On the Problem of Complex Security System Management of Cyber-physical Systems
Journal Title: Vìsnik Nacìonalʹnogo unìversitetu "Lʹvìvsʹka polìtehnìka". Serìâ Ìnformacìjnì sistemi ta merežì - Year 2018, Vol 901, Issue
Abstract
Models of information security (IS) management of cyber-physical systems (CPS) were analyzed according to ISO/IEC TR 13335 and ISO/IEC 27001, which are the basis for developing a management methodology of a complex security system (CSS) within the management model “plan – do – check – act”. The CSS management structure of CPS was proposed at the level of an information life cycle and the multilevel model “cyberspace – communication environment – physical space” based on the conception “object – threat – protection”, which extends an application of the IS management system.
Authors and Affiliations
Valeriy Dudykevych, Galyna Mykytyn, Andrii Rebets
Project of Information System for the Recognition Ofmathematical Expressions
The article describes the research of the peculiarities of methods and algorithms for the recognition of mathematical expressions. The possibility of simultaneous execution of structural analysis and classification of ch...
Інформаційна технологія управління Web-ресурсом на основі нечіткої логіки
The method of content management as its life cycle stage based on fuzzy logic is proposed. The method of content management describes the commercial Web resources forming and automation technology that simplifies the con...
The comparative analysis of parsing methods
Some parsing algorithms have been shown and described in the article. The performance comparison of the selected algorithms is made.
Intelligent analysis of mathematical software collapsing and expanding of formulae algorithms
This article is about determination of process of collapsing and expanding of algebra algorithms formulas. Synthesized, minimized, and built mathematical model of adaptation process and expanding and collapsing processes...
Symmetric Encryption Scheme Based on Neural Network
The method of symmetric data encryption on the basis of neural networks of the geometric transformations model (GTM) has been considered. Encryption key consists of input values of the training and test sets of the netwo...