Zobrazeno 1 - 4
of 4
pro vyhledávání: '"Anatolii Salii"'
Autor:
Oleksandr Avramenko, Oleksandr Matsko, Vasyl Polishchuk, Mykola Pidhorodetskyi, Anatolii Salii, Oleksandr Salii, Olena Korshets, Roman Duzhyi
Publikováno v:
Strength of Materials and Theory of Structures. :265-280
The method for determining the optimal frequency of maintenance of individual samples of aerodrome construction equipment, which is operated outside the established resource, is presented. The developed methodology takes into account the frequency an
Autor:
Oleksandr Milov, Andrii Hrebeniuk, Andrii Nalyvaiko, Elena Nyemkova, Ivan Opirskyy, Igor Pasko, Khazail Rzayev, Anatolii Salii, Uliia Synytsina, Olha Soloviova
Publikováno v:
Eastern-European Journal of Enterprise Technologies, Vol 6, Iss 2 (108), Pp 30-52 (2020)
The rapid development of computer technology, the emergence of modern cyber threats with signs of hybridity and synergy put forward strict requirements for the economic component of national security and especially the processes of ensuring the econo
Autor:
Oleksandr Milov, Serhii Yevseiev, Volodymyr Aleksiyev, Polina Berdnik, Oleksandr Voitko, Valentyn Dyptan, Yevheniia Ivanchenko, Maxim Pavlenko, Anatolii Salii, Serhiy Yarovyy
Publikováno v:
Eastern-European Journal of Enterprise Technologies, Vol 5, Iss 9 (101), Pp 46-57 (2019)
The results of modeling and analysis of scenarios of the behavior of interacting agents in conditions of cyber conflict are presented. General approaches to the development of a scenario of the behavior of antagonistic agents are presented. The defin
Autor:
Oleksandr Milov, Serhii Yevseiev, Yevheniia Ivanchenko, Stanislav Milevskyi, Oleksandr Nesterov, Oleksandr Puchkov, Anatolii Salii, Oleksandr Timochko, Vitalii Tiurin, Аleksandr Yarovyi
Publikováno v:
Eastern-European Journal of Enterprise Technologies, Vol 4, Iss 9 (100), Pp 6-19 (2019)
The results of the development of the model of the antagonistic agents behavior in a cyber conflict are presented. It is shown that the resulting model can be used to analyze investment processes in security systems, taking into account the assumptio