All articles by "Bykov A.Yu."
Algorithms for Solving a Discrete-Continuous Game Based on Combination of the Approximate and Exact Methods in the Context of Information Protection Tasks
Authors: Bykov A.Yu., Sysoev V.V. | Published: 19.06.2024 |
Published in issue: #2(147)/2024 | |
DOI: | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: information protection tools, zero-sum game, saddle point, discrete programming, linear programming, dual problem |
On one Saddle Point Search Algorithm for Continuous Linear Games as Applied to Information Security Problems
Authors: Bykov A.Yu., Krygin I.A., Grishunin M.V., Markova I.А. | Published: 20.12.2020 |
Published in issue: #4(133)/2020 | |
DOI: 10.18698/0236-3933-2020-4-58-74 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: information security, game theory, zero-sum game, continuous game, saddle point, linear programming |
Algorithms of the Protection System between Assets of a Mobile Device on the Basis of Zero-Sum Game and Equal Security Principle
Authors: Bykov A.Yu., Krygin I.A., Mullin A.R. | Published: 16.04.2018 |
Published in issue: #2(119)/2018 | |
DOI: 10.18698/0236-3933-2018-2-48-68 | |
Category: Informatics, Computer Engineering and Control | Chapter: System Analysis, Control, and Information Processing | |
Keywords: information security, zero-sum game, linear programming, equal security |
Planning of Executing Package of Jobs in Distributed-Processing System with Protected Data
Authors: Bykov A.Yu. | Published: 04.09.2014 |
Published in issue: #2(43)/2001 | |
DOI: | |
Category: Informatics & Computing Technology | |
Keywords: |
Imitation Modeling of Queuing Systems Using Inter-platform Library of C++ Functions
Authors: Medvedev N.V., Bykov A.Yu., Grishin G.A. | Published: 03.05.2014 |
Published in issue: #4(61)/2005 | |
DOI: | |
Category: Informatics & Computing Technology | |
Keywords: |
Counteraction for Unauthorized Access to Server of Web-applications Using Mechanism of Spurious SQL-queries
Authors: Medvedev N.V., Bykov A.Yu., Grishin G.A. | Published: 21.03.2014 |
Published in issue: #3(64)/2006 | |
DOI: | |
Category: Informatics & Computing Technology | |
Keywords: |
Mathematical Model of Optimal Selection of Aids of Protection Against Threats for Safety of Enterprise Computer Network
Authors: Ovchinnikov A.I., Zhuravlev A.M., Medvedev N.V., Bykov A.Yu. | Published: 18.03.2014 |
Published in issue: #3(68)/2007 | |
DOI: | |
Category: Informatics & Computing Technology | |
Keywords: |
Using Cross-Platform Library of C++ Functions for Implementation of Imitation Models of Standard Queueing Systems
Authors: Zhuravlev A.M., Medvedev N.V., Bykov A.Yu. | Published: 16.03.2014 |
Published in issue: #4(73)/2008 | |
DOI: | |
Category: Informatics & Computing Technology | |
Keywords: |
Application of Recession Vector Method to Solving Problem on Search of Variants of Protection against Security Threats of Enterprise Computer Network
Authors: Ovchinnikov A.I., Medvedev N.V., Bykov A.Yu. | Published: 15.03.2014 |
Published in issue: #2(71)/2008 | |
DOI: | |
Category: Informatics & Computing Technology | |
Keywords: |