The emergence of a full-scale quantum computer questions the stability of almost all symmetric and asymmetric cryptography algorithms. At the same time, the rapid growth of computing resources of IT and “G” technologies contributes to an increase in attacks on information and communication (ICS) and cyberphysical systems (CPS). These systems are the core of modern critical cybernetic information systems (CCIS). In such conditions, the primary task of maintaining the required level of security is the classification of modern threats that are integrated with social engineering methods and acquire signs of synergy and hybridity. The paper proposes a synergistic model of threats to ICS/CPS, which takes into account the focus of threats on syner...
The paper presents the results of the development of a method for assessing the security of cyber-ph...
The rapid development of computer technology, the emergence of modern cyber threats with signs of hy...
The paper presents the results of the development of a method for assessing the security of cyber-ph...
The emergence of a full-scale quantum computer questions the stability of almost all symmetric and a...
The development of the modern world community is closely related to advances in computing resources ...
The development of the modern world community is closely related to advances in computing resources ...
The development of technologies and computing resources has not only expanded the range of digital s...
The object of research is the process of forming the concept of building electronic government in th...
To effectively protect critical infrastructure facilities (CIF), it is important to understand the f...
To effectively protect critical infrastructure facilities (CIF), it is important to understand the f...
To effectively protect critical infrastructure facilities (CIF), it is important to understand the f...
Cyber-physical systems (CPSs) have been widely used in many different critical areas like smart grid...
The increasing integration of information technology with operational technology leads to the format...
The development of the IT industry and computing resources allows the formation of cyberphysical soc...
The development of Industry 4.0 technologies is based on the rapid growth of the computing capabilit...
The paper presents the results of the development of a method for assessing the security of cyber-ph...
The rapid development of computer technology, the emergence of modern cyber threats with signs of hy...
The paper presents the results of the development of a method for assessing the security of cyber-ph...
The emergence of a full-scale quantum computer questions the stability of almost all symmetric and a...
The development of the modern world community is closely related to advances in computing resources ...
The development of the modern world community is closely related to advances in computing resources ...
The development of technologies and computing resources has not only expanded the range of digital s...
The object of research is the process of forming the concept of building electronic government in th...
To effectively protect critical infrastructure facilities (CIF), it is important to understand the f...
To effectively protect critical infrastructure facilities (CIF), it is important to understand the f...
To effectively protect critical infrastructure facilities (CIF), it is important to understand the f...
Cyber-physical systems (CPSs) have been widely used in many different critical areas like smart grid...
The increasing integration of information technology with operational technology leads to the format...
The development of the IT industry and computing resources allows the formation of cyberphysical soc...
The development of Industry 4.0 technologies is based on the rapid growth of the computing capabilit...
The paper presents the results of the development of a method for assessing the security of cyber-ph...
The rapid development of computer technology, the emergence of modern cyber threats with signs of hy...
The paper presents the results of the development of a method for assessing the security of cyber-ph...