Національний юридичний університет імені Ярослава Мудрого ⚖ Головна ⓘ Довiдка
Авторизацiя
Прiзвище (укр.)
N Читацького квитка
 

Базы данных


Е-картотека "Публікації вчених НЮУ ім. Ярослава Мудрого в Scopus" - результати пошуку

Вид пошуку

  • Власна база даних
  • Більше 728 000 документів: книги, статті, збірники наукових праць, рідкісні видання, дисертації, автореферати
  • Створюється з 1999 року
  • Легкий, зручний, багатоаспектний інформаційний пошук
  • Можливість цілодобово працювати з інформаційним контентом
  • Електронне замовлення книг дистанційно
Область поиска
Формат представлення знайдених документів :
полныйинформационныйкраткий
Отсортировать найденные документы по:
авторузаглавиюгоду изданиятипу документа
Пошуковий запит: 

(<.>A=МЕЛЕНТІ, ЄВГЕН ОЛЕКСАНДРОВИЧ$<.>)

Загальна кількість знайденихдокументів : 7
Показані документи с 1 по 7
1.
Herasimov, V.
    Evaluation of surface profile of holographic diffraction reflective coatings on scattering chart using in laser alarm systems [Text] / V. Herasimov, Y. Kozhushko, E. Roshchupkin, V. Dekadin, V. Djus, Y. Melenti // International Journal of Emerging Trends in Engineering Research. - 2020. - Vol. 8, Iss. 8. - p. 4502-4507. - Припинена індексація в Scopus 08.01.2022
   Перевод заглавия: Оценка профиля поверхности голографических дифракционных отражающих покрытий на диаграммах рассеяния в системах лазерной сигнализации
ББК Ж

Аннотация: The evaluation analysis dependingon the type of holographic diffraction diagram scattering reflective coating on surface profile mentioned period is carried out. Change tendencies of charts type diffractive scattering reflective coatings period of growth surface profile are found out. The prospects of the use of holographic diffraction reflective coating composed of laser alarm systems. Determined that the value of the value of the period of the surface profile of holographic diffraction reflective coating significantly affects the type of scattering diagram of these coatings. Diagrams of dispersion diffraction reflective coating in relative units are given


Найти похожие

2.
Yevseiev, S.
    Development and analysis of gametheoretical models of security systems agents interaction [Текст] / S. Yevseiev, O. Milov, S. Milevskyi, O. Voitko, M. Kasianenko, Y. Melenti, S. Pohasii, H. Stepanov, O. Turinskyi, S. Turinskyi // Eastern-European Journal of Enterprise Technologies. - 2020. - Vol. 2. Issue 4. - P. 15-29
   Перевод заглавия: Разработка и анализ теоретико-игровых моделей взаимодействия агентов систем безопасности
УДК
ББК З81
РУБ DOI: https://doi.org/10.15587/1729-4061.2020.201418

Аннотация: A game-theoretic approach is presented, which claims to be a universal method for solving most problems in the field of cybersecurity. As arguments to confirm the superiority of game theory, mathematical validity and provability of the optimality of decisions made, unlike the widely used heuristics, the possibility of developing reliable protection based on analytical results, ensuring a timely response to cyberattacks in conditions of limited resources, as well as distributed nature of decision making are highlighted. The definitions of the basic concepts used in security tasks based on game-theoretic models are introduced. The features of the application of game theory methods in the field of cybersecurity are listed and the limitations of research in this area are formulated, namely: a restriction on game strategies, simultaneous moves of players in the behavior patterns of security system agents, uncertainty in the time the players take the move, uncertainty in the final goal of the enemy, unpredictability of further player moves, lack of players’ assessment of enemy resources. as well as its ultimate goals, the inability to timely assess the current state of the game. The game-theoretic models are aligned with the listed security problems, and the main solutions obtained as a result of using the corresponding models are also determined. Many methods of game theory have been formed, for each of which a relationship is determined between the game model, its scope, simulation result and security services that the method under consideration supports. The limitations of the classical representation of game theory models are determined, the need to overcome which follows from the requirements for providing basic security services. Such limitations include: the ability of the defender to detect attacks, the certainty of the probabilities of a change of state before the start of the game, the synchronism of the players’ moves, the inability to scale the model due to the size and complexity of the system under consideration. Models of the main tasks of the interaction of antagonistic agents of security systems have been developed. The resulting models made it possible to obtain solutions to two of the most common tasks in the field of cybersecurity, namely, the interaction of the system administrator and the attacker in organizing the protection of information resources. The tasks are solved for various conditions – the game matrix contains cost estimates of resources and the matrix reflects the probability of threat realization. Pure and mixed strategies are defined for various initial conditions, which allows to exclude from the consideration strategies that are not included in the solution. A synergistic approach to the use of game-theoretic modeling was formed taking into account the behavior of agents of security systems, based on an analysis of the diversity and characteristics of game-theoretic models, their inherent limitations and scope

Текст - 0 байт
Текст,
Текст - 0 байт
Текст

Найти похожие

3.

