2020
DOI: 10.15587/1729-4061.2020.205702
|View full text |Cite
|
Sign up to set email alerts
|

Development of methodological foundations for designing a classifier of threats to cyberphysical systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0
3

Year Published

2020
2020
2021
2021

Publication Types

Select...
5

Relationship

4
1

Authors

Journals

citations
Cited by 16 publications
(33 citation statements)
references
References 23 publications
0
15
0
3
Order By: Relevance
“…The operative interaction of a decision-maker (DM) with the corporate information and education system constitutes one of the main operations of the entire technological cycle of management of an innovative and active university, which is considered as a business system. At the same time, the characteristics of a person as an element of the contour are increasingly often becoming a bottleneck in operational management under the existing structure of means and methods of human-machine interaction [64][65][66][67].…”
Section: Discussion Of the Methodological Principles Of Construction mentioning
confidence: 99%
See 1 more Smart Citation
“…The operative interaction of a decision-maker (DM) with the corporate information and education system constitutes one of the main operations of the entire technological cycle of management of an innovative and active university, which is considered as a business system. At the same time, the characteristics of a person as an element of the contour are increasingly often becoming a bottleneck in operational management under the existing structure of means and methods of human-machine interaction [64][65][66][67].…”
Section: Discussion Of the Methodological Principles Of Construction mentioning
confidence: 99%
“…14 shows the structural and logical block diagram of the methodological basis of the construction of the CIES of the IAU under conditions of corruption counteraction. To construct a conceptual synergistic model of security of the CIES of the IAU, we will use the updated classifiers of threats to cyber-physical (CFS) and information and communication (ICS) systems, proposed in paper [64]. Thus, by proposing a structural and logical scheme of methodological principles for constructing the CIES of IAU in an anti-corruption environment, it is possible to automate the control of an electronic document and e-education services at all levels of the university's hierarchical management structure.…”
Section: Model Basismentioning
confidence: 99%
“…Simulation of models: "predatorprey" taking into account the computing capabilities and focus of targeted cyberattacks, "predator-prey" taking into account the possible competition of attackers in relation to the "prey", "predator-prey" taking into account relationships between "prey species" and "predator species", "predator-prey" taking into account relationships between "prey species" and "predator species" using a Java Script software package presented on the web resource [27]. In the expert assessment of threats ((https:// bdu.fstec.ru/threat) [28], weighting factors of expert competence are proposed for the objectivity of expert judgments. The selection of experts from the scientific community is based on the analysis of publications in science-metric databases, research directions, as well as practical examination experience.…”
Section: Research Materials and Methodsmentioning
confidence: 99%
“…However, for it to function at the current rate of development of computing resources, and given the growth (modification) of cyberthreats seeking to be integrated with social engineering methods, it is necessary to consider the possible scenarios of their impact on the internal OT-infrastructure of CPPS. Paper [15] proposes using the following classification of cyberthreats to the cyber-physical and information-switching systems, which are the basis of CPPS, shown in Fig. 3.…”
Section: Research Materials and Methodsmentioning
confidence: 99%