In modern conditions of abrupt changes in the military-political situation, the problem of ensuring the security and cyber protection of computer systems of situational centers of critical infrastructure facilities are acquired particular importance. Information systems of situational centers of critical infrastructure need meticulous attention to methods and tools. The paper presents an analysis of the components of cybersecurity and dependability. The research is based on the ontological approach to their mutual impact, determining the features of the complex influence of random errors and deliberate attacks. Based on the analysis of the attributes of dependability and cybersecurity, a game model is proposed. In addition to the cyber-atta...
This article is devoted to the development of a model and elaboration of the structure of the mathem...
This article is devoted to the development of a model and elaboration of the structure of the mathem...
International audienceFor the last recent years, there has been a convergence between computer engin...
The development of technologies and computing resources has not only expanded the range of digital s...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
The analysis of the impact on the ecology of the state of cybersecurity of critical infrastructure o...
The analysis of the impact on the ecology of the state of cybersecurity of critical infrastructure o...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
One form of activity in cyberspace is the information battle. One of the proposed definitions will d...
The paper briefly presents some possibilities of the modern use of cyberspace tools for the theory o...
The increase in the number of cases of failure of information and telecommunication networks due to ...
This article is devoted to the development of a model and elaboration of the structure of the mathem...
Computer security in deployed systems is a dynamic interaction between attackers and defenders. Thes...
One of the most important tasks of national security in modern conditions is to ensure the security ...
The increase in the number of cases of failure of information and telecommunication networks due to ...
This article is devoted to the development of a model and elaboration of the structure of the mathem...
This article is devoted to the development of a model and elaboration of the structure of the mathem...
International audienceFor the last recent years, there has been a convergence between computer engin...
The development of technologies and computing resources has not only expanded the range of digital s...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
The analysis of the impact on the ecology of the state of cybersecurity of critical infrastructure o...
The analysis of the impact on the ecology of the state of cybersecurity of critical infrastructure o...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
One form of activity in cyberspace is the information battle. One of the proposed definitions will d...
The paper briefly presents some possibilities of the modern use of cyberspace tools for the theory o...
The increase in the number of cases of failure of information and telecommunication networks due to ...
This article is devoted to the development of a model and elaboration of the structure of the mathem...
Computer security in deployed systems is a dynamic interaction between attackers and defenders. Thes...
One of the most important tasks of national security in modern conditions is to ensure the security ...
The increase in the number of cases of failure of information and telecommunication networks due to ...
This article is devoted to the development of a model and elaboration of the structure of the mathem...
This article is devoted to the development of a model and elaboration of the structure of the mathem...
International audienceFor the last recent years, there has been a convergence between computer engin...