Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Nikolai A. Grusho"'
Autor:
Alexander A. Grusho, Nikolai A. Grusho, Michael I. Zabezhailo, Konstantin E. Samouylov, Elena E. Timonina
Publikováno v:
Discrete and Continuous Models and Applied Computational Science, Vol 32, Iss 2, Pp 213-221 (2024)
The problem of identifying deterministic cause-and-effect relationships, initially hidden in accumulated empirical data, is discussed. Statistical methods were used to identify such relationships. A simple mathematical model of cause-and-effect relat
Externí odkaz:
https://doaj.org/article/80124bac6f64430b8eb399ed48de1690
Publikováno v:
Automatic Control and Computer Sciences. 54:988-992
In the paper the language of data presentation in the task of remote localization of failures and errors in a distributed information and computing system is built. The main idea is to reflect data of sensors on the oriented graph generated by the in
Autor:
Nikolai A. Grusho
Publikováno v:
Automatic Control and Computer Sciences. 53:922-931
The analysis of multiagent systems, the features of their application, architectures, and data storage methods is presented. Tools for security analysis and information services are analyzed in terms of the possibility of automatic or automated data
Publikováno v:
Automatic Control and Computer Sciences. 52:1076-1079
This work considers the possibility of recovering valuable information when an intruder knows the results of information conversion and conversion in the framework of some information technology. The forest-type model of processable information is bu
Publikováno v:
Automatic Control and Computer Sciences. 51:799-804
This work considers the task of synthesizing information security architecture in the distributed information computation systems. The synthesis has been based on elementary structures described in the form of diagrams of solving action protection pr
Publikováno v:
Automatic Control and Computer Sciences. 50:722-725
At present, there are a large number of trends and developments in artificial intelligence systems. This paper deals with the available intelligent data analysis in information security and the possibilities provided by data mining. Examples of tasks
Publikováno v:
Journal of Mathematical Sciences. 218:154-160
Random sequences over a fixed finite alphabet are considered. It is assumed that the sequence is generated by one of m probability distributions on the space of infinite sequences. For a probability measure on the space of infinite sequences a set of
Теоремы о несуществовании состоятельных последовательностей критериев в некоторых дискретных задачах
Publikováno v:
Diskretnaya Matematika. 20:25-31
Publikováno v:
2014 First International Science and Technology Conference (Modern Networking Technologies) (MoNeTeC).
The concept of Software Defined Networks (SDN) originates new approaches in Information Security. The paper presents how to make use of SDN to guard hosts and networks. Also we consider newly opened perspectives in information security
Publikováno v:
ECMS
A ban means a sequence which has zero probability in a finite space. Generation of probability models is carried out, as a rule, from simpler models by introduction of additional restrictions. However fulfilment of required properties for stochastic