Author of the publication

Information Security Risk Management using Cognitive Modeling (short paper).

, , , , and . CPITS II, volume 3550 of CEUR Workshop Proceedings, page 297-305. CEUR-WS.org, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Restricted Information Identification Model (short paper)., , , , and . CPITS, volume 3288 of CEUR Workshop Proceedings, page 89-95. CEUR-WS.org, (2022)Models and Methods for Determining Application Performance Estimates in Distributed Structures (short paper)., , , , and . CPITS, volume 3288 of CEUR Workshop Proceedings, page 134-141. CEUR-WS.org, (2022)Information Security Risk Analysis SWOT (short paper)., , , , and . CPITS I, volume 2923 of CEUR Workshop Proceedings, page 309-317. CEUR-WS.org, (2021)Information Security Risk Management using Cognitive Modeling (short paper)., , , , and . CPITS II, volume 3550 of CEUR Workshop Proceedings, page 297-305. CEUR-WS.org, (2023)Model of Informational and Cyber Security Synthetic Learning Environment Step-by-Step Implementation., , , , and . CPITS II (1), volume 3187 of CEUR Workshop Proceedings, page 89-102. CEUR-WS.org, (2021)Conflict Model of Radio Engineering Systems under the Threat of Electronic Warfare., , , , and . CPITS, volume 3654 of CEUR Workshop Proceedings, page 290-300. CEUR-WS.org, (2024)Conflicting Subsystems in the Information Space: A Study at the Software and Hardware Levels., , , , and . CPITS, volume 3654 of CEUR Workshop Proceedings, page 333-342. CEUR-WS.org, (2024)Unlocking the Economic Potential of Real Estate Tokenization in Ukraine., , , and . DECaT, volume 3665 of CEUR Workshop Proceedings, page 79-87. CEUR-WS.org, (2024)Conflict Analysis in the "Subject-to-Subject" Security System., , , , and . CPITS, volume 3421 of CEUR Workshop Proceedings, page 56-66. CEUR-WS.org, (2023)Protection of Information in Telecommunication Medical Systems based on a Risk-Oriented Approach., , , , and . CPITS, volume 3421 of CEUR Workshop Proceedings, page 158-167. CEUR-WS.org, (2023)