Protecting Objects of Critical Information Infrastructure from Wartime Cyber Attacks by Decentralizing the Telecommunications Network

P Anakhov, V Zhebka, S Popereshnyak… - … in Information and …, 2023‏ - elibrary.kubg.edu.ua
The environment is changed by people, both unconsciously and consciously. The
engineering and economic development of the environment is complemented by actions …

[PDF][PDF] Research on Security Challenges in Cloud Environments and Solutions based on the" Security-as-Code" Approach.

O Vakhula, I Opirskyy, O Mykhaylova - CPITS II, 2023‏ - ceur-ws.org
Abstract “Security as code” is an approach to security organization in cloud environments,
which is based on the method of integrating security controls, policies, and best practices …

Evaluation method of the physical compatibility of equipment in a hybrid information transmission network

P Anakhov, V Zhebka, A Tushych… - … of Theoretical and …, 2022‏ - elibrary.kubg.edu.ua
The article considers the physical compatibility of equipment (PCE) in a hybrid network of
information transmissions. The use of information technology is justified in the scheme of the …

Model to Formation Data Base of Internal Parameters for Assessing the Status of the State Secret Protection

Y Dreis, О Korchenko, Z Brzhevska… - … in Information and …, 2024‏ - elibrary.kubg.edu.ua
Protection of information with limited access, especially state secrets, is an important task in
the sphere of national and information security of the state. To minimize the possible …

Increasing the Reliability of a Heterogeneous Network using Redundant Means and Determining the Statistical Channel Availability Factor

P Anakhov, V Zhebka, A Bondarchuk… - … in Information and …, 2023‏ - elibrary.kubg.edu.ua
The purpose of the article is to develop recommendations for controlling the reliability of a
communication network by introducing redundant facilities and using statistical data …

[PDF][PDF] Risk assessment in critical infrastructure computer networks

I Zhukov, T Okhrimenko, S Balakin… - CEUR Workshop …, 2023‏ - ceur-ws.org
Risk assessment is an important domain of computer network security in critical and other
infrastructures. There are many approaches to risk analysis and assessment that can be …

Comparative analysis of the efficiency of hydro, wind, and solar power plants in Kyrgyzstan

M Sadykov, N Temirbaeva… - Machinery & …, 2024‏ - technicalscience.com.ua
Investigation of the efficiency of hydro, wind, and solar power plants in Kyrgyzstan is
important in the context of develo** sustainable energy sources to ensure energy security …

Hybrid Study of the Geophysical Situation in the Depressed Zone of Hydroelectric Power Plants Reservoir

P Anakhov, V Zhebka, V Kravchenko… - … in Information and …, 2023‏ - elibrary.kubg.edu.ua
The purpose of the study is to research the prospects of joint use of signals caused by
standing waves of water bodies when studying the geophysical situation near hydroelectric …

Conflicting Subsystems in the Information Space: A Study at the Software and Hardware Levels

СМ Шевченко, ЮД Жданова… - Proceedings of the …, 2024‏ - elibrary.kubg.edu.ua
he study of complex systems lead to the development of the theory of conflicts, which allows
modeling and solving information conflicts between elements of information and cybernetic …

Classical and post-quantum encryption for GDPR

M Iavich, O Kovalchuk, S Gnatyuk… - … , Quantum, and Post …, 2024‏ - elibrary.kubg.edu.ua
In the dynamic digital landscape, the General Data Protection Regulation (GDPR) stands as
a transformative force, which aims to secure individual privacy and redefine organizational …