Search by keyword: "information security"
On one Saddle Point Search Algorithm for Continuous Linear Games as Applied to Information Security Problems
| Authors: Bykov A.Yu., Krygin I.A., Grishunin M.V., Markova I.А. | Published: 20.12.2020 |
| Published in issue: #4(133)/2020 | |
| DOI: 10.18698/0236-3933-2020-4-58-74 | |
| Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
| Keywords: information security, game theory, zero-sum game, continuous game, saddle point, linear programming | |
Saddle Point Search Algorithm for the Problem of Site Protection Level Assignment Based on Search of Simplices
| Authors: Bykov A.Yu., Grishunin M.V., Krygin I.A. | Published: 17.04.2019 |
| Published in issue: #2(125)/2019 | |
| DOI: 10.18698/0236-3933-2019-2-22-39 | |
| Category: Informatics, Computer Engineering and Control | Chapter: System Analysis, Control, and Information Processing | |
| Keywords: information security, game theory, zero-sum game, linear programming, saddle point, linear equations system | |
Algorithms of the Protection System between Assets of a Mobile Device on the Basis of Zero-Sum Game and Equal Security Principle
| Authors: Bykov A.Yu., Krygin I.A., Mullin A.R. | Published: 16.04.2018 |
| Published in issue: #2(119)/2018 | |
| DOI: 10.18698/0236-3933-2018-2-48-68 | |
| Category: Informatics, Computer Engineering and Control | Chapter: System Analysis, Control, and Information Processing | |
| Keywords: information security, zero-sum game, linear programming, equal security | |
Algorithms of the Protection System between Assets of a Mobile Device on the Basis of Zero-Sum Game and Equal Security Principle
| Authors: Bykov A.Yu., Krygin I.A., Mullin A.R. | Published: 16.04.2018 |
| Published in issue: #2(119)/2018 | |
| DOI: 10.18698/0236-3933-2018-2-48-68 | |
| Category: Informatics, Computer Engineering and Control | Chapter: System Analysis, Control, and Information Processing | |
| Keywords: information security, zero-sum game, linear programming, equal security | |
Secure Access to Information using Smart Card
| Authors: Buldakova T.I., Lantsberg A.V., Smolyaninova K.A. | Published: 28.05.2017 |
| Published in issue: #3(114)/2017 | |
| DOI: 10.18698/0236-3933-2017-3-95-106 | |
| Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
| Keywords: medical information system, electronic medical records, information security, smart card | |
The main directions of expanding the insider information security model
| Authors: Sychev V.M. | Published: 08.04.2016 |
| Published in issue: #2(107)/2016 | |
| DOI: 10.18698/0236-3933-2016-2-125-137 | |
| Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
| Keywords: information security, insider, intruder model, temporality, classification, data mining | |
Heuristic analysis of source code security
| Authors: Markov A.S. , Matveev V.A. , Fadin A.A., Tsirlov V.L. | Published: 19.02.2016 |
| Published in issue: #1(106)/2016 | |
| DOI: 10.18698/0236-3933-2016-1-98-111 | |
| Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
| Keywords: information security, software security, testing, static analysis, production models, heuristic analysis, vulnerabilities, defects, undeclared capabilities | |
Thе prime formation model based on the symmetric representation of ring factorization in selecting composite numbers
| Authors: Minaev V.A., Vayts E.V., Nikerov D.V., Nikonov S.A. | Published: 19.02.2016 |
| Published in issue: #1(106)/2016 | |
| DOI: 10.18698/0236-3933-2016-1-89-97 | |
| Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
| Keywords: information security, primes, ring factorization | |
Analysis of Information Security Threats for Virtual Private Networks VPLS Based on Network MPLS
| Authors: Bel’fer R.A., Petrukhin I.S., Tepikin A.P. | Published: 08.02.2015 |
| Published in issue: #1(100)/2015 | |
| DOI: 10.18698/0236-3933-2015-1-47-57 | |
| Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
| Keywords: virtual private network (VPN), information security, virtual private local area network (VlAN) service (VPLS), multiple protocol label switching (MPLS), customer edge router (CE), provider edge router (PE), pseudowire (PW), provider router | |
Dependence Analysis of Theat Risk Level of Fraud Security Within NGN Using Experimantal Data During Calculation by Analytic Hierarchy Process and Set Pairs Analysis
| Authors: Matveev V.A. , Bel’fer R.A., Kalyuzhnyy D.A., Morozov A.M. | Published: 10.12.2014 |
| Published in issue: #6(99)/2014 | |
| DOI: | |
| Category: Informatics & Computing Technology | |
| Keywords: information security, softswitch, Analytic Hierarchy Process (AHP), Set Pairs Analysis (SPA), fraud, Session Initiation Protocol (SIP), New Generation Networks (NGN), threat, voice over IP (VoIP) | |
