The rapid development of computer technology, the emergence of modern cyber threats with signs of hybridity and synergy put forward strict requirements for the economic component of national security and especially the processes of ensuring the economy cybersecurity. The cybersecurity industry is trying to meet today's requirements by introducing new and more advanced security technologies and methods, but it is believed that such a universal approach is not enough. The study is devoted to resolving the objective contradiction between the growing practical requirements for an appropriate level of cybersecurity of business process contours while increasing the number and technological complexity of cybersecurity threats. Also the fact that t...
The article is of interest to managers and scientists at all levels who deal with combating cyber th...
The paper presents the results of the development of a method for assessing the security of cyber-ph...
The development of technologies and computing resources has not only expanded the range of digital s...
The rapid development of computer technology, the emergence of modern cyber threats with signs of hy...
The basic concepts that form the basis of integrated modeling of the behavior of antagonistic agents...
The results of the development of the model of the antagonistic agents behavior in a cyber conflict ...
The results of modeling and analysis of scenarios of the behavior of interacting agents in condition...
The results of modeling and analysis of scenarios of the behavior of interacting agents in condition...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
One form of activity in cyberspace is the information battle. One of the proposed definitions will d...
The development of technologies and computing resources not only expanded the spectrum of digital se...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
The paper presents the results of the development of a method for assessing the security of cyber-ph...
The technological innovation of cyber systems and increase dependence of individuals, societies and ...
The technological innovation of cyber systems and increase dependence of individuals, societies and ...
The article is of interest to managers and scientists at all levels who deal with combating cyber th...
The paper presents the results of the development of a method for assessing the security of cyber-ph...
The development of technologies and computing resources has not only expanded the range of digital s...
The rapid development of computer technology, the emergence of modern cyber threats with signs of hy...
The basic concepts that form the basis of integrated modeling of the behavior of antagonistic agents...
The results of the development of the model of the antagonistic agents behavior in a cyber conflict ...
The results of modeling and analysis of scenarios of the behavior of interacting agents in condition...
The results of modeling and analysis of scenarios of the behavior of interacting agents in condition...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
One form of activity in cyberspace is the information battle. One of the proposed definitions will d...
The development of technologies and computing resources not only expanded the spectrum of digital se...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
The paper presents the results of the development of a method for assessing the security of cyber-ph...
The technological innovation of cyber systems and increase dependence of individuals, societies and ...
The technological innovation of cyber systems and increase dependence of individuals, societies and ...
The article is of interest to managers and scientists at all levels who deal with combating cyber th...
The paper presents the results of the development of a method for assessing the security of cyber-ph...
The development of technologies and computing resources has not only expanded the range of digital s...