S98
Yevseiev, S.
    Synergy of building cybersecurity systems [Электронный ресурс] : monograph / S. Yevseiev, V. Ponomarenko, O. Laptiev, O. Milova, O. Korol, Y. Melenti and others. - Kharkiv : PC TECHNOLOGY CENTER, 2021. - 175 p.
Перевод заглавия: Синергія побудови систем кібербезпеки
   Перевод заглавия: Синергія побудови систем кібербезпеки
УДК
РУБ DOI: 10.15587/978-617-7319-31-2

Аннотация: The development of the modern world community is closely related to advances in computing resources and cyberspace. The formation and expansion of the range of services is based on the achievements of mankind in the field of high technologies. However, the rapid growth of computing resources, the emergence of a full-scale quantum computer tightens the requirements for security systems not only for information and communication systems, but also for cyber-physical systems and technologies. The methodological foundations of building security systems for critical infrastructure facilities based on modeling the processes of behavior of antagonistic agents in security systems are discussed in the first chapter. The concept of information security in social networks, based on mathematical models of data protection, taking into account the influence of specific parameters of the social network, the effects on the network are proposed in second chapter. The nonlinear relationships of the parameters of the defense system, attacks, social networks, as well as the influence of individual characteristics of users and the nature of the relationships between them, takes into account. In the third section, practical aspects of the methodology for constructing post-quantum algorithms for asymmetric McEliece and Niederreiter cryptosystems on algebraic codes (elliptic and modified elliptic codes), their mathematical models and practical algorithms are considered. Hybrid crypto-code constructions of McEliece and Niederreiter on defective codes are proposed. They can significantly reduce the energy costs for implementation, while ensuring the required level of cryptographic strength of the system as a whole. The concept of security of corporate information and educational systems based on the construction of an adaptive information security system is proposed.

Анотація - 0 байт
Анотація,
Текст - 0 байт
Текст
Свободных экз. нет

Найти похожие

4.
Yevseiev, S. .
    Development of a method for assessing forecast of social impact in regional communities [Текст] / S. Yevseiev, Y. Ryabukha, O. Milov, S. Milevskyi, S. Pohasii, Y. Ivanchenko, I. Ivanchenko, Y. Melenti, I. Opirskyy, I. Pasko // Eastern-European Journal of Enterprise Technologies. - 2021. - Vol. 6, Iss. 2 (114). - P. 30-43
   Перевод заглавия: Розробка методики оцінки прогнозу соціального впливу в регіональних громадах
УДК
РУБ DOI: 10.15587/1729-4061.2021.249313

Анотація - 0 байт
Анотація,
Текст - 0 байт
Текст

Найти похожие

5.
Yevseiev, S. .
    Development of a method for assessing the security of cyber-physical systems based on the Lotka–Volterra model [Text] / S. Yevseiev, S. Pohasii, S. Milevskyi, O. Milov, Y. Melenti, I. Grod, D. Berestov, R. Fedorenko, O. Kurchenko // Eastern-European Journal of Enterprise Technologies. - 2021. - Vol. 5, No. 9 (113). - P. 30-47
   Перевод заглавия: Разработка метода оценки безопасности киберфизических систем на основе модели Лотки–Вольтерры
УДК
РУБ DOI: 10.15587/1729-4061.2021.241638

Аннотация: The paper presents the results of the development of a method for assessing the security of cyber-physical systems based on the Lotka-Volterra model. Security models of cyber-physical systems are proposed: “predator-prey” taking into account the computing capabilities and focus of targeted cyberattacks, “predator-prey” taking into account the possible competition of attackers in relation to the “prey”, “predato-prey” taking into account the relationships between “prey species” and “predator species”, “predator-prey” taking into account the relationship between “prey species” and “predator species”. Based on the proposed approach, the coefficients of the Lotka-Volterra model α=0.39, β=0.32, γ=0.29, φ=0.27 were obtained, which take into account the synergy and hybridity of modern threats, funding for the formation and improvement of the protection system, and also allow determining the financial and computing capabilities of the attacker based on the identified threats. The proposed method for assessing the security of cyber-physical systems is based on the developed threat classifier, allows assessing the current security level and provides recommendations regarding the allocation of limited protection resources based on an expert assessment of known threats. This approach allows offline dynamic simulation, which makes it possible to timely determine attackers' capabilities and form preventive protection measures based on threat analysis. In the simulation, actual bases for assessing real threats and incidents in cyberphysical systems can be used, which allows an expert assessment of their impact on both individual security services and security components (cyber security, information security and security of information). The presented simulation results do not contradict the graphical results of the classical Lotka-Volterra model, which indicates the adequacy of the proposed approach for assessing the security of cyber-physical systems.

Текст - 0 байт
Текст

Найти похожие

6.
Yevsieiev, V. .
    Development of an algorithm and research of features for selecting devices to protect electric circuits from surges caused by thunderstorms [Текст] / V. Yevsieiev, R. Honchar, S. Starodubtsev, Y. Melenti, S. Pavlenko // Proceedings of the 3rd International Conference on Intelligent Communication Technologies and Virtual Mobile Networks, ICICV 2021 : 4-6 Feb. 2021. - Tirunelveli; India, 2021. - Ст. 9388398. - P. 480-485
РУБ DOI: 10.1109/ICICV50876.2021.9388398

Аннотация: Lightning strokes can cause considerable voltages in constructions of buildings, facilities, equipment. That may result in sparking, disruption to power supplies of electric energy consumers, equipment breakdowns etc. That is why it is strongly recommended (sometimes even compulsory) to install surge protective devices. Buildings and facilities (or their parts) depending on their purpose and thunderstorm intensities in the region they are located in, should be protected both from direct lightning strokes and from lightning secondary effects. The lightning protection project should have projects both for external and internal lightning protection systems. The paper suggests a algorithm for calculating the main of surge protective devices parameters are class, impulse current, nominal discharge current, maxi-mum discharge current, open-circuit voltage, maximum continuous operating voltage, maximum continuous operating current, voltage protection level, follow current, temporary overvoltage and response time. For microelectronic equipment the voltage protection the zone-selective system is required. The presented paper suggests an algorithm for selecting surge protective devices for power supply circuits of electrical energy consumers in order to ensure reliability of energy supply in conditions of thunderstorm activities. The algorithm is suggested with account of the requirements of relevant European and American standards. A study of features for selecting devices to protect electric circuits from surges caused by thunderstorms. For illustrative representation of implication of the suggested algorithm a functional mock-up for surge protection of a single-phase consumer at its plugging into the mains.

Анотація - 0 байт
Анотація

Найти похожие

7.
Yevseiev, S. .
    Development of a Concept for Building a Critical Infrastructure Facilities Security System [Text] / S. Yevseiev, Y. Melenti, O. Voitko, V. Hrebeniuk, A. Korchenko, S. Mykus, O. Milov, O. Prokopenko, O. Sievierinov, D. Chopenko // Eastern-European Journal of Enterprise Technologies. - 2021. - Vol. 3. - P. 63-83
   Перевод заглавия: Розробка концепції побудови системи безпеки об'єктів критичної інфраструктури
ББК Х621.162
РУБ DOI 10.15587/1729-4061.2021.233533

Аннотация: To effectively protect critical infrastructure facilities (CIF), it is important to understand the focus of cybersecurity efforts. The concept of building security systems based on a variety of models describing various CIF functioning aspects is presented. The development of the concept is presented as a sequence of solving the following tasks. The basic concepts related to cyberattacks on CIF were determined, which make it possible to outline the boundaries of the problem and determine the level of formalization of the modeling processes. The proposed threat model takes into account possible synergistic/emergent features of the integration of modern target threats and their hybridity. A unified threat base that does not depend on CIF was formed. The concept of modeling the CIF security system was developed based on models of various classes and levels. A method to determine attacker's capabilities was developed. A concept for assessing the CIF security was developed, which allows forming a unified threat base, assessing the signs of their synergy and hybridity, identifying critical CIF points, determining compliance with regulatory requirements and the state of the security system. The mathematical tool and a variety of basic models of the concept can be used for all CIFs, which makes it possible to unify preventive measures and increase the security level. It is proposed to use post-quantum cryptography algorithms on crypto-code structures to provide security services. The proposed mechanisms provide the required stability (230–235 group operations), the rate of cryptographic transformation is comparable to block-symmetric ciphers (BSC) and reliability (Perr 10–9–10–12)

Текст - 0 байт
Текст

Найти похожие

 

Умовні позначення місця знаходження

3_пов.(ЗПІ) – зала правової інформації, НБК

4_пов.(НАб) – абонемент наукової літератури, НБК

4_пов.(ДБФ) – довідково-бібліографічний фонд, НБК

5_пов.(З/П) – зала періодичних видань, НБК

6_пов.(АХЛ) – абонемент художньої літератури, НБК

6_пов.(ЗІЛ) – зала літератури іноземними мовами, НБК

7_пов.(Хр) – книгосховище, НБК

8_пов.(РК) – книгосховище рідкісних видань та дисертацій, НБК

НБВ – інформаційно-бібліографічний відділ, НБК, 7 поверх

Ст.Аб. – студентський абонемент, НБК, 5 поверх

Філ №1 – філія № 1 (вул. Динамівська, 4)

Філ №2 – філія № 2 (вул. Пушкінська, 106)

Полт. фак. – Полтавський юридичний інститут, м. Полтава