Articles from section "Critical information infrastructure security"

Selection of trust models when integrating distributed information systems of critical application

Critical information infrastructure security
  • Year: 2021
  • Issue: 4
  • 0
  • 80
  • Pages: 79-90

Assessment of the possibility of upgrading information security systems in the planned time frame

Critical information infrastructure security
  • Year: 2024
  • Issue: 3
  • 0
  • 111
  • Pages: 80-87

Application of distributed ledger technology to protect smart city information systems

Critical information infrastructure security
  • Year: 2024
  • Issue: 3
  • 0
  • 121
  • Pages: 69-79

Creatıon of software technıcal tools to protect technologıcal processes from ınternet threats

Critical information infrastructure security
  • Year: 2024
  • Issue: 2
  • 0
  • 108
  • Pages: 104-116

Ensuring information security of vanets based on early detection of malicious nodes

Critical information infrastructure security
  • Year: 2024
  • Issue: 2
  • 0
  • 107
  • Pages: 95-103

Ensuring the connectivity and functional integrity of wireless reconfigurable networks by rebuilding the topology using an improved method of network game

Critical information infrastructure security
  • Year: 2024
  • Issue: 2
  • 0
  • 106
  • Pages: 84-94

Method of dynamic distribution of access rights in an autonomous group of robotic systems based on genetic algorithms

Critical information infrastructure security
  • Year: 2025
  • Issue: 3
  • 1
  • 291
  • Pages: 100-109

Cybersecurity of the functional network of critical infrastructure facilities using the strategy of optimal placement of Honeypot nodes

Critical information infrastructure security
  • Year: 2025
  • Issue: 3
  • 6
  • 294
  • Pages: 91-99

Ensuring byzantine fault tolerance of a distributed ledgers in a smart city based on a trust model

Critical information infrastructure security
  • Year: 2025
  • Issue: 3
  • 5
  • 296
  • Pages: 81-90