RUS  ENG
Full version
PEOPLE

Timonina Elena Evgen'evna

Publications in Math-Net.Ru

  1. Classification of small sets of data of large dimension

    Inform. Primen., 19:3 (2025),  67–72
  2. Machine learning and trust in classification results

    Inform. Primen., 19:2 (2025),  63–68
  3. Complexity of the algorithm for finding coincidences in several sequences

    Sistemy i Sredstva Inform., 35:4 (2025),  154–163
  4. Analysis of failures by indirect features

    Sistemy i Sredstva Inform., 35:1 (2025),  59–70
  5. Identification of cause-and-effect relationships when covering causes

    Inform. Primen., 18:2 (2024),  54–59
  6. Logic of deception in machine learning

    Inform. Primen., 18:1 (2024),  78–83
  7. Functional safety monitoring of large service systems

    Sistemy i Sredstva Inform., 34:3 (2024),  3–13
  8. Classification by cause-and-effect relationships

    Inform. Primen., 17:3 (2023),  71–75
  9. Complex cause-and-effect relationships

    Inform. Primen., 17:2 (2023),  84–89
  10. Causal relationships in classification problems

    Inform. Primen., 17:1 (2023),  43–49
  11. Automata models of fault propagation and self-healing

    Sistemy i Sredstva Inform., 33:4 (2023),  28–37
  12. Some challenges of critical infrastructure information security monitoring

    Sistemy i Sredstva Inform., 33:3 (2023),  108–116
  13. Cause-and-effect relationships in analysis of unobservable process properties

    Sistemy i Sredstva Inform., 33:2 (2023),  71–78
  14. Classification problem in conditions of distorted cause-and-effect relationships

    Sistemy i Sredstva Inform., 33:1 (2023),  59–67
  15. About the secure architecture of a microservice-based computing system

    Inform. Primen., 16:4 (2022),  87–92
  16. Metadata in secure electronic document management

    Inform. Primen., 16:3 (2022),  97–102
  17. Cause-and-effect chain analysis

    Inform. Primen., 16:2 (2022),  68–74
  18. Detection of distribution drift

    Sistemy i Sredstva Inform., 32:4 (2022),  14–20
  19. Some approaches to network DLP analysis

    Sistemy i Sredstva Inform., 32:2 (2022),  72–80
  20. Search of anomalies in big data

    Sistemy i Sredstva Inform., 32:1 (2022),  160–167
  21. Statistics and clusters for detection of anomalous insertions in Big Data environment

    Inform. Primen., 15:4 (2021),  79–86
  22. Remote monitoring of workflows

    Inform. Primen., 15:3 (2021),  2–8
  23. Intelligent analysis of Big Data extendible collections under the limits of process-real time

    Inform. Primen., 15:2 (2021),  36–43
  24. Enhanced tokenization algorithm for personal data protection

    Sistemy i Sredstva Inform., 31:4 (2021),  135–143
  25. Secure scaling of electronic ledgers based on tangles

    Sistemy i Sredstva Inform., 31:3 (2021),  60–69
  26. Hidden impact without malicious code

    Sistemy i Sredstva Inform., 31:2 (2021),  4–15
  27. Support for solving diagnostic type problems

    Sistemy i Sredstva Inform., 31:1 (2021),  69–81
  28. On probabilistic estimates of the validity of empirical conclusions

    Inform. Primen., 14:4 (2020),  3–8
  29. Identifying anomalies using metadata

    Inform. Primen., 14:3 (2020),  76–80
  30. Mathematical statistics in the task of identifying hostile insiders

    Inform. Primen., 14:3 (2020),  71–75
  31. Methods of finding the causes of information technology failures by means of metadata

    Inform. Primen., 14:2 (2020),  33–39
  32. On causal representativeness of training samples of precedents in diagnostic type tasks

    Inform. Primen., 14:1 (2020),  80–86
  33. End-to-end information security of private cloud computing

    Sistemy i Sredstva Inform., 30:4 (2020),  76–82
  34. Constructing process models represented by simple Petri nets

    Sistemy i Sredstva Inform., 30:4 (2020),  61–75
  35. Prevention of mass failure of low-security mobile systems of information support for digital economy

    Sistemy i Sredstva Inform., 30:2 (2020),  21–30
  36. Description of digital economy dynamics using an electronic ledger

    Sistemy i Sredstva Inform., 30:1 (2020),  108–114
  37. Generation of threats in heterogeneous systems of digital economy

    Sistemy i Sredstva Inform., 30:1 (2020),  46–55
  38. Using metadata to implement multilevel security policy requirements

    