Кафедра безпеки інформаційних технологій
Permanent URI for this communityhttp://er.nau.edu.ua/handle/NAU/14303
News
Відповідальний за розділ: Коломієць Марина В'ячеславівна, асистент
кафедри Безпеки інформаційних технологій. E-mail: maryna.kolomiiets@npp.nau.edu.ua
Browse
Browsing Кафедра безпеки інформаційних технологій by Author "Korchenko, Oleksandr G."
Now showing 1 - 4 of 4
- Results Per Page
- Sort Options
Item Generalized models, construction methodology and the application of secure wireless sensor networks with random network parameters(Науковий журнал "Безпека інформації", 2014-05-20) Korchenko, Oleksandr G.; Rajba, Stanislaw W.; Karpinski, Mikolaj P.A wireless sensor network (WSN) of spatially distributed autonomous sensors to monitor physical or environmental conditions and to cooperatively pass their data through the network to a main location. In computer science and telecommunications, WSN are an active research area. In the paper an analysis of models of WSN with random access is presented. In these models, the parameters characterizing the network can be random. We presented the methodology of selection of the network model for practical application. We give an example of application of this methodology for the selection of the network model that supports the safety of maintenance work on the building.Item Modern quantum technologies of information security cyber-terrorist attacks(2010-05-20) Korchenko, Oleksandr G.; Vasiliu, Yevhen; Gnatyuk, SergiyIn this paper, the systematisation and classification of modern quantum technologies of information security against cyber-terrorist attack are carried out. The characteristic of the basic directions of quantum cryptography from the viewpoint of the quantum technologies used is given. A qualitative analysis of the advantages and disadvantages of concrete quantum protocols is made. The current status of the problem of practical quantum cryptography use in telecommunication networks is considered. In particular, a short review of existing commercial systems of quantum key distribution is given.Item Quantum Secure Telecommunication Systems(InTech, 2012-03-30) Korchenko, Oleksandr G.; Vorobiyenko, Petro; Lutskiy, Maksym; Vasiliu, Yevhen; Gnatyuk, SergiyThis book guides readers through the basics of rapidly emerging networks to more advanced concepts and future expectations of Telecommunications Networks. It identifies and examines the most pressing research issues in Telecommunications and it contains chapters written by leading researchers, academics and industry professionals. Telecommunications Networks - Current Status and Future Trends covers surveys of recent publications that investigate key areas of interest such as: IMS, eTOM, 3G/4G, optimization problems, modeling, simulation, quality of service, etc. This book, that is suitable for both PhD and master students, is organized into six sections: New Generation Networks, Quality of Services, Sensor Networks, Telecommunications, Traffic Engineering and Routing.Item Ukrainian critical information infrastructure terms, sectors and consequences(Науково-практичний журнал "Захист інформації", 2017) Korchenko, Oleksandr G.; Dreis, Yurii; Romanenko, OlgaThe article is devoted to the study of Ukraine the critical information infrastructure in order to increase the efficiency of use and protection of state information resources circulating in the information and telecommunication systems of critical infrastructure objects. The analysis of international experience and current domestic regulation of this field have revealed such basic problems as: the lack of basic terminology, the need to create a system for critical infrastructure protection and crisis management, the formation and development of a system of public-private partnership, the absence of sectors and elements in Ukraine critical infrastructure and of criteria attribution of objects to critical infrastructure, the lack of criteria for assessing the negative consequence of cyberattacks on the information telecommunicative system of the object of critical infrastructure, as well as the need for legislative changes. To resolve some of them, the authors introduce new concepts in this article, propose sectors of Ukraine the critical infrastructure with the definition of those relating to critical information infrastructure, unification of the negative consequence of cyberattacks on the information and telecommunication system of the critical infrastructure object in order to further evaluate the damage inflicted on the national security of Ukraine in the event of the leakage of state information resources.