Кафедри
Постійне посилання на розділhttps://repository.kpi.kharkov.ua/handle/KhPI-Press/35393
Переглянути
3 результатів
Результати пошуку
Документ Cybersecurity challenges and solutions for critical infrastructure protection(Національний авіаційний університет, 2024) Tkachov, Andrii; Korolov, Roman; Rahimova, Irada; Aksonova, Iryna; Sevriukova, YelyzavetaCritical infrastructure can be vulnerable to attack from natural disasters or malicious actors such as hackers or terrorists. If these threats are not addressed quickly, they can lead to significant disruption in service delivery or even complete shutdowns which could have devastating consequences for those relying on them for their day-to-day activities. Therefore, it is important that governments take steps towards protecting critical infrastructure from potential threats by implementing comprehensive security measures both online and offline. Based on a comprehensive analysis of current issues, a decision has been made to ensure the cyber protection of critical infrastructure objects infrastructure. An analysis of cyber threats was carried out in relation to the dynamics of historical retrospective in sectors of critical infrastructure objects. As more and more systems become connected to the internet and vulnerable to cyber-attacks, it is important for organizations to invest in robust cybersecurity defenses to protect their systems from malicious actors. By taking these measures, organizations can help protect their systems from cyber-attacks and ensure the safety of the public. Formulates a model of threats from spills of critical infrastructure objects to cyber-attacks with a breakdown of threats by type. A triad of main actions and approaches for protecting critical infrastructure has been seen. Existing problems in implementing countermeasures and major threats posed to cyberspace actors have been identified. Key factors have been identified to break the cycle of cyber-attacks on critical infrastructure. Based on a comprehensive analysis and formulated concepts, a comprehensive approach to the protection of critical infrastructure objects is proposed in accordance with the management of global trends in the development of threats, threat models, and vulnerabilities of the protection system, a triad of actions and approaches to breaking cycles of cyber-attacks on critical infrastructure.Документ Design and evaluation of an IOTA-based medical information system(Національний авіаційний університет, 2023) Shmatko, Oleksandr; Kliuchka, Yaroslav; Korolov, Roman; Khvostenko, Vladyslav; Dunaiev, SergiiThe traditional medical information systems are plagued by issues such as data breaches, lack of privacy, and data integrity concerns. This paper presents the design and evaluation of an IOTA-based medical information system aimed at addressing these challenges. In recent years, blockchain technology has emerged as a powerful tool for securing and managing data in a decentralized manner. One area where this technology has the potential to revolutionize the way we do things is in e-medicine. E-medicine, or electronic medicine, refers to the use of technology to deliver healthcare services remotely. This includes telemedicine, online consultations, and remote monitoring of patients' health status. IOTA blockchain technology, in particular, has a lot of potential in e-medicine. IOTA is a distributed ledger technology that uses a directed acyclic graph (DAG) instead of a traditional blockchain. The main ad-vantage of this approach is that it eliminates the need for miners and makes the system more scalable, fast, and energy-efficient. IOTA is also designed to be feeless, making it an ideal choice for microtransactions. In e-medicine, IOTA can be used in several ways. One potential use case is for secure and decentralized storage of patients' medical records. Medical records are highly sensitive and contain confidential information that needs to be protected from unauthorized access. By using IOTA's tamperproof and immutable ledger, patients can have more control over their medical records and choose who has access to them. This can be especially useful in situations where patients need to share their medical records with multiple healthcare providers or research institutions. By leveraging the unique features of IOTA, such as its feeless microtransactions, scalability, and distributed ledger technology, the proposed system enhances security, privacy, and interoperability in healthcare informationПублікація UAVs Intercepting Possibility Substantiation: Economic and Technical Aspects(2022) Pohasii, Serhii; Korolov, Roman; Vorobiov, Bohdan; Bril, Mykhailo; Serhiienko, Olena; Milevskyi, StanislavThe main problem in the military and commercial sector is to detect the UAV and carry out a successful attack to neutralize it. In this case, sets of various tools from electronic warfare to missile systems can be used for destruction. Small, lightweight UAVs can be shot down with small arms, man-portable EW jamming, or rocket/cannon weapons, requiring more ammunition, limited energy, or high projectile costs. The most pressing issue is the definition of a tool that has intelligent computer control systems, sufficient technical characteristics, is mobile, easy to operate and economically feasible for use in the destruction of low-cost UAVs with a high coefficient of harm. This article discusses the economic and technical feasibility of using a UAV-controlled interceptor using the parallel approach guidance method.