2019
DOI: 10.15587/1729-4061.2019.181047
|View full text |Cite
|
Sign up to set email alerts
|

Development of the interacting agents behavior scenario in the cyber security system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…One of the promising areas, according to the USA NIST experts, is the use of McEliece and Niederreiter crypto-code structures. Practical algorithms for providing basic security services: confidentiality, integrity and authenticity are proposed in [57][58][59]. This approach, taking into account their commercial implementation, does not contain cryptocurrencies and provides not only the required level of cryptographic security, but also the reliability and efficiency of the transmitted data.…”
Section: Discussion Of the Results Of The Methodology Study Using Thementioning
confidence: 99%
“…One of the promising areas, according to the USA NIST experts, is the use of McEliece and Niederreiter crypto-code structures. Practical algorithms for providing basic security services: confidentiality, integrity and authenticity are proposed in [57][58][59]. This approach, taking into account their commercial implementation, does not contain cryptocurrencies and provides not only the required level of cryptographic security, but also the reliability and efficiency of the transmitted data.…”
Section: Discussion Of the Results Of The Methodology Study Using Thementioning
confidence: 99%
“…The advantages of system-dynamic modeling also speak in favor of this choice. The methodology of system-dynamic modeling allows [62][63][64][65]:…”
Section: Discussion Of the Results Of Game-theoretic Modeling Of The Security System Agents Behavior Processesmentioning
confidence: 99%
“…In the context of increasing globalization processes in the world and the formation of an information society, cyberterrorism has become an independent factor that can threaten the state integrity of countries and destabilize the international situation. Terrorist groups are increasingly using the capabilities of the latest information technologies and the Internet to spread propaganda and exchange information, attract new mercenaries, raise funds in their support, plan terrorist attacks, and also to control their implementation [7][8][9][10].…”
Section: The Main Means Of Cyber Attackersmentioning
confidence: 99%