2024
Постійне посилання на фонд
Переглянути
Перегляд 2024 за Автор "Ilin, Mykola"
Зараз показуємо 1 - 2 з 2
Результатів на сторінці
Налаштування сортування
Документ Відкритий доступ Probabilities estimating for attacks on supply chain for critical infrastructure facilities(Igor Sikorsky Kyiv Polytechnic Institute, 2024) Ilin, Mykola; Rybak, Oleksandr; Stopochkina, IrynaThe different types of supply chain for critical infrastructure facilities of industrial sector were analyzed. Also, the main types of attacks in supply chain were considered. The character of resource dependencies was analysed and representation of supply chain in form of hierarchical oriented graph, with division into levels, was considered. The algorithm of taking into account of attack probabilities for objects, which giveresources for functioning of some endpoint object of supply chain was developed basing on dynamic programming principles. Calculation complexity of proposed algorithm was estimated, and it confirmed its effectiveness for practical situations. For thetarget area of use the proposed approach gives better calculation complexity in compare existing solutions.Документ Відкритий доступ Simulation of UAV networks on the battlefield, taking into account cyber- physical influences that affect availability(Igor Sikorsky Kyiv Polytechnic Institute, 2024) Novikov, Oleksii; Stopochkina, Iryna; Voitsekhovskyi, Andrii; Ilin, Mykola; Ovcharuk, MykolaThe paper considers the types of countering means for unmanned aerial vehicles and the enemy's electronic warfare equipment used during the war in Ukraine. The types of cyber-physical influences that can be used to disrupt the availability of the network of unmanned aerial vehicles are addressed. The problem is also considered from the point of view of cybersecurity, taking into account possible harmful effects on the network of smart devices. Models based on complex networks, cellular automata and Petri nets are proposed, which allow solving the problem of optimizing the location of devices taking into account the set goal and countering cyber-physical attacks on availability and integrity. The proposed models differ from existing ones taking into account the conditions on the battlefield. A computational experiment has been performed that allows us to visualize the disposition of aircraft depending on the surrounding conditions on the battlefield. The results of the work can be used to develop a strategy for implementing operations of various types on the battlefield using UAVs.