Mathematical models and methods for solving some problems on the information security
Various mathematical models, methods and approaches are used to solve scientific problems in the field of information security of territorially distributed information computer systems (TDICS). The information security modelling toolkit is represented by the following three main directions: developm...
Saved in:
| Date: | 2023 |
|---|---|
| Main Authors: | Никифоров, О. В., Путятін, В. Г., Куценко, С. А. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2023
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/300525 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Information and mathematical model of quantum communication channel state control processes
by: Zinchenko, Volodymyr L., et al.
Published: (2024)
by: Zinchenko, Volodymyr L., et al.
Published: (2024)
Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems
by: Chepkov, Ihor B., et al.
Published: (2019)
by: Chepkov, Ihor B., et al.
Published: (2019)
Neural network based method of a user identification by keyboard handwriting
by: Danyliuk, I. I., et al.
Published: (2018)
by: Danyliuk, I. I., et al.
Published: (2018)
Methods to Improve of the Information Component Survivabilityof Corporate Information-Analytical Systems
by: Lande, D. V.
Published: (2012)
by: Lande, D. V.
Published: (2012)
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019)
by: Saliieva, O. V., et al.
Published: (2019)
Problems of active protection of information from leakage through vibroacoustic channels
by: Kataiev, V. С., et al.
Published: (2016)
by: Kataiev, V. С., et al.
Published: (2016)
Modelling of choice on the optimal method for counteract of information security threats
by: Nikiforova, L. O., et al.
Published: (2014)
by: Nikiforova, L. O., et al.
Published: (2014)
Development of decision support system using OLAP-technologies for information security monitoring systems
by: Dashdamirova, K.Q.
Published: (2023)
by: Dashdamirova, K.Q.
Published: (2023)
Ontology based systemazing of the science information devoted to waste utilizing by methanogenesys
by: Shapovalov, Ye.B., et al.
Published: (2018)
by: Shapovalov, Ye.B., et al.
Published: (2018)
Optimization methods for face recognition algorithmes
by: Sitkov, I.P., et al.
Published: (2025)
by: Sitkov, I.P., et al.
Published: (2025)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
Quality of the Information Flow Management at Stochastic Energy Consumption Conditions
by: Kovtun, Svitlana, et al.
Published: (2023)
by: Kovtun, Svitlana, et al.
Published: (2023)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
Semantic approach to automated formation of information security systems documentation
by: Bova, Yu.V., et al.
Published: (2026)
by: Bova, Yu.V., et al.
Published: (2026)
Information security policy in the systems of information and analytical maintenance for support of organizational decisions
by: Churubrova, S.M.
Published: (2018)
by: Churubrova, S.M.
Published: (2018)
Formation of management scenarios by means of investigation of information space
by: Boychenko, A. V., et al.
Published: (2017)
by: Boychenko, A. V., et al.
Published: (2017)
Development of the intelligent control system of an unmanned car
by: Dakhno, N.B., et al.
Published: (2024)
by: Dakhno, N.B., et al.
Published: (2024)
Mathematical model of the distribution of radio monitoring resources for observation of satellite communication channels using neural networks
by: Trysnyuk, Vasyl, et al.
Published: (2025)
by: Trysnyuk, Vasyl, et al.
Published: (2025)
Information for contributors to SPQEO
Published: (2021)
Published: (2021)
Information for contributors to SPQEO
Published: (2020)
Published: (2020)
Information for contributors to SPQEO
Published: (2020)
Published: (2020)
Information for contributors to SPQEO
Published: (2021)
Published: (2021)
Information for contributors to SPQEO
Published: (2021)
Published: (2021)
Information for contributors to SPQEO
Published: (2021)
Published: (2021)
Improvement of the method of semiotic analysis of materials for detection of informational-psychological impact
by: Trofymchuk, Oleksandr, et al.
Published: (2025)
by: Trofymchuk, Oleksandr, et al.
Published: (2025)
Investigation of the factors of informal communication inside social networks for identification of agents carrying privacy threats
by: Nikiforova, L. A., et al.
Published: (2016)
by: Nikiforova, L. A., et al.
Published: (2016)
A generalized methodology of sign language recognition on video streams based on neural networks and transformers
by: Кузнєцова, Н. В., et al.
Published: (2023)
by: Кузнєцова, Н. В., et al.
Published: (2023)
Methods on determination of the output data for assessing residual risks with ensuring the confidentiality of information objects
by: Vasilenko, V. S., et al.
Published: (2017)
by: Vasilenko, V. S., et al.
Published: (2017)
Security challenges and semantic risks in distributed information systems with a unified information space
by: Храмова , І. О.
Published: (2026)
by: Храмова , І. О.
Published: (2026)
Ontology-based semantic similarity to metadata analysis in the information security domain
by: Gladun, A.Y., et al.
Published: (2021)
by: Gladun, A.Y., et al.
Published: (2021)
Development and research of a genetic method for medical diagnosis of diabetes mellitus
by: Федорченко, Є. М., et al.
Published: (2021)
by: Федорченко, Є. М., et al.
Published: (2021)
Networks determined by dynamics of thematic information flows
by: Lande, D. V., et al.
Published: (2020)
by: Lande, D. V., et al.
Published: (2020)
Approaches to optimizing thes of reading steganographic information in vector images
by: Казміді, І. Д., et al.
Published: (2026)
by: Казміді, І. Д., et al.
Published: (2026)
Displaying of the current working mode of the power system using proposed method of telemeasurement of the ?1,2 corner between vectors of the junction voltages
by: Lenchevsky Ye.A., et al.
Published: (2003)
by: Lenchevsky Ye.A., et al.
Published: (2003)
Mathematical methods of planning in systems consisted of rational agents
by: Sinitsyn, I.P., et al.
Published: (2024)
by: Sinitsyn, I.P., et al.
Published: (2024)
Method for political propaganda detection in internet content using neural network natural language processing tools
by: Krak, Iu.V., et al.
Published: (2024)
by: Krak, Iu.V., et al.
Published: (2024)
Resilience and stability in security
by: Мохор, В. В., et al.
Published: (2024)
by: Мохор, В. В., et al.
Published: (2024)
Computer-economical optimization method for solving inverse problems of determining electrophysical properties of objects in eddy current structroscopy
by: Halchenko, V. Ya., et al.
Published: (2025)
by: Halchenko, V. Ya., et al.
Published: (2025)
Flow based bonet traffic detection using AI
by: Panchuk, B.O.
Published: (2023)
by: Panchuk, B.O.
Published: (2023)
Protection of information objects from intentional collisions of inspection characteristics in error-correcting codes
by: Mаtоv, O. Y., et al.
Published: (2016)
by: Mаtоv, O. Y., et al.
Published: (2016)
Similar Items
-
Information and mathematical model of quantum communication channel state control processes
by: Zinchenko, Volodymyr L., et al.
Published: (2024) -
Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems
by: Chepkov, Ihor B., et al.
Published: (2019) -
Neural network based method of a user identification by keyboard handwriting
by: Danyliuk, I. I., et al.
Published: (2018) -
Methods to Improve of the Information Component Survivabilityof Corporate Information-Analytical Systems
by: Lande, D. V.
Published: (2012) -
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019)