The development of Industry 4.0 technologies is based on the rapid growth of the computing capabilities of mobile wireless technologies, which has made it possible to significantly expand the range of digital services and form a conglomeration of socio-cyber-physical systems and smart technologies. The First Section discusses the issues of building security systems based on the proposed Concept of multi-contour security systems, taking into account the hybridity and synergy of modern targeted cyber-attacks, their integration with social engineering methods. This approach not only increases the level of security, but also forms an objective approach to the use of post-quantum security mechanisms based on the proposed Lotka-Volterra models. ...
The emergence of a full-scale quantum computer questions the stability of almost all symmetric and a...
Social network sites have become de factor in establishing and maintaining good relationships across...
The efficacy of modern computer systems is normally regarded as a function of five basic attributes ...
The development of the modern world community is closely related to advances in computing resources ...
The development of the modern world community is closely related to advances in computing resources ...
The development of technologies and computing resources has not only expanded the range of digital s...
Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as su...
To effectively protect critical infrastructure facilities (CIF), it is important to understand the f...
To effectively protect critical infrastructure facilities (CIF), it is important to understand the f...
To effectively protect critical infrastructure facilities (CIF), it is important to understand the f...
The implementation of a cyber security system for critical infrastructures requires the extensive us...
The development of the Internet and social media has exploded in the last couple of years. Digital e...
The emergence of a full-scale quantum computer questions the stability of almost all symmetric and a...
The development of the Internet and social media has exploded in the last couple of years. Digital e...
The development of the IT industry and computing resources allows the formation of cyberphysical soc...
The emergence of a full-scale quantum computer questions the stability of almost all symmetric and a...
Social network sites have become de factor in establishing and maintaining good relationships across...
The efficacy of modern computer systems is normally regarded as a function of five basic attributes ...
The development of the modern world community is closely related to advances in computing resources ...
The development of the modern world community is closely related to advances in computing resources ...
The development of technologies and computing resources has not only expanded the range of digital s...
Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as su...
To effectively protect critical infrastructure facilities (CIF), it is important to understand the f...
To effectively protect critical infrastructure facilities (CIF), it is important to understand the f...
To effectively protect critical infrastructure facilities (CIF), it is important to understand the f...
The implementation of a cyber security system for critical infrastructures requires the extensive us...
The development of the Internet and social media has exploded in the last couple of years. Digital e...
The emergence of a full-scale quantum computer questions the stability of almost all symmetric and a...
The development of the Internet and social media has exploded in the last couple of years. Digital e...
The development of the IT industry and computing resources allows the formation of cyberphysical soc...
The emergence of a full-scale quantum computer questions the stability of almost all symmetric and a...
Social network sites have become de factor in establishing and maintaining good relationships across...
The efficacy of modern computer systems is normally regarded as a function of five basic attributes ...