[PDF][PDF] Construction cybersecurity and critical infrastructure protection: new horizons for Construction 4.0.

BG de Soto, A Georgescu, B Mantha, Z Turk… - J. Inf. Technol …, 2022 - researchgate.net
One of the key concepts of Construction 4.0 is cyber-physical systems. The construction
industry is increasingly creating valuable digital assets, but it is also gradually using digital …

Efficiency assessment of the steganographic coding method with indirect integration of critical information

O Yudin, R Ziubina, S Buchyk, O Frolov… - … on Advanced Trends …, 2019 - ieeexplore.ieee.org
The presented method of encoding and steganographic embedding of a series of bits for the
hidden message was first developed by modifying the digital platform (bases) of the …

Overlay Network Infrastructure for Remote Control of Radio Astronomy Observatory

V Tkachov, M Bondarenko, O Ulyanov… - … on Advanced Trends …, 2019 - ieeexplore.ieee.org
Joint scientific experiments are the main way of international cooperation in the field of
science. One of the ways to organize joint research is providing remote groups of scientists …

[PDF][PDF] Modeling of Critical Nodes in Complex Poorly Structured Organizational Systems.

T Babenko, H Hnatiienko, V Ignisca, M Iavich - IVUS, 2021 - ceur-ws.org
A mathematical model of the problem of determining critical nodes in complex weakly
structured organizational systems is proposed. The use of graphs to model the relationships …

[PDF][PDF] Modeling of the Integrated Quality Assessment System of the Information Security Management System.

T Babenko, H Hnatiienko, V Vialkova - IT&I Workshops, 2020 - ceur-ws.org
The paper presents approaches to determining the necessary and sufficient level of
implementation of security measures presented in the" best practices" at a certain level …

Condition and prospects of legal regulation of the security of critical information infrastructure in Russia and in foreign countries

E Polyakova, O Filonova… - SHS Web of …, 2021 - shs-conferences.org
The article is devoted to an urgent problem related to the security of critical information
infrastructure. The introduction of digital technologies in all spheres of society is in line with …

A Secure State of the OSI-Based Distributed System in the Context of Evaluating Cyber Security

P Khusainov, S Toliupa… - 2022 IEEE 9th …, 2022 - ieeexplore.ieee.org
A scientific rationale for cyber security measures is to be based on the use of a particular
objective function. This objective function has to integrate and meaningfully describe: the …

[PDF][PDF] Calculation of symbol error rate in a telecommunication system based on amplitude modulation of many components

IV Horbatyi - Mathematical modeling and computing, 2021 - science.lpnu.ua
The known analytical equations for calculating the symbol error rate (SER) in the M-ary
telecommunication system are considered. The analytical equations for calculating SER in a …

[PDF][PDF] Managing the Security of the Critical Infrastructure Information Network.

S Toliupa, A Shevchenko, S Buchyk, I Pampukha… - CPITS II, 2023 - ceur-ws.org
Critical infrastructure has a multi-level structure, encompassing technical components, social
aspects, organizational elements, and government involvement, all interconnected through …

[PDF][PDF] Simulation model of information system transformation to increase survivability against cyber threats

Y Syvytsky, V Shevchenko - 2024 - ceur-ws.org
The paper is devoted to the topical issue of the development of methods for increasing the
survivability of information systems in conditions of malicious harmful influences. The …