Synergy of building cybersecurity systems
Serhii Yevseiev (),
Volodymir Ponomarenko,
Oleksandr Laptiev,
Oleksandr Milov,
Olha Korol,
Stanislav Milevskyi,
Serhii Pohasii,
Andrii Tkachov,
Olexander Shmatko,
Yevgen Melenti,
Оleksandr Sievierinov,
Sergey Ostapov,
Alla Gavrilova,
Oleksii Tsyhanenko,
Sergey Herasimov,
Elena Nyemkova,
Bogdan Tomashevsky,
Ivan Hrod,
Ivan Opirskyy,
Volodymyr Zvieriev,
Oleksandr Prokopenko,
Vitalii Savchenko,
Oleg Barabash,
Valentyn Sobchuk,
German Shuklin,
Vladyslav Khvostenko,
Oleksandr Tymochko,
Maksim Pavlenko,
Andrii Trystan and
Serhii Florov
Additional contact information
Serhii Yevseiev: Simon Kuznets Kharkiv National University of Economics
Volodymir Ponomarenko: Simon Kuznets Kharkiv National University of Economics
Oleksandr Laptiev: State University of Telecommunications
Oleksandr Milov: Simon Kuznets Kharkiv National University of Economics
Olha Korol: Simon Kuznets Kharkiv National University of Economics
Stanislav Milevskyi: Simon Kuznets Kharkiv National University of Economics
Serhii Pohasii: Simon Kuznets Kharkiv National University of Economics
Andrii Tkachov: Simon Kuznets Kharkiv National University of Economics
Olexander Shmatko: National Technical University "Kharkiv Polytechnic Institute"
Yevgen Melenti: Yaroslav Mudryi National Law University
Оleksandr Sievierinov: Kharkiv National University of Radio Electronics
Sergey Ostapov: Yuriy Fedkovych Chernivtsi National University
Alla Gavrilova: Simon Kuznets Kharkiv National University of Economics
Oleksii Tsyhanenko: Simon Kuznets Kharkiv National University of Economics
Sergey Herasimov: Ivan Kozhedub Kharkiv National Air Force University
Elena Nyemkova: National University Lviv Polytechnic
Bogdan Tomashevsky: Ternopil Ivan Puluj National Technical University
Ivan Hrod: Ternopil Ivan Puluj National Technical University
Ivan Opirskyy: Lviv Polytechnic National University
Volodymyr Zvieriev: Kyiv National University of Trade and Economics
Oleksandr Prokopenko: National Defence University of Ukraine named after Ivan Cherniakhovskyi
Vitalii Savchenko: State University of Telecommunications
Oleg Barabash: National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute"
Valentyn Sobchuk: State University of Telecommunications
German Shuklin: State University of Telecommunications
Vladyslav Khvostenko: Simon Kuznets Kharkiv National University of Economics
Oleksandr Tymochko: Ivan Kozhedub Kharkiv National Air Force University
Maksim Pavlenko: Ivan Kozhedub Kharkiv National Air Force University
Andrii Trystan: Ivan Kozhedub Kharkiv National Air Force University
Serhii Florov: National Technical University Dnipro Polytechnic
in Monographs from PC TECHNOLOGY CENTER
Abstract:
The development of the modern world community is closely related to advances in computing resources and cyberspace. The formation and expansion of the range of services is based on the achievements of mankind in the field of high technologies. However, the rapid growth of computing resources, the emergence of a full-scale quantum computer tightens the requirements for security systems not only for information and communication systems, but also for cyber-physical systems and technologies. The methodological foundations of building security systems for critical infrastructure facilities based on modeling the processes of behavior of antagonistic agents in security systems are discussed in the first chapter. The concept of information security in social networks, based on mathematical models of data protection, taking into account the influence of specific parameters of the social network, the effects on the network are proposed in second chapter. The nonlinear relationships of the parameters of the defense system, attacks, social networks, as well as the influence of individual characteristics of users and the nature of the relationships between them, takes into account. In the third section, practical aspects of the methodology for constructing post-quantum algorithms for asymmetric McEliece and Niederreiter cryptosystems on algebraic codes (elliptic and modified elliptic codes), their mathematical models and practical algorithms are considered. Hybrid crypto-code constructions of McEliece and Niederreiter on defective codes are proposed. They can significantly reduce the energy costs for implementation, while ensuring the required level of cryptographic strength of the system as a whole. The concept of security of corporate information and educational systems based on the construction of an adaptive information security system is proposed.
Keywords: Cybersecurity; modeling of conflict-cooperative interaction; crypto-code constructions; algebraic geometric codes; classifiers of cyber threats (search for similar items in EconPapers)
Date: 2021
ISBN: 978-617-7319-31-2
References: Add references at CitEc
Citations:
Downloads: (external link)
http://monograph.com.ua/pctc/catalog/view/64/52/231-1 (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:baq:pcbook:978-617-7319-31-2.redif
DOI: 10.15587/978-617-7319-31-2
Access Statistics for this book
More books in Monographs from PC TECHNOLOGY CENTER
Bibliographic data for series maintained by Iryna Prudius ().