Protecting Objects of Critical Information Infrastructure from Wartime Cyber Attacks by Decentralizing the Telecommunications Network
The environment is changed by people, both unconsciously and consciously. The
engineering and economic development of the environment is complemented by actions …
engineering and economic development of the environment is complemented by actions …
[PDF][PDF] Research on Security Challenges in Cloud Environments and Solutions based on the" Security-as-Code" Approach.
Abstract “Security as code” is an approach to security organization in cloud environments,
which is based on the method of integrating security controls, policies, and best practices …
which is based on the method of integrating security controls, policies, and best practices …
Evaluation method of the physical compatibility of equipment in a hybrid information transmission network
The article considers the physical compatibility of equipment (PCE) in a hybrid network of
information transmissions. The use of information technology is justified in the scheme of the …
information transmissions. The use of information technology is justified in the scheme of the …
Model to Formation Data Base of Internal Parameters for Assessing the Status of the State Secret Protection
Protection of information with limited access, especially state secrets, is an important task in
the sphere of national and information security of the state. To minimize the possible …
the sphere of national and information security of the state. To minimize the possible …
Increasing the Reliability of a Heterogeneous Network using Redundant Means and Determining the Statistical Channel Availability Factor
The purpose of the article is to develop recommendations for controlling the reliability of a
communication network by introducing redundant facilities and using statistical data …
communication network by introducing redundant facilities and using statistical data …
[PDF][PDF] Risk assessment in critical infrastructure computer networks
Risk assessment is an important domain of computer network security in critical and other
infrastructures. There are many approaches to risk analysis and assessment that can be …
infrastructures. There are many approaches to risk analysis and assessment that can be …
Comparative analysis of the efficiency of hydro, wind, and solar power plants in Kyrgyzstan
M Sadykov, N Temirbaeva… - Machinery & …, 2024 - technicalscience.com.ua
Investigation of the efficiency of hydro, wind, and solar power plants in Kyrgyzstan is
important in the context of develo** sustainable energy sources to ensure energy security …
important in the context of develo** sustainable energy sources to ensure energy security …
Hybrid Study of the Geophysical Situation in the Depressed Zone of Hydroelectric Power Plants Reservoir
The purpose of the study is to research the prospects of joint use of signals caused by
standing waves of water bodies when studying the geophysical situation near hydroelectric …
standing waves of water bodies when studying the geophysical situation near hydroelectric …
Conflicting Subsystems in the Information Space: A Study at the Software and Hardware Levels
he study of complex systems lead to the development of the theory of conflicts, which allows
modeling and solving information conflicts between elements of information and cybernetic …
modeling and solving information conflicts between elements of information and cybernetic …
Classical and post-quantum encryption for GDPR
In the dynamic digital landscape, the General Data Protection Regulation (GDPR) stands as
a transformative force, which aims to secure individual privacy and redefine organizational …
a transformative force, which aims to secure individual privacy and redefine organizational …