Viktoriia Sydorenko

ORCID: 0000-0002-5910-0837
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cybersecurity and Information Systems
  • Advanced Data Processing Techniques
  • Information Systems and Technology Applications
  • Network Security and Intrusion Detection
  • Information and Cyber Security
  • Banking, Crisis Management, COVID-19 Impact
  • Risk and Safety Analysis
  • Economic Issues in Ukraine
  • Smart Grid Security and Resilience
  • Military Technology and Strategies
  • Air Traffic Management and Optimization
  • Technology Assessment and Management
  • Advanced Decision-Making Techniques
  • Cloud Data Security Solutions
  • Coding theory and cryptography
  • Quantum Computing Algorithms and Architecture
  • Advanced Control and Stabilization in Aerospace Systems
  • Systems Engineering Methodologies and Applications
  • Engineering Diagnostics and Reliability
  • Aerospace Engineering and Applications
  • Big Data and Business Intelligence
  • Military Strategy and Technology
  • Software System Performance and Reliability
  • Transportation Systems and Safety
  • Safety Systems Engineering in Autonomy

National Aviation University
2016-2023

State critical systems and resources can be damaged. By this means most of world leader states have attended to methods identifying, systematization security assurance for infrastructure objects. Loss or operational breakdown these objects cause significant irreparably damage national the state. However, as shown by analysis domestic normative base, today in Ukraine an exhaustive list information state is not yet formed there no clear mechanism defining. Given above, paper proposes a unified...

10.1109/dessert.2018.8409095 article EN 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT) 2018-05-01

In this paper the method of network-centric monitoring cyberincidents was developed, which is based on concept and implements in 8 stages.This allows to determine most important objects for protection, predict category cyberincidents, will arise as a result cyberattack, their level criticality.

10.5815/ijcnis.2017.06.04 article EN International Journal of Computer Network and Information Security 2017-06-04

Today world leading states began to focus on methods and tools of identifying, systematizing securing critical infrastructure objects. The loss or failure normal functioning these objects will lead significant even irreparable negative consequences for the national security. For application adequate protection methods, it is important determine level importance (criticality) state information in a certain sphere. From this viewpoint, method determining civil aviation was developed paper....

10.1109/picst47496.2019.9061390 article EN 2019-10-01

Modern information infrastructure consists of a large number systems and components that require constant monitoring control. To identify, analyze eliminate possible cyber threats, it is recommended to use single common solution - the so-called SIEM systems. technology collects event log data, detects unusual activity through real-time analysis, identifies generates alerts, suggests appropriate action scenarios. Today, quality has grown significantly, latest technologies artificial...

10.28925/2663-4023.2023.19.176196 article EN cc-by-nc-sa Cybersecurity Education Science Technique 2023-01-01

In today's world, it's almost impossible to find a sphere of human life in which information technologies would not be used. On the one hand, it simplifies - virtually everyone carries mini-computer his pocket and allows perform many operations, that took lot time, minutes. addition, IT has simplified promptly developed areas such as medicine, banking, document circulation, military, other infrastructures state. Nevertheless, even today, privacy remains major problem transactions. One most...

10.1109/idaacs.2019.8924286 article EN 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS) 2019-09-01

Стаття присвячена розробці методу визначення пріоритетів ІТ-інцидентів на об'єктах критичної інформаційної інфраструктури держави. У дослідженні розглянуто основні підходи до класифікації та управління ІТ-інцидентами, такі як ITIL, COBIT, ISO/IEC 20000 NIST Cybersecurity Framework. Запропонований метод базується використанні попарних порівнянь (AHP) для оцінки пріоритизації загроз, враховуючи їхній вплив різні рівні функціонування критичних об'єктів. детально описує етапи розробки методу,...

10.18372/2073-4751.78.18967 article UK Problems of Informatization and Management 2024-07-01

Critical information infrastructure protection is a complex process, which requires effective tools for entities' identification, criticality estimation, threat and vulnerability assessment, as well security ensuring against threats determining the cybersecurity level. The conducted analysis has shown that today there no complex, multifunctional method helps to evaluate level of critical entity or certain industry state. From this viewpoint, in paper advantages disadvantages known approaches...

10.1109/picst51311.2020.9467987 article EN 2020-10-06

Modern critical infrastructure with diverse systems requires a security information and event management (SIEM) system for unified monitoring against cyber threats. This collects log data, performs real-time analysis, flags threats, triggers alerts, advises response strategies. Enhanced by AI, Internet of Things, cloud technologies, modern SIEM have significantly improved optimized threat detection. research examines the functionality, basic operation, comparative capabilities current...

10.1109/idaacs58523.2023.10348645 article EN 2023-09-07

The subject of the article is methods and models for assessing criticality industry information telecommunications systems (ITS). purpose this to analyze existing assessment use its results propose a functional model calculating quantitative criterion security ITS. Results. Based on known method hierarchy analysis, ITS proposed, which, through processing expert assessments, allows obtain indicator security. This makes it possible simplify procedure selecting experts, avoid specifics data, as...

10.20998/2522-9052.2021.4.15 article EN cc-by-nc Advanced Information Systems 2021-12-20

In recent times all over the world number of different emergency situations was increased. Every day mass media informs about natural and man-caused disasters, weapon conflicts, acts terrorism, global crimes, piracy that were committed by both crime organizations single offenders. Increasingly frequently as a result these events many people fall victim also state critical importance systems resources can be damaged. According that, civil aviation industry requires special attention, just...

10.20535/2411-1031.2017.5.2.136978 article EN cc-by Collection Information technology and security 2017-12-31

Global trends to increase and improve the quality of cyber attacks have led actualization protection information telecommunications systems (ITS), in particular, sectoral, which are critical for functioning society, socio-economic development ensuring component national security. Taking into account needs security need introduce a systematic approach solving problems infrastructure protection, at level, creation such is one priorities reforming defense sector Ukraine. Thus, there develop...

10.28925/2663-4023.2021.11.166182 article EN cc-by-nc-sa Cybersecurity Education Science Technique 2021-01-01

Національний авіаційний

10.20998/2522-9052.2019.2.16 article UK cc-by-nc Advanced Information Systems 2019-07-08

The rapid development of information and communication technologies has increased the vulnerabilities various networks, systems objects as well made it much more difficult to ensure their reliable protection security. All these factors have led fact that world's leading countries begun pay considerable attention cybersecurity critical infrastructure protection. However, types with restricted access (in particular, confidential information) at remains unexplored. With this in mind, paper...

10.28925/2663-4023.2020.9.170181 article EN cc-by-nc-sa Cybersecurity Education Science Technique 2020-01-01
Coming Soon ...