The development of technologies and computing resources has not only expanded the range of digital services in all spheres of human activity, but also determined the range of targeted cyber attacks. Targeted attacks are aimed at destroying not only the business structure, but also its individual components that determine critical business processes. The continuity of such business processes is a critical component of any company, organization or enterprise of any form of ownership, which has a critical impact on making a profit or organizing production processes. The proposed concept of determining the security level of critical business processes is based on the need to use multiloop information security systems. This makes it possible to ...
In modern conditions of abrupt changes in the military-political situation, the problem of ensuring ...
This special issue provides an introduction to cyberphysical security of networked control systems (...
Tendensions of computer incidents development, evolving vulnerability of information systems, indent...
The development of Industry 4.0 technologies is based on the rapid growth of the computing capabilit...
The paper presents the results of the development of a method for assessing the security of cyber-ph...
The paper presents the results of the development of a method for assessing the security of cyber-ph...
The emergence of a full-scale quantum computer questions the stability of almost all symmetric and a...
The development of the modern world community is closely related to advances in computing resources ...
The development of the modern world community is closely related to advances in computing resources ...
The emergence of a full-scale quantum computer questions the stability of almost all symmetric and a...
International audienceIndustrial cyber-physical systems (ICPS) are heterogeneous inter-operating par...
International audienceIndustrial cyber-physical systems (ICPS) are heterogeneous inter-operating par...
The development of technologies and computing resources not only expanded the spectrum of digital se...
In this era of 5G digital communication, the implementation of industry 4.0 is the need of the hour....
Analysis of the basic tendencies of occurrence of new threats of safety is resulted. Characteristics...
In modern conditions of abrupt changes in the military-political situation, the problem of ensuring ...
This special issue provides an introduction to cyberphysical security of networked control systems (...
Tendensions of computer incidents development, evolving vulnerability of information systems, indent...
The development of Industry 4.0 technologies is based on the rapid growth of the computing capabilit...
The paper presents the results of the development of a method for assessing the security of cyber-ph...
The paper presents the results of the development of a method for assessing the security of cyber-ph...
The emergence of a full-scale quantum computer questions the stability of almost all symmetric and a...
The development of the modern world community is closely related to advances in computing resources ...
The development of the modern world community is closely related to advances in computing resources ...
The emergence of a full-scale quantum computer questions the stability of almost all symmetric and a...
International audienceIndustrial cyber-physical systems (ICPS) are heterogeneous inter-operating par...
International audienceIndustrial cyber-physical systems (ICPS) are heterogeneous inter-operating par...
The development of technologies and computing resources not only expanded the spectrum of digital se...
In this era of 5G digital communication, the implementation of industry 4.0 is the need of the hour....
Analysis of the basic tendencies of occurrence of new threats of safety is resulted. Characteristics...
In modern conditions of abrupt changes in the military-political situation, the problem of ensuring ...
This special issue provides an introduction to cyberphysical security of networked control systems (...
Tendensions of computer incidents development, evolving vulnerability of information systems, indent...