The paper presents the results of the development of a method for assessing the security of cyber-physical systems based on the Lotka–Volterra model. Security models of cyber-physical systems are proposed: “predator–prey” taking into account the computing capabilities and focus of targeted cyberattacks, “predator–prey” taking into account the possible competition of attackers in relation to the “prey”, “predator–prey” taking into account the relationships between “prey species” and “predator species”, “predator–prey” taking into account the relationship between “prey species” and “predator species”. Based on the proposed approach, the coefficients of the Lotka–Volterra model α=0.39, β=0.32, γ=0.29, φ=0.27 were obtained, which take into acco...
This article is devoted to the development of a model and elaboration of the structure of the mathem...
This article is devoted to the development of a model and elaboration of the structure of the mathem...
The rapid development of computer technology, the emergence of modern cyber threats with signs of hy...
The paper presents the results of the development of a method for assessing the security of cyber-ph...
The paper presents the results of the development of a method for assessing the security of cyber-ph...
© 2017, Springer International Publishing AG. Cyber-Physical Systems are heavily used in today’s wor...
The development of technologies and computing resources has not only expanded the range of digital s...
The rapid development of computer technology, the emergence of modern cyber threats with signs of hy...
International audienceIndustrial cyber-physical systems (ICPS) are heterogeneous inter-operating par...
The development of the IT industry and computing resources allows the formation of cyberphysical soc...
International audienceIndustrial cyber-physical systems (ICPS) are heterogeneous inter-operating par...
W pracy poruszono zagadnienia ataków w cyberprzestrzeni opartej na sieciach komputerowych (w tym Int...
Cyber-Physical System (CPS) is a new kind of digital technology that increases its attention across ...
This article is devoted to the development of a model and elaboration of the structure of the mathem...
This article is devoted to the development of a model and elaboration of the structure of the mathem...
This article is devoted to the development of a model and elaboration of the structure of the mathem...
This article is devoted to the development of a model and elaboration of the structure of the mathem...
The rapid development of computer technology, the emergence of modern cyber threats with signs of hy...
The paper presents the results of the development of a method for assessing the security of cyber-ph...
The paper presents the results of the development of a method for assessing the security of cyber-ph...
© 2017, Springer International Publishing AG. Cyber-Physical Systems are heavily used in today’s wor...
The development of technologies and computing resources has not only expanded the range of digital s...
The rapid development of computer technology, the emergence of modern cyber threats with signs of hy...
International audienceIndustrial cyber-physical systems (ICPS) are heterogeneous inter-operating par...
The development of the IT industry and computing resources allows the formation of cyberphysical soc...
International audienceIndustrial cyber-physical systems (ICPS) are heterogeneous inter-operating par...
W pracy poruszono zagadnienia ataków w cyberprzestrzeni opartej na sieciach komputerowych (w tym Int...
Cyber-Physical System (CPS) is a new kind of digital technology that increases its attention across ...
This article is devoted to the development of a model and elaboration of the structure of the mathem...
This article is devoted to the development of a model and elaboration of the structure of the mathem...
This article is devoted to the development of a model and elaboration of the structure of the mathem...
This article is devoted to the development of a model and elaboration of the structure of the mathem...
The rapid development of computer technology, the emergence of modern cyber threats with signs of hy...