|
|
Publications in Math-Net.Ru
-
Classification of small sets of data of large dimension
Inform. Primen., 19:3 (2025), 67–72
-
Machine learning and trust in classification results
Inform. Primen., 19:2 (2025), 63–68
-
Complexity of the algorithm for finding coincidences in several sequences
Sistemy i Sredstva Inform., 35:4 (2025), 154–163
-
Analysis of failures by indirect features
Sistemy i Sredstva Inform., 35:1 (2025), 59–70
-
Identification of cause-and-effect relationships when covering causes
Inform. Primen., 18:2 (2024), 54–59
-
Logic of deception in machine learning
Inform. Primen., 18:1 (2024), 78–83
-
To the problem of identifying failures in the information technology infrastructure by monitoring and analyzing indirect data
Sistemy i Sredstva Inform., 34:3 (2024), 14–22
-
Functional safety monitoring of large service systems
Sistemy i Sredstva Inform., 34:3 (2024), 3–13
-
Classification by cause-and-effect relationships
Inform. Primen., 17:3 (2023), 71–75
-
Complex cause-and-effect relationships
Inform. Primen., 17:2 (2023), 84–89
-
Causal relationships in classification problems
Inform. Primen., 17:1 (2023), 43–49
-
Automata models of fault propagation and self-healing
Sistemy i Sredstva Inform., 33:4 (2023), 28–37
-
Some challenges of critical infrastructure information security monitoring
Sistemy i Sredstva Inform., 33:3 (2023), 108–116
-
Cause-and-effect relationships in analysis of unobservable process properties
Sistemy i Sredstva Inform., 33:2 (2023), 71–78
-
Classification problem in conditions of distorted cause-and-effect relationships
Sistemy i Sredstva Inform., 33:1 (2023), 59–67
-
About the secure architecture of a microservice-based computing system
Inform. Primen., 16:4 (2022), 87–92
-
Metadata in secure electronic document management
Inform. Primen., 16:3 (2022), 97–102
-
Cause-and-effect chain analysis
Inform. Primen., 16:2 (2022), 68–74
-
Detection of distribution drift
Sistemy i Sredstva Inform., 32:4 (2022), 14–20
-
Some approaches to network DLP analysis
Sistemy i Sredstva Inform., 32:2 (2022), 72–80
-
Search of anomalies in big data
Sistemy i Sredstva Inform., 32:1 (2022), 160–167
-
Statistics and clusters for detection of anomalous insertions in Big Data environment
Inform. Primen., 15:4 (2021), 79–86
-
Remote monitoring of workflows
Inform. Primen., 15:3 (2021), 2–8
-
Intelligent analysis of Big Data extendible collections under the limits of process-real time
Inform. Primen., 15:2 (2021), 36–43
-
Enhanced tokenization algorithm for personal data protection
Sistemy i Sredstva Inform., 31:4 (2021), 135–143
-
Secure scaling of electronic ledgers based on tangles
Sistemy i Sredstva Inform., 31:3 (2021), 60–69
-
Hidden impact without malicious code
Sistemy i Sredstva Inform., 31:2 (2021), 4–15
-
Support for solving diagnostic type problems
Sistemy i Sredstva Inform., 31:1 (2021), 69–81
-
On probabilistic estimates of the validity of empirical conclusions
Inform. Primen., 14:4 (2020), 3–8
-
Identifying anomalies using metadata
Inform. Primen., 14:3 (2020), 76–80
-
Mathematical statistics in the task of identifying hostile insiders
Inform. Primen., 14:3 (2020), 71–75
-
Methods of finding the causes of information technology failures by means of metadata
Inform. Primen., 14:2 (2020), 33–39
-
On causal representativeness of training samples of precedents in diagnostic type tasks
Inform. Primen., 14:1 (2020), 80–86
-
End-to-end information security of private cloud computing
Sistemy i Sredstva Inform., 30:4 (2020), 76–82
-
Constructing process models represented by simple Petri nets
Sistemy i Sredstva Inform., 30:4 (2020), 61–75
-
Prevention of mass failure of low-security mobile systems of information support for digital economy
Sistemy i Sredstva Inform., 30:2 (2020), 21–30
-
Description of digital economy dynamics using an electronic ledger
Sistemy i Sredstva Inform., 30:1 (2020), 108–114
-
Generation of threats in heterogeneous systems of digital economy
Sistemy i Sredstva Inform., 30:1 (2020), 46–55
-
Using metadata to implement multilevel security policy requirements
Inform. Primen., 13:4 (2019), 85–89
-
Concepts forming on the basis of small samples
Inform. Primen., 13:4 (2019), 81–84
-
Methods of identification of “weak” signs of violations of information security
Inform. Primen., 13:3 (2019), 3–8
-
Architectural decisions in the problem of identification of fraud in the analysis of information flows in digital economy
Inform. Primen., 13:2 (2019), 22–28
-
Search of empirical causes of failures and errors in computer systems and networks using metadata
Sistemy i Sredstva Inform., 29:4 (2019), 28–38
-
The electronic ledger on the basis of situational centers for digital economy
Sistemy i Sredstva Inform., 29:2 (2019), 4–11
-
Methods of protection against mass inactivation of low protected computers of digital economy
Sistemy i Sredstva Inform., 29:1 (2019), 4–11
-
Methods of identification of host capture in a distributed information system which is protected on the basis of meta data
Inform. Primen., 12:4 (2018), 39–43
-
Parametrization in applied problems of search of empirical reasons
Inform. Primen., 12:3 (2018), 62–66
-
Hierarchical method of meta data generation for control of network connections
Inform. Primen., 12:2 (2018), 44–49
-
On some possibilities of resource management for organizing active counteraction to computer attacks
Inform. Primen., 12:1 (2018), 62–70
-
Overcoming of protection of a network where connections are controlled by meta data
Sistemy i Sredstva Inform., 28:4 (2018), 22–30
-
Information security on the basis of meta data in enterprise application integration architecture of information systems
Sistemy i Sredstva Inform., 28:2 (2018), 34–41
-
About the analysis of erratic statuses in the distributed computing systems
Sistemy i Sredstva Inform., 28:1 (2018), 99–109
-
The model of the set of information spaces in the problem of insider detection
Inform. Primen., 11:4 (2017), 65–69
-
Consistency analysis of software-defined networks reconfiguration
Sistemy i Sredstva Inform., 27:3 (2017), 12–22
-
About complex authentication
Sistemy i Sredstva Inform., 27:3 (2017), 4–11
-
Erroneous states classification in dictributed computing systems and sources of their occurence
Sistemy i Sredstva Inform., 27:2 (2017), 29–40
-
On the advanced procedure to reduce calculation of Galois closures
Inform. Primen., 10:4 (2016), 96–104
-
Integration of statistical and deterministic methods for analysis of information security
Inform. Primen., 10:3 (2016), 2–8
-
Security evaluation in secure architecture of distributed information systems
Sistemy i Sredstva Inform., 26:4 (2016), 31–37
-
Secure automatic reconfiguration of cloudy computing
Sistemy i Sredstva Inform., 26:3 (2016), 83–92
-
Architectural vulnerabilities of distributed information systems
Sistemy i Sredstva Inform., 26:3 (2016), 74–82
-
Protection of business logic against zero day attacks
Sistemy i Sredstva Inform., 26:3 (2016), 60–73
-
Information flow monitoring and control in the cloud computing environment
Inform. Primen., 9:4 (2015), 91–97
-
Rate of information transfer and capacity in covert channels defined by tags
Inform. Primen., 9:4 (2015), 85–90
-
Architecture of the stand for the pilot study of models, algorithms, and solutions of information security in cloud computing environments
Sistemy i Sredstva Inform., 25:4 (2015), 65–77
-
Problems of interaction of the malicious code and protection programs in architecture of modern operating systems
Sistemy i Sredstva Inform., 25:3 (2015), 94–108
-
Possibilities of secure architecture creation for dynamically changing information systems
Sistemy i Sredstva Inform., 25:3 (2015), 78–93
-
Switching on of new bans in random sequences
Inform. Primen., 8:4 (2014), 46–52
-
The analysis of tags in covert channels
Inform. Primen., 8:4 (2014), 41–45
-
Secure architecture of distributed systems
Sistemy i Sredstva Inform., 24:3 (2014), 18–31
-
Statistical techniques of bans determination of probability measures in discrete spaces
Inform. Primen., 7:1 (2013), 54–57
-
Covert channels generated by tags in datagrams
Sistemy i Sredstva Inform., 23:2 (2013), 6–21
-
Random graphs model for description of interactions in the network
Inform. Primen., 6:4 (2012), 57–60
-
Prohibitions in discrete probabilistic statistical problems
Diskr. Mat., 23:2 (2011), 53–58
-
Search of the conflicts in security policies: a model of random graphs
Inform. Primen., 4:3 (2010), 38–41
-
Theorems on the nonexistence of consistent sequences of criteria in some discrete problems
Diskr. Mat., 20:2 (2008), 25–31
-
Existence of consistent test sequences at the complex null hypotheses in discrete statistical problems
Inform. Primen., 2:2 (2008), 64–66
-
Complexity and consistency of statistical criteria
Sistemy i Sredstva Inform., 2008, no. special issue, 32–39
-
About security and safety of security subsystems in distributed information systems
Sistemy i Sredstva Inform., 2007, no. 17, 79–85
-
Some relations between discrete statistical problems and properties of probability measures on topological spaces
Diskr. Mat., 18:4 (2006), 128–136
-
Estimation of the time required to organize a secret channel
Diskr. Mat., 15:2 (2003), 40–46
-
A noninterference model and hidden channels
Diskr. Mat., 14:1 (2002), 11–16
-
On the existence of hidden channels
Diskr. Mat., 11:1 (1999), 24–28
-
Hidden channels and information security in computer systems
Diskr. Mat., 10:1 (1998), 3–9
-
On Distributions of $U$-Statistics
Teor. Veroyatnost. i Primenen., 32:2 (1987), 400–404
-
On the convergence of counting processes connected with $U$-statistics
Teor. Veroyatnost. i Primenen., 30:3 (1985), 589–593
-
Certain statistic problems on graphs
Mat. Zametki, 36:2 (1984), 269–277
-
The limiting distribution of the number of cyclic points in a random mapping of bounded height
Teor. Veroyatnost. i Primenen., 20:3 (1975), 547–556
-
Limit distributions of certain characteristics of random automaton graphs
Mat. Zametki, 14:1 (1973), 133–141
-
Random mappings with bounded multiplicity
Teor. Veroyatnost. i Primenen., 17:3 (1972), 440–449
-
Oleg Slavin – to the 60th birthday anniversary
Vestn. Yuzhno-Ural. Gos. Un-ta. Ser. Matem. Mekh. Fiz., 15:4 (2023), 93–94
-
Soloviev Sergey Yurievich (02/03/1955 - 09/22/2023). In memory of an outstanding algorithmist
Vestnik YuUrGU. Ser. Mat. Model. Progr., 16:4 (2023), 106–107
-
Sergey Leonidovich Chernyshev (to Anniversary Since Birth)
Vestnik YuUrGU. Ser. Mat. Model. Progr., 15:2 (2022), 125–127
-
Рудаков Константин Владимирович (21.06.1954 – 10.07.2021). Памяти академика информатики
Vestnik YuUrGU. Ser. Mat. Model. Progr., 15:1 (2022), 128–130
-
Vladimir Evgenievich Pavlovsky (22.05.1950–03.06.2020)
Vestnik YuUrGU. Ser. Mat. Model. Progr., 13:3 (2020), 116–118
-
Валентин Федорович Колчин (1934–2016)
Diskr. Mat., 28:4 (2016), 3–5
-
Preface
Sistemy i Sredstva Inform., 23:1 (2013), 3–6
-
Yurii Vasil'evich Prokhorov (on the occasion of his eightieth birthday)
Diskr. Mat., 22:1 (2010), 3–4
© , 2026