Petro Snitsarenko, O. Zahorka, Andrii Koretskyi, Yurii Sarychev, V. Tkachenko
{"title":"专家方法在军事领域信息安全威胁影响评估中的应用","authors":"Petro Snitsarenko, O. Zahorka, Andrii Koretskyi, Yurii Sarychev, V. Tkachenko","doi":"10.1109/TCSET49122.2020.235386","DOIUrl":null,"url":null,"abstract":"it is known that the assessment of the impact of information security threats in the military sphere is carried out by military authorities in the context of incompleteness of the source data and uncertainty. This uncertainty is mainly due to the ambiguity of identifying sources of threats, as well as the randomness and inaccuracy of the estimates themselves. In view of this, this paper substantiates the approach to the integrated assessment of such impact through the use of expert methods","PeriodicalId":389689,"journal":{"name":"2020 IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Expert Methods Application to Assess Information Security Threats Impact in the Military Sphere\",\"authors\":\"Petro Snitsarenko, O. Zahorka, Andrii Koretskyi, Yurii Sarychev, V. Tkachenko\",\"doi\":\"10.1109/TCSET49122.2020.235386\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"it is known that the assessment of the impact of information security threats in the military sphere is carried out by military authorities in the context of incompleteness of the source data and uncertainty. This uncertainty is mainly due to the ambiguity of identifying sources of threats, as well as the randomness and inaccuracy of the estimates themselves. In view of this, this paper substantiates the approach to the integrated assessment of such impact through the use of expert methods\",\"PeriodicalId\":389689,\"journal\":{\"name\":\"2020 IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET)\",\"volume\":\"88 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/TCSET49122.2020.235386\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TCSET49122.2020.235386","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Expert Methods Application to Assess Information Security Threats Impact in the Military Sphere
it is known that the assessment of the impact of information security threats in the military sphere is carried out by military authorities in the context of incompleteness of the source data and uncertainty. This uncertainty is mainly due to the ambiguity of identifying sources of threats, as well as the randomness and inaccuracy of the estimates themselves. In view of this, this paper substantiates the approach to the integrated assessment of such impact through the use of expert methods