of Convergence for Information Technology, 2020, vol. 10, no. 11, pp. 40-46.
Strielkina, A., Uzun, D., Kharchenko, V., Tetskyi, A. Modeling and Availability Assessment of Mobile Healthcare IoT Using Tree Analysis and Queueing Theory. Dependable IoT for Human and Industry: Modeling, Architecting, Implementation. River Publishers, 2018, pp. 105-126.
Khanna, M., Chauhan, N., Sharma, D. K., & Singh, L. K. A Multi-Objective 2- Approach for Test Suite Reduction During Testing of Web Applications: A Search-Based Approach. International Journal of Applied Metaheuristic Computing (IJAMC), 2021, vol. 12, no. 3. pp. 81-122.
Tkachov, V., Budko, A., Hvozdetska, K. and Hrebeniuk, D. Method of Building Dynamic Multi-Hop VPN Chains for Ensuring Security of Terminal Access Systems. IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T), 2020, pp. 613-618.
Lemeshko, O., Yeremenko, O., Yevdokymenko, M., Hailan, A. M. Tensor Multiflow Routing Model to Ensure the Guaranteed Quality of Service Based on Load Balancing in Network. International Conference on Computer Science, Engineering and Education Applications. Springer, Cham, 2020, pp. 120-131.
Meteshkin, К. А. Kiberneticheskaya pedagogika: teoreticheskiye osnovy upravleniya obrazovaniyem na baze integrirovannogo intellekta. [Cybernetic pedagogy: theoretical foundations of educational management based on integrated intelligence]. Kharkiv, International Slavic University Publ., 2004. 400 p.
Tetskyi, A. G., Morozova O. I. Aspekty kiberbezpeky platform dystantsiynoho navchannya. [Cybersecurity aspects of e-learning platforms]. Radioelektronni i komp'uterni sistemi – Radioelectronic and computer systems, 2020, vol. 4(96), pp. 93-97. DOI: 10.32620/reks.2020.4.08.
Slipachuk, L., Toliupa, S., Nakonechnyi, V. The Process of the Critical Infrastructure Cyber Security Management using the Integrated System of the National Cyber Security Sector Management in Ukraine. 3rd International Conference on Advanced Information and Communications Technologies (AICT), 2019, pp. 451-454.
Sharbaf, M. Reengineering Cyber Security Process: A New Perspective on Cyber Security Quality Management. IEEE International Conference on Dependable, Autonomic and Secure Computing, International Conference on Pervasive Intelligence and Computing, International Conference on Cloud and Big Data Computing, International Conference on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), 2019, pp. 332-337.
Hacimahmud, A. V. Structure and Metrics of Emerging Computing. IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET), 2020, pp. 920-925.
Kolisnyk, M. Vulnerability analysis and method of selection of communication protocols for information transfer in internet of things systems. Radioelektronni i komp'uterni sistemi – Radioelectronic and computer systems, 2021, vol. 1(97), pp. 133-149. DOI: 10.32620/reks.2021.1.12.
Kuchuk, G., Kovalenko, A., Komari, I. E., Svyrydov, A., Kharchenko, V. Improving big data centers energy efficiency: Traffic based model and method. Green IT Engineering: Social, Business and Industrial Applications. Springer, Cham, 2019, pp. 161-183.
Kuchuk, G., Kharchenko, V., Kovalenko, A., Ruchkov, E. Approaches to selection of combinatorial algorithm for optimization in network traffic control of safety-critical systems. 2016 IEEE East-West Design & Test Symposium (EWDTS), 2016, pp. 1-6.
Potii, O., Tsyplinskyi, Y., Illiashenko, O., Kharchenko, V. Criticality Assessment of Critical Information Infrastructure Objects: A Category Based Methodology and Ukrainian Experience. International Conference on Multimedia Communications, Services and Security. Springer, Cham, 2020, pp. 78-97.
Dotsenko, S. Intelektualʹni systemy: pryntsypy evrystychnoyi samoorhanizatsiyi [Intellectual systems: a principle of heuristic self-organization]. Radioelektronni i komp'uterni sistemi – Radioelectronic and computer systems, 2020, vol. 1(93), pp. 4-16. DOI: 10.32620/reks.2020.1.01.
Dotsenko, S. Intelektualʹni systemy: pryntsypy evrystychnoyi samoorhanizatsiyi protsesiv smyslovoho myslennya ta smyslovoyi diyalʹnosti [Intellectual systems: principles of heuristic self-organization of the processes of sense thinking and sense activity]. Radioelektronni i komp'uterni sistemi – Radioelectronic and computer systems, 2020, vol. 2(94), pp. 4-22. DOI: 10.32620/reks.2020.2.01.
DOI: https://doi.org/10.32620/reks.2021.4.12
Refbacks
- There are currently no refbacks.