2025-02-23T19:39:05-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: Query fl=%2A&wt=json&json.nl=arrarr&q=id%3A%22journaliasakpiua-article-60555%22&qt=morelikethis&rows=5
2025-02-23T19:39:05-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: => GET http://localhost:8983/solr/biblio/select?fl=%2A&wt=json&json.nl=arrarr&q=id%3A%22journaliasakpiua-article-60555%22&qt=morelikethis&rows=5
2025-02-23T19:39:05-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: <= 200 OK
2025-02-23T19:39:05-05:00 DEBUG: Deserialized SOLR response
Оптимизація розподілу ресурсів при проведенні розвідки в інформаційному протистоянні
Competition in the information field is characterized by the fact that each side wants to protect their information and to obtain information about an opponent. Intelligence is very important measure under conditions of uncertainty, when the opponent action is unknown and cannot be predicted accurat...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | Ukrainian |
Published: |
The National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute"
2012
|
Online Access: | http://journal.iasa.kpi.ua/article/view/60555 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Competition in the information field is characterized by the fact that each side wants to protect their information and to obtain information about an opponent. Intelligence is very important measure under conditions of uncertainty, when the opponent action is unknown and cannot be predicted accurately. It can provide information about the importance of information and its distribution between objects, vulnerability and the security of these objects. Method of determining the intelligence expediency depending on objects vulnerability and resources was developed on the basis of mathematical model. Principles of resource allocation that maximizes intelligence effectiveness were established. Examples of calculations in a system with two objects with different vulnerabilities were given. Intervals of resources volume in which intelligence is expedient in the case of various forms of vulnerability functions were calculated. The recommendations on the optimal resources allocation between intelligence and information obtaining depending on the objects vulnerability and total resources were provided. |
---|