1 documents found
Information × Registration Number 0216U000726, 0115U001125 , R & D reports Title The methodology of the socio-technical systems complex information protection at information warfare popup.stage_title Head Luzhetskyi Volodymyr, Registration Date 22-02-2016 Organization Vinnitsa National Technical University popup.description2 The object of the research is the process of complex information protection providing of socio-technical systems at informational warfare. The subject of the research is methods and models of the access distribution to information resources and their protection against the external negative informational influence. The aim is providing of the guaranteed complex information protection level of sociotechnical systems operating under external negative influences by the methods and models development for the information resources protection. Research methods were based on the using of the system analysis, the conflict theory, the fuzzy set theory, the probability theory and mathematical statistics. The results of the research, purpose of which was to provide a guaranteed level of socio-technical systems operating under external negative influences complex information protection by the development of methods and models for the complex protection of information resources at informational warfare, were presented. The method of socio-technical systems (STS) complex information protection (F [lexible] C [ombined] - method) was developed, which is characterized by the ability of both statistical data and expert estimates presented as fuzzy sets usage. Mathematical models for organization of informational destructive influences counteractions, those provide the implementation of the efficient protection against informational and psychological operations (IPO) and take into account the impact sources and IPO implementation mechanisms, were developed. The informational warfare performing theory methodological base was proposed, namely the classification of information viruses that are designed to attack, both technical and social components of STS. The method of parallel hashing, which is based on the quaternion and octave transformation, was proposed to verify data sources, which provides computational speed increasing with resistance to generic attacks at the level same as the non-parallel hashing methods one. The efficiency of the proposed methods and models is based on their ability to formalize appearance and informational warfare performance stages and to create conditions for the complex information protection against informational-cyber attacks (ICA) implementation and IPO. Product Description popup.authors Баришев Юрій Володимирович Войтович Олеся Петрівна Дудатьєв Андрій Веніамінович Каплун Валентина Аполінаріївна Кобзар Іван Валерійович Лисянський Сергій Сергійович Лужецький Володимир Андрійович popup.nrat_date 2020-04-02 Close
R & D report
Head: Luzhetskyi Volodymyr. The methodology of the socio-technical systems complex information protection at information warfare. (popup.stage: ). Vinnitsa National Technical University. № 0216U000726
1 documents found

Updated: 2026-03-27