Search by keyword: "information security"
On one Saddle Point Search Algorithm for Continuous Linear Games as Applied to Information Security Problems
Authors: Bykov A.Yu., Krygin I.A., Grishunin M.V., Markova I.А. | Published: 20.12.2020 |
Published in issue: #4(133)/2020 | |
DOI: 10.18698/0236-3933-2020-4-58-74 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: information security, game theory, zero-sum game, continuous game, saddle point, linear programming |
Saddle Point Search Algorithm for the Problem of Site Protection Level Assignment Based on Search of Simplices
Authors: Bykov A.Yu., Grishunin M.V., Krygin I.A. | Published: 17.04.2019 |
Published in issue: #2(125)/2019 | |
DOI: 10.18698/0236-3933-2019-2-22-39 | |
Category: Informatics, Computer Engineering and Control | Chapter: System Analysis, Control, and Information Processing | |
Keywords: information security, game theory, zero-sum game, linear programming, saddle point, linear equations system |
Algorithms of the Protection System between Assets of a Mobile Device on the Basis of Zero-Sum Game and Equal Security Principle
Authors: Bykov A.Yu., Krygin I.A., Mullin A.R. | Published: 16.04.2018 |
Published in issue: #2(119)/2018 | |
DOI: 10.18698/0236-3933-2018-2-48-68 | |
Category: Informatics, Computer Engineering and Control | Chapter: System Analysis, Control, and Information Processing | |
Keywords: information security, zero-sum game, linear programming, equal security |
Algorithms of the Protection System between Assets of a Mobile Device on the Basis of Zero-Sum Game and Equal Security Principle
Authors: Bykov A.Yu., Krygin I.A., Mullin A.R. | Published: 16.04.2018 |
Published in issue: #2(119)/2018 | |
DOI: 10.18698/0236-3933-2018-2-48-68 | |
Category: Informatics, Computer Engineering and Control | Chapter: System Analysis, Control, and Information Processing | |
Keywords: information security, zero-sum game, linear programming, equal security |
Secure Access to Information using Smart Card
Authors: Buldakova T.I., Lantsberg A.V., Smolyaninova K.A. | Published: 28.05.2017 |
Published in issue: #3(114)/2017 | |
DOI: 10.18698/0236-3933-2017-3-95-106 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: medical information system, electronic medical records, information security, smart card |
The main directions of expanding the insider information security model
Authors: Sychev V.M. | Published: 08.04.2016 |
Published in issue: #2(107)/2016 | |
DOI: 10.18698/0236-3933-2016-2-125-137 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: information security, insider, intruder model, temporality, classification, data mining |
Heuristic analysis of source code security
Authors: Markov A.S. , Matveev V.A. , Fadin A.A., Tsirlov V.L. | Published: 19.02.2016 |
Published in issue: #1(106)/2016 | |
DOI: 10.18698/0236-3933-2016-1-98-111 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: information security, software security, testing, static analysis, production models, heuristic analysis, vulnerabilities, defects, undeclared capabilities |
Thе prime formation model based on the symmetric representation of ring factorization in selecting composite numbers
Authors: Minaev V.A., Vayts E.V., Nikerov D.V., Nikonov S.A. | Published: 19.02.2016 |
Published in issue: #1(106)/2016 | |
DOI: 10.18698/0236-3933-2016-1-89-97 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: information security, primes, ring factorization |
Analysis of Information Security Threats for Virtual Private Networks VPLS Based on Network MPLS
Authors: Bel’fer R.A., Petrukhin I.S., Tepikin A.P. | Published: 08.02.2015 |
Published in issue: #1(100)/2015 | |
DOI: 10.18698/0236-3933-2015-1-47-57 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: virtual private network (VPN), information security, virtual private local area network (VlAN) service (VPLS), multiple protocol label switching (MPLS), customer edge router (CE), provider edge router (PE), pseudowire (PW), provider router |
Dependence Analysis of Theat Risk Level of Fraud Security Within NGN Using Experimantal Data During Calculation by Analytic Hierarchy Process and Set Pairs Analysis
Authors: Matveev V.A. , Bel’fer R.A., Kalyuzhnyy D.A., Morozov A.M. | Published: 10.12.2014 |
Published in issue: #6(99)/2014 | |
DOI: | |
Category: Informatics & Computing Technology | |
Keywords: information security, softswitch, Analytic Hierarchy Process (AHP), Set Pairs Analysis (SPA), fraud, Session Initiation Protocol (SIP), New Generation Networks (NGN), threat, voice over IP (VoIP) |