The increase in the number of cases of failure of information and telecommunication networks due to cyber attacks determines the need to protect them from this type of attacks. The issue of increasing cyber security in the conditions of conducting operations by groups of troops (forces) is very important. Due to the armed conflict in the East of Ukraine, the military-political instability in the Middle East, the struggle for influence on world financial and energy flows, the global military-political instability is intensifying. This is due to an increase in the number of communication devices in information and telecommunication networks, as well as an increase in the number of possible attacks that can be used to disrupt the operation of ...
Expanding emerging and technology-based threats from adversaries and using cyberspace to conduct var...
On 24th of February, 2022, the Russian Federation launched an invasion of Ukraine. This is the first...
Tendensions of computer incidents development, evolving vulnerability of information systems, indent...
The increase in the number of cases of failure of information and telecommunication networks due to ...
The object of the research is a special-purpose communication system. The relevance of the research ...
We live in a well connected and technology dependent world. People, institutions, companies have inc...
The changed role of the military in contemporary conflicts and new tendencies in Rade V. Slavković a...
The methodical and applied aspects of the creation and application of cyber ranges are proposed in t...
The objective of the study is to identify the key factors of the stability of state information in t...
Hierarchical construction of special purpose systems, a large number of different types of communica...
Development of strategic communications is necessary for the effective preparation and use of the Ar...
One form of activity in cyberspace is the information battle. One of the proposed definitions will d...
One of the most important tasks of national security in modern conditions is to ensure the security ...
Purpose: analysis of current threats to Ukraine's national security in the information sphere, deter...
Currently, the majority of international economic, commercial, cultural, social, and governmental co...
Expanding emerging and technology-based threats from adversaries and using cyberspace to conduct var...
On 24th of February, 2022, the Russian Federation launched an invasion of Ukraine. This is the first...
Tendensions of computer incidents development, evolving vulnerability of information systems, indent...
The increase in the number of cases of failure of information and telecommunication networks due to ...
The object of the research is a special-purpose communication system. The relevance of the research ...
We live in a well connected and technology dependent world. People, institutions, companies have inc...
The changed role of the military in contemporary conflicts and new tendencies in Rade V. Slavković a...
The methodical and applied aspects of the creation and application of cyber ranges are proposed in t...
The objective of the study is to identify the key factors of the stability of state information in t...
Hierarchical construction of special purpose systems, a large number of different types of communica...
Development of strategic communications is necessary for the effective preparation and use of the Ar...
One form of activity in cyberspace is the information battle. One of the proposed definitions will d...
One of the most important tasks of national security in modern conditions is to ensure the security ...
Purpose: analysis of current threats to Ukraine's national security in the information sphere, deter...
Currently, the majority of international economic, commercial, cultural, social, and governmental co...
Expanding emerging and technology-based threats from adversaries and using cyberspace to conduct var...
On 24th of February, 2022, the Russian Federation launched an invasion of Ukraine. This is the first...
Tendensions of computer incidents development, evolving vulnerability of information systems, indent...