RUS  ENG
Full version
PEOPLE

Grusho Aleksandr Aleksandrovich

Publications in Math-Net.Ru

  1. Classification of small sets of data of large dimension

    Inform. Primen., 19:3 (2025),  67–72
  2. Machine learning and trust in classification results

    Inform. Primen., 19:2 (2025),  63–68
  3. Complexity of the algorithm for finding coincidences in several sequences

    Sistemy i Sredstva Inform., 35:4 (2025),  154–163
  4. Analysis of failures by indirect features

    Sistemy i Sredstva Inform., 35:1 (2025),  59–70
  5. Identification of cause-and-effect relationships when covering causes

    Inform. Primen., 18:2 (2024),  54–59
  6. Logic of deception in machine learning

    Inform. Primen., 18:1 (2024),  78–83
  7. To the problem of identifying failures in the information technology infrastructure by monitoring and analyzing indirect data

    Sistemy i Sredstva Inform., 34:3 (2024),  14–22
  8. Functional safety monitoring of large service systems

    Sistemy i Sredstva Inform., 34:3 (2024),  3–13
  9. Classification by cause-and-effect relationships

    Inform. Primen., 17:3 (2023),  71–75
  10. Complex cause-and-effect relationships

    Inform. Primen., 17:2 (2023),  84–89
  11. Causal relationships in classification problems

    Inform. Primen., 17:1 (2023),  43–49
  12. Automata models of fault propagation and self-healing

    Sistemy i Sredstva Inform., 33:4 (2023),  28–37
  13. Some challenges of critical infrastructure information security monitoring

    Sistemy i Sredstva Inform., 33:3 (2023),  108–116
  14. Cause-and-effect relationships in analysis of unobservable process properties

    Sistemy i Sredstva Inform., 33:2 (2023),  71–78
  15. Classification problem in conditions of distorted cause-and-effect relationships

    Sistemy i Sredstva Inform., 33:1 (2023),  59–67
  16. About the secure architecture of a microservice-based computing system

    Inform. Primen., 16:4 (2022),  87–92
  17. Metadata in secure electronic document management

    Inform. Primen., 16:3 (2022),  97–102
  18. Cause-and-effect chain analysis

    Inform. Primen., 16:2 (2022),  68–74
  19. Detection of distribution drift

    Sistemy i Sredstva Inform., 32:4 (2022),  14–20
  20. Some approaches to network DLP analysis

    Sistemy i Sredstva Inform., 32:2 (2022),  72–80
  21. Search of anomalies in big data

    Sistemy i Sredstva Inform., 32:1 (2022),  160–167
  22. Statistics and clusters for detection of anomalous insertions in Big Data environment

    Inform. Primen., 15:4 (2021),  79–86
  23. Remote monitoring of workflows

    Inform. Primen., 15:3 (2021),  2–8
  24. Intelligent analysis of Big Data extendible collections under the limits of process-real time

    Inform. Primen., 15:2 (2021),  36–43
  25. Enhanced tokenization algorithm for personal data protection

    Sistemy i Sredstva Inform., 31:4 (2021),  135–143
  26. Secure scaling of electronic ledgers based on tangles

    Sistemy i Sredstva Inform., 31:3 (2021),  60–69
  27. Hidden impact without malicious code

    Sistemy i Sredstva Inform., 31:2 (2021),  4–15
  28. Support for solving diagnostic type problems

    Sistemy i Sredstva Inform., 31:1 (2021),  69–81
  29. On probabilistic estimates of the validity of empirical conclusions

    Inform. Primen., 14:4 (2020),  3–8
  30. Identifying anomalies using metadata

    Inform. Primen., 14:3 (2020),  76–80
  31. Mathematical statistics in the task of identifying hostile insiders

    Inform. Primen., 14:3 (2020),  71–75
  32. Methods of finding the causes of information technology failures by means of metadata

    Inform. Primen., 14:2 (2020),  33–39
  33. On causal representativeness of training samples of precedents in diagnostic type tasks

    Inform. Primen., 14:1 (2020),  80–86
  34. End-to-end information security of private cloud computing

    Sistemy i Sredstva Inform., 30:4 (2020),  76–82
  35. Constructing process models represented by simple Petri nets

