Кафедри
Постійне посилання на розділhttps://repository.kpi.kharkov.ua/handle/KhPI-Press/35393
Переглянути
2 результатів
Результати пошуку
Документ Use of a method of Pascal of calculation of checksums in noiseproof coding(Національний технічний університет "Харківський політехнічний інститут", 2019) Pevnev, Volodymyr; Tsuranov, Mikhail; Zemlianko, Heorhii; Kharchenko, VyacheslavThe subject matter of the article is opportunity use of a method of Pascal for finding of remainders of division of large numbers when using CRC. The goalis to analyze a possibility of use of a method of Pascal for definition of remainders of division in the CRC systems. Tasks: to analyze a possibility of use of CRC for noise-immune coding in different channels, to show a possibility of application of a method of Pascal for an image of noise-immune coding with use of checksums. The used methodsareanalytical method, methods of modal arithmetic’s. The received such results. The technique of calculation of Checksum of the message which are used for the control of integrity and restoration distorted the message is developed. Conclusions. Use of a method of Pascal for definition of remainders of division allows accelerating considerably process of search of various options the message, which will be restored. Realization of the offered method allows creating parallel structures, which give the chance to solve a problem of recovery of the message on the scale of real time.Документ Gap-analysis of assurance case-based cybersecurity assessment: technique and case study(НТУ "ХПІ", 2018) Illiashenko, Oleg; Kharchenko, Vyacheslav; Kor, Ah-LianThe subject matter of the article is the processes of cybersecurity assessment. The goalis to develop technique for gap-analysis of cybersecurity analysis process. The task to be solved is to develop a method for analyzing gaps in the process of assessment of non-functional requirements for safety and cybersecurity of ICS. It is based on the classification of requirements, taking into account the possibility of their decomposition, which includes the construction of an advanced security assurance and determination of counter-measures to address detected gaps. The scientific novelty of the results obtained is as follows: the method for ensuring the information security of digital components of the I&Cs was further developed by analyzing the discrepancies of requirements using vulnerability description procedures and assessing the severity of the intrusions consequences, as well as determining the set of countermeasures by the "security-cost" criterion, which makes it possible to reduce risks to an acceptable level.