Національний юридичний університет імені Ярослава Мудрого ⚖ Головна ⓘ Довiдка
Авторизацiя
Прiзвище (укр.)
N Читацького квитка
 

Базы данных


Е-картотека "Публікації вчених НЮУ ім. Ярослава Мудрого в Scopus" - результати пошуку

Вид пошуку

  • Власна база даних
  • Більше 728 000 документів: книги, статті, збірники наукових праць, рідкісні видання, дисертації, автореферати
  • Створюється з 1999 року
  • Легкий, зручний, багатоаспектний інформаційний пошук
  • Можливість цілодобово працювати з інформаційним контентом
  • Електронне замовлення книг дистанційно
Область поиска
 Найдено в других БД:Eлектронний каталог (515)Зведений електронний каталог «Правова освіта. Правова культура» (4)
Формат представлення знайдених документів :
полный информационныйкраткий
Отсортировать найденные документы по:
авторузаглавиюгоду изданиятипу документа
Пошуковий запит: 

(<.>K=КІБЕРБЕЗПЕКА$<.>)

Загальна кількість знайденихдокументів : 3
Показані документи с 1 по 3
1.

Вид документа : Статья из журнала
Шифр издания :
Автор(ы) : Holovkin, Bohdan M., Tavolzhanskyi, Oleksii V., Lysodyed, Oleksandr V.
Заглавие : Corruption as a Cybersecurity Threat in the New World Order
Место публикации : Connections. - 2021. - Vol. 20, Iss. 2. - P.75-87
УДК : 343.85 + 343.35:35.08
Ключевые слова (''Своб.индексиров.''): corruption--covid-19 pandemic--cybersecu-rity threats--cybersecurity--fight against corruption--post-pandemic conditions--корупція--пандемія covid-19--загрози кібербезпеці--кібербезпека--боротьба з корупцією--коррупция--борьба с коррупцией--пандемия covid-19--кибербезопасность
Аннотация: The important topic of cybersecurity relative to the fight against corruption in the context of global challenges in the pandemic and post-pandemic world requires further research. The purpose of this article is to identify and analyze current and prospective cybersecurity issues in this context by applying general-scientific and special-legal methods of cogni-tion. Using the dialectical method, theoretical background, and contempo-rary views on ensuring cybersecurity served to investigate the key current challenges. Formal-legal and comparative methods allowed to recommend measures to enhance cybersecurity in view of the massive digitalization and social transformations. The authors emphasize the need to establish a national cybersecurity policy based on society’s information literacy and culture, combining respect to traditional and historical values with a mod-ern understanding of multicultural communication and well-being.
Текст - 0 байт
Текст
Найти похожие
2.

Вид документа : Однотомное издание
Шифр издания :
Автор(ы) : Yevseiev S., Milov O., Milevskyi S., Voitko O., Kasianenko M., Melenti Y., Pohasii S., Stepanov H., Turinskyi O., Faraon S.
Заглавие : Development and analysis of gametheoretical models of security systems agents interaction
Место публикации : Eastern-European Journal of Enterprise Technologies. - 2020. - Vol. 2. Issue 4. - P.15-29
УДК : 007
ББК : З81
Ключевые слова (''Своб.индексиров.''): game theory--теория игры--теорія гри--cybersecurity--кибербезопасность--кібербезпека--stackelberg games--игры штакельберга--ігри штакельберга--nash games--нэш игры--неш ігри--game equilibrium--игровое равновесие--ігрова рівновага--strategy--стратегия--стратегія
Аннотация: A game-theoretic approach is presented, which claims to be a universal method for solving most problems in the field of cybersecurity. As arguments to confirm the superiority of game theory, mathematical validity and provability of the optimality of decisions made, unlike the widely used heuristics, the possibility of developing reliable protection based on analytical results, ensuring a timely response to cyberattacks in conditions of limited resources, as well as distributed nature of decision making are highlighted. The definitions of the basic concepts used in security tasks based on game-theoretic models are introduced. The features of the application of game theory methods in the field of cybersecurity are listed and the limitations of research in this area are formulated, namely: a restriction on game strategies, simultaneous moves of players in the behavior patterns of security system agents, uncertainty in the time the players take the move, uncertainty in the final goal of the enemy, unpredictability of further player moves, lack of players’ assessment of enemy resources. as well as its ultimate goals, the inability to timely assess the current state of the game. The game-theoretic models are aligned with the listed security problems, and the main solutions obtained as a result of using the corresponding models are also determined. Many methods of game theory have been formed, for each of which a relationship is determined between the game model, its scope, simulation result and security services that the method under consideration supports. The limitations of the classical representation of game theory models are determined, the need to overcome which follows from the requirements for providing basic security services. Such limitations include: the ability of the defender to detect attacks, the certainty of the probabilities of a change of state before the start of the game, the synchronism of the players’ moves, the inability to scale the model due to the size and complexity of the system under consideration. Models of the main tasks of the interaction of antagonistic agents of security systems have been developed. The resulting models made it possible to obtain solutions to two of the most common tasks in the field of cybersecurity, namely, the interaction of the system administrator and the attacker in organizing the protection of information resources. The tasks are solved for various conditions – the game matrix contains cost estimates of resources and the matrix reflects the probability of threat realization. Pure and mixed strategies are defined for various initial conditions, which allows to exclude from the consideration strategies that are not included in the solution. A synergistic approach to the use of game-theoretic modeling was formed taking into account the behavior of agents of security systems, based on an analysis of the diversity and characteristics of game-theoretic models, their inherent limitations and scope
Текст - 0 байт
Текст,
Текст - 0 байт
Текст
Найти похожие
3.

Вид документа : Однотомное издание
Шифр издания : DOI: 10.15587/978/S98-711876
Автор(ы) : Yevseiev S., Ponomarenko V., Laptiev O., Milov O., Korol O., Melenti, Yevgen
Заглавие : Synergy of building cybersecurity systems : monograph
Выходные данные : Kharkiv: PC TECHNOLOGY CENTER, 2021
Колич.характеристики :175 p.
Цена : Б.ц.
УДК : 004.056
Ключевые слова (''Своб.индексиров.''): algebraic geometric codes--classifiers of cyber threats--crypto-code constructions--cybersecurity--modeling of conflict-cooperative interaction--алгебраїчні геометричні коди--класифікатори кіберзагроз--конструкції криптокоду--кібербезпека--моделювання конфліктно-кооперативної взаємодії--алгебраико-геометрические коды; классификаторы киберугроз; криптокодовые конструкции; информационная безопасность; моделирование конфликтно-кооперативного взаимодействия
Аннотация: The development of the modern world community is closely related to advances in computing resources and cyberspace. The formation and expansion of the range of services is based on the achievements of mankind in the field of high technologies. However, the rapid growth of computing resources, the emergence of a full-scale quantum computer tightens the requirements for security systems not only for information and communication systems, but also for cyber-physical systems and technologies. The methodological foundations of building security systems for critical infrastructure facilities based on modeling the processes of behavior of antagonistic agents in security systems are discussed in the first chapter. The concept of information security in social networks, based on mathematical models of data protection, taking into account the influence of specific parameters of the social network, the effects on the network are proposed in second chapter. The nonlinear relationships of the parameters of the defense system, attacks, social networks, as well as the influence of individual characteristics of users and the nature of the relationships between them, takes into account. In the third section, practical aspects of the methodology for constructing post-quantum algorithms for asymmetric McEliece and Niederreiter cryptosystems on algebraic codes (elliptic and modified elliptic codes), their mathematical models and practical algorithms are considered. Hybrid crypto-code constructions of McEliece and Niederreiter on defective codes are proposed. They can significantly reduce the energy costs for implementation, while ensuring the required level of cryptographic strength of the system as a whole. The concept of security of corporate information and educational systems based on the construction of an adaptive information security system is proposed.
Анотація - 0 байт
Анотація,
Текст - 0 байт
Текст
Найти похожие
 

Умовні позначення місця знаходження

3_пов.(ЗПІ) – зала правової інформації, НБК

4_пов.(НАб) – абонемент наукової літератури, НБК

4_пов.(ДБФ) – довідково-бібліографічний фонд, НБК

5_пов.(З/П) – зала періодичних видань, НБК

6_пов.(АХЛ) – абонемент художньої літератури, НБК

6_пов.(ЗІЛ) – зала літератури іноземними мовами, НБК

7_пов.(Хр) – книгосховище, НБК

8_пов.(РК) – книгосховище рідкісних видань та дисертацій, НБК

НБВ – інформаційно-бібліографічний відділ, НБК, 7 поверх

Ст.Аб. – студентський абонемент, НБК, 5 поверх

Філ №1 – філія № 1 (вул. Динамівська, 4)

Філ №2 – філія № 2 (вул. Пушкінська, 106)

Полт. фак. – Полтавський юридичний інститут, м. Полтава