Пожалуйста, используйте этот идентификатор, чтобы цитировать или ссылаться на этот ресурс: http://repository.hneu.edu.ua/handle/123456789/25623
Полная запись метаданных
Поле DCЗначениеЯзык
dc.contributor.authorYevseiev S. P.-
dc.contributor.authorPonomarenko V. S.-
dc.contributor.authorLaptiev O.-
dc.contributor.authorMilov O. V.-
dc.contributor.authorKorol O. G.-
dc.contributor.authorMilevskyi S. V.-
dc.contributor.authorPohasii S.-
dc.contributor.authorTkachov A.-
dc.contributor.authorShmatko O. V.-
dc.contributor.authorMelenti Y.-
dc.contributor.authorSievierinov О. V.-
dc.contributor.authorOstapov S. E.-
dc.contributor.authorGavrilova A. A.-
dc.contributor.authorTsyhanenko O.-
dc.contributor.authorHerasimov S.-
dc.contributor.authorNyemkova E.-
dc.contributor.authorTomashevsky B.-
dc.contributor.authorHrod I.-
dc.contributor.authorOpirskyy I.-
dc.contributor.authorZvieriev V.-
dc.contributor.authorProkopenko O.-
dc.contributor.authorSavchenko V.-
dc.contributor.authorBarabash O.-
dc.contributor.authorSobchuk V.-
dc.contributor.authorShuklin G.-
dc.contributor.authorKhvostenko V.-
dc.contributor.authorTymochko O.-
dc.contributor.authorPavlenko M.-
dc.contributor.authorTrystan A.-
dc.contributor.authorFlorov S.-
dc.date.accessioned2021-07-06T08:43:42Z-
dc.date.available2021-07-06T08:43:42Z-
dc.date.issued2021-
dc.identifier.citationSynergy of building cybersecurity systems: monograph / Edited by S. Yevseiev, V. Ponomarenko, O. Laptiev, O. Milov and others. – Kharkiv: PC TECHNOLOGY CENTER, 2021. – 188 p.ru_RU
dc.identifier.urihttp://repository.hneu.edu.ua/handle/123456789/25623-
dc.description.abstractThe development of the modern world community is closely related to advances in computing resources and cyberspace. The formation and expansion of the range of services is based on the achievements of mankind in the field of high technologies. However, the rapid growth of computing resources, the emergence of a full-scale quantum computer tightens the requirements for security systems not only for information and communication systems, but also for cyber-physical systems and technologies. The methodological foundations of building security systems for critical infrastructure facilities based on modeling the processes of behavior of antagonistic agents in security systems are discussed in the first chapter. The concept of information security in social networks, based on mathematical models of data protection, taking into account the influence of specific parameters of the social network, the effects on the network are proposed in second chapter. The nonlinear relationships of the parameters of the defense system, attacks, social networks, as well as the influence of individual characteristics of users and the nature of the relationships between them, takes into account. In the third section, practical aspects of the methodology for constructing post-quantum algorithms for asymmetric McEliece and Niederreiter cryptosystems on algebraic codes (elliptic and modified elliptic codes), their mathematical models and practical algorithms are considered. Hybrid crypto-code constructions of McEliece and Niederreiter on defective codes are proposed. They can significantly reduce the energy costs for implementation, while ensuring the required level of cryptographic strength of the system as a whole. The concept of security of corporate information and educational systems based on the construction of an adaptive information security system is proposed.ru_RU
dc.language.isoenru_RU
dc.subjectcybersecurityru_RU
dc.subjectmodeling of conflict-cooperative interactionru_RU
dc.subjectcrypto-code constructionsru_RU
dc.subjectalgebraic geometric codesru_RU
dc.subjectclassifiers of cyber threatsru_RU
dc.titleSynergy of building cybersecurity systemsru_RU
dc.typeBookru_RU
Располагается в коллекциях:Монографії (КІТ)

Файлы этого ресурса:
Файл Описание РазмерФормат 
Монография ИТОГ.pdf3,33 MBAdobe PDFПросмотреть/Открыть


Все ресурсы в архиве электронных ресурсов защищены авторским правом, все права сохранены.