scholarly journals THE CONCEPT OF CYBER SECURITY AND SIMULATION OF PROCESSES OF OPTIMAL CONTROL OF THE STATE CYBER PROTECTION SYSTEM

2020 ◽  
Vol 10 (3-4) ◽  
pp. 230-242
Author(s):  
V.O. Khoroshko ◽  
◽  
Y.E. Khokhlachova ◽  
I.V. Kibalchich ◽  
◽  
...  
2021 ◽  
Vol 16 (1) ◽  
pp. 47-60
Author(s):  
Michaela Šimonová ◽  

The arrival of information and communication technologies is nothing new. The number of people using these technologies and moving in cyberspace is growing, and therefore it is an important role of the state to respond sufficiently to such developments. A fundamental role of the state is to create a stable security system consisting of complex legislation as well as creation of a legislative environment capable of responding flexibly to the growing number of diverse incidents in cyberspace. Sufficient legal regulation consisting of unambiguous determination of competencies and tasks of individual subjects represents the basic pillar for the creation of a stable security system. The role of the state is also to maintain existing and create new partnerships with organizations that are able to provide relevant information and knowledge in the field of cyber security.


2018 ◽  
Vol 52 (5) ◽  
pp. 1617-1650 ◽  
Author(s):  
Alejandro Allendes ◽  
Enrique Otárola ◽  
Richard Rankin ◽  
Abner J. Salgado

We propose and analyze a reliable and efficienta posteriorierror estimator for a control-constrained linear-quadratic optimal control problem involving Dirac measures; the control variable corresponds to the amplitude of forces modeled as point sources. The proposeda posteriorierror estimator is defined as the sum of two contributions, which are associated with the state and adjoint equations. The estimator associated with the state equation is based on Muckenhoupt weighted Sobolev spaces, while the one associated with the adjoint is in the maximum norm and allows for unbounded right hand sides. The analysis is valid for two and three-dimensional domains. On the basis of the deviseda posteriorierror estimator, we design a simple adaptive strategy that yields optimal rates of convergence for the numerical examples that we perform.


2004 ◽  
Vol 14 (03) ◽  
pp. 355-374 ◽  
Author(s):  
L. J. ALVAREZ-VAZQUEZ ◽  
M. MARTA ◽  
A. MARTINEZ

In this paper, we study an optimal control problem with pointwise constraints on state and control, related to sterilization processes involving heat transfer by natural convection. We introduce the mathematical model for the state system, which couples the Boussinesq system for temperature-dependent viscosity and the convection-reaction-diffusion equations, and we set the whole problem as a control problem, assuring the micro-organism reduction, the nutrient retention and the energy saving. The existence and the regularity of the state are studied. Finally, we obtain existence results for the optimal solutions and a first-order optimality condition for their characterization.


2016 ◽  
Vol 8 (6) ◽  
pp. 1050-1071 ◽  
Author(s):  
Tianliang Hou ◽  
Li Li

AbstractIn this paper, we investigate the error estimates of mixed finite element methods for optimal control problems governed by general elliptic equations. The state and co-state are approximated by the lowest order Raviart-Thomas mixed finite element spaces and the control variable is approximated by piecewise constant functions. We derive L2 and H–1-error estimates both for the control variable and the state variables. Finally, a numerical example is given to demonstrate the theoretical results.


2020 ◽  
Vol 10 (1-2) ◽  
pp. 84-89
Author(s):  
Khoroshko V.O. ◽  
◽  
Khokhlachova Yu.Ye. ◽  
Ayasrah A. ◽  
Al-Dalwash A. ◽  
...  

Author(s):  
Tamar Makasarashvili ◽  
Tea Khorguashvili ◽  
Giuli Giguashvili ◽  
Aleksandre Sadagashvili

With the development of Internet technologies, cybercrime has also evolved and diversified. Much of the world's economic and business information comes from electronic information, and the need for remote work caused by the coronavirus (COVID-19) pandemic has further increased demand for e-services, which in turn has contributed to increased technology risks, threats, and incidents. The main task of the states is to actively fight against the negative socio-economic, financial, and political consequences caused by the growth of cybercrime. The main purpose of the study is to assess the negative consequences of cybercrime in Georgia, the main threats to information security, to develop recommendations for the prevention of cybercrime, to improve its legal regulation mechanisms. The fight against cybercrime in Georgia is carried out using criminal norms. The law "On Information Security" is in force in the country, Georgia's cyber security strategy has been developed, but this process needs constant development. The main task of the state is to gradually improve the legislation and bring it in line with modern technologies, to ensure close cooperation between the state and society, to raise the awareness of civil society. It is essential to constantly inform the public and companies about cyber threats, as effective prevention is the best form of crime prevention policy.


2016 ◽  
Vol 4 (1) ◽  
pp. 61 ◽  
Author(s):  
Muhamad Rizal ◽  
Yanyan Yani

The purpose of state defense is to protect and to save the integrity of the Unitary State of the Republic of Indonesia, the sovereignty of the state, as well as its security from all kinds of threats, whether they are military or non-military ones. One of the non-military threats that potentially threatens the sovereignty and security of the nation-state is the misuse of technology and information in cyberspace. The threat of irresponsible cyber attacks can be initiated by both state and non-state actors. The actors may be an individual, a group of people, a faction, an organization, or even a country. Therefore, the government needs to anticipate cyber threats by formulating cyber security strategies and determining comprehensive steps to defend against cyber attacks; its types and the scale of counter-measures, as well as devising the rules of law. 


1988 ◽  
Vol 2 (3) ◽  
pp. 321-328 ◽  
Author(s):  
Laurence A. Baxter ◽  
Eui Yong Lee

The state of a system is modelled by Brownian motion with negative drift and an absorbing barrier at the origin. A repairman arrives according to a Poisson process of rate λ. If the state of the system at arrival of the repairman does not exceed a certain threshold, he/she increases it by a random amount, otherwise no action is taken. Costs are assigned to each visit of the repairman, to each repair, and to the system being in state 0. It is shown that there exists a unique arrival rate λ which minimizes the average cost per unit time over an infinite horizon.


Sign in / Sign up

Export Citation Format

Share Document