    Sistemy i Sredstva Inform., 30:4 (2020),  61–75
  36. Prevention of mass failure of low-security mobile systems of information support for digital economy

    Sistemy i Sredstva Inform., 30:2 (2020),  21–30
  37. Description of digital economy dynamics using an electronic ledger

    Sistemy i Sredstva Inform., 30:1 (2020),  108–114
  38. Generation of threats in heterogeneous systems of digital economy

    Sistemy i Sredstva Inform., 30:1 (2020),  46–55
  39. Using metadata to implement multilevel security policy requirements

    Inform. Primen., 13:4 (2019),  85–89
  40. Concepts forming on the basis of small samples

    Inform. Primen., 13:4 (2019),  81–84
  41. Methods of identification of “weak” signs of violations of information security

    Inform. Primen., 13:3 (2019),  3–8
  42. Architectural decisions in the problem of identification of fraud in the analysis of information flows in digital economy

    Inform. Primen., 13:2 (2019),  22–28
  43. Search of empirical causes of failures and errors in computer systems and networks using metadata

    Sistemy i Sredstva Inform., 29:4 (2019),  28–38
  44. The electronic ledger on the basis of situational centers for digital economy

    Sistemy i Sredstva Inform., 29:2 (2019),  4–11
  45. Methods of protection against mass inactivation of low protected computers of digital economy

    Sistemy i Sredstva Inform., 29:1 (2019),  4–11
  46. Methods of identification of host capture in a distributed information system which is protected on the basis of meta data

    Inform. Primen., 12:4 (2018),  39–43
  47. Parametrization in applied problems of search of empirical reasons

    Inform. Primen., 12:3 (2018),  62–66
  48. Hierarchical method of meta data generation for control of network connections

    Inform. Primen., 12:2 (2018),  44–49
  49. On some possibilities of resource management for organizing active counteraction to computer attacks

    Inform. Primen., 12:1 (2018),  62–70
  50. Overcoming of protection of a network where connections are controlled by meta data

    Sistemy i Sredstva Inform., 28:4 (2018),  22–30
  51. Information security on the basis of meta data in enterprise application integration architecture of information systems

    Sistemy i Sredstva Inform., 28:2 (2018),  34–41
  52. About the analysis of erratic statuses in the distributed computing systems

    Sistemy i Sredstva Inform., 28:1 (2018),  99–109
  53. The model of the set of information spaces in the problem of insider detection

    Inform. Primen., 11:4 (2017),  65–69
  54. Consistency analysis of software-defined networks reconfiguration

    Sistemy i Sredstva Inform., 27:3 (2017),  12–22
  55. About complex authentication

    Sistemy i Sredstva Inform., 27:3 (2017),  4–11
  56. Erroneous states classification in dictributed computing systems and sources of their occurence

    Sistemy i Sredstva Inform., 27:2 (2017),  29–40
  57. On the advanced procedure to reduce calculation of Galois closures

    Inform. Primen., 10:4 (2016),  96–104
  58. Integration of statistical and deterministic methods for analysis of information security

    Inform. Primen., 10:3 (2016),  2–8
  59. Security evaluation in secure architecture of distributed information systems

    Sistemy i Sredstva Inform., 26:4 (2016),  31–37
  60. Secure automatic reconfiguration of cloudy computing

    Sistemy i Sredstva Inform., 26:3 (2016),  83–92
  61. Architectural vulnerabilities of distributed information systems

    Sistemy i Sredstva Inform., 26:3 (2016),  74–82
  62. Protection of business logic against zero day attacks

    Sistemy i Sredstva Inform., 26:3 (2016),  60–73
  63. Information flow monitoring and control in the cloud computing environment

    Inform. Primen., 9:4 (2015),  91–97
  64. Rate of information transfer and capacity in covert channels defined by tags

    Inform. Primen., 9:4 (2015),  85–90
  65. Architecture of the stand for the pilot study of models, algorithms, and solutions of information security in cloud computing environments

    Sistemy i Sredstva Inform., 25:4 (2015),  65–77
  66. Problems of interaction of the malicious code and protection programs in architecture of modern operating systems

    Sistemy i Sredstva Inform., 25:3 (2015),  94–108
  67. Possibilities of secure architecture creation for dynamically changing information systems

    Sistemy i Sredstva Inform., 25:3 (2015),  78–93
  68. Switching on of new bans in random sequences

    Inform. Primen., 8:4 (2014),  46–52
  69. The analysis of tags in covert channels

    Inform. Primen., 8:4 (2014),  41–45
  70. Secure architecture of distributed systems

    Sistemy i Sredstva Inform., 24:3 (2014),  18–31
  71. Statistical techniques of bans determination of probability measures in discrete spaces

    Inform. Primen., 7:1 (2013),  54–57
  72. Covert channels generated by tags in datagrams

    Sistemy i Sredstva Inform., 23:2 (2013),  6–21
  73. Random graphs model for description of interactions in the network

    Inform. Primen., 6:4 (2012),  57–60
  74. Prohibitions in discrete probabilistic statistical problems

    Diskr. Mat., 23:2 (2011),  53–58
  75. Search of the conflicts in security policies: a model of random graphs

    Inform. Primen., 4:3 (2010),  38–41
  76. Theorems on the nonexistence of consistent sequences of criteria in some discrete problems

    Diskr. Mat., 20:2 (2008),  25–31
  77. Existence of consistent test sequences at the complex null hypotheses in discrete statistical problems

    Inform. Primen., 2:2 (2008),  64–66
  78. Complexity and consistency of statistical criteria

    Sistemy i Sredstva Inform., 2008, no. special issue,  32–39
  79. About security and safety of security subsystems in distributed information systems

    Sistemy i Sredstva Inform., 2007, no. 17,  79–85
  80. Some relations between discrete statistical problems and properties of probability measures on topological spaces

    Diskr. Mat., 18:4 (2006),  128–136
  81. Estimation of the time required to organize a secret channel

    Diskr. Mat., 15:2 (2003),  40–46
  82. A noninterference model and hidden channels

    Diskr. Mat., 14:1 (2002),  11–16
  83. On the existence of hidden channels

    Diskr. Mat., 11:1 (1999),  24–28
  84. Hidden channels and information security in computer systems

    Diskr. Mat., 10:1 (1998),  3–9
  85. On Distributions of $U$-Statistics

    Teor. Veroyatnost. i Primenen., 32:2 (1987),  400–404
  86. On the convergence of counting processes connected with $U$-statistics

    Teor. Veroyatnost. i Primenen., 30:3 (1985),  589–593
  87. Certain statistic problems on graphs

    Mat. Zametki, 36:2 (1984),  269–277
  88. The limiting distribution of the number of cyclic points in a random mapping of bounded height

    Teor. Veroyatnost. i Primenen., 20:3 (1975),  547–556
  89. Limit distributions of certain characteristics of random automaton graphs

    Mat. Zametki, 14:1 (1973),  133–141
  90. Random mappings with bounded multiplicity

    Teor. Veroyatnost. i Primenen., 17:3 (1972),  440–449

  91. Oleg Slavin – to the 60th birthday anniversary

    Vestn. Yuzhno-Ural. Gos. Un-ta. Ser. Matem. Mekh. Fiz., 15:4 (2023),  93–94
  92. Soloviev Sergey Yurievich (02/03/1955 - 09/22/2023). In memory of an outstanding algorithmist

    Vestnik YuUrGU. Ser. Mat. Model. Progr., 16:4 (2023),  106–107
  93. Sergey Leonidovich Chernyshev (to Anniversary Since Birth)

    Vestnik YuUrGU. Ser. Mat. Model. Progr., 15:2 (2022),  125–127
  94. Рудаков Константин Владимирович (21.06.1954 – 10.07.2021). Памяти академика информатики

    Vestnik YuUrGU. Ser. Mat. Model. Progr., 15:1 (2022),  128–130
  95. Vladimir Evgenievich Pavlovsky (22.05.1950–03.06.2020)

    Vestnik YuUrGU. Ser. Mat. Model. Progr., 13:3 (2020),  116–118
  96. Валентин Федорович Колчин (1934–2016)

    Diskr. Mat., 28:4 (2016),  3–5
  97. Preface

    Sistemy i Sredstva Inform., 23:1 (2013),  3–6
  98. Yurii Vasil'evich Prokhorov (on the occasion of his eightieth birthday)

    Diskr. Mat., 22:1 (2010),  3–4


© Steklov Math. Inst. of RAS, 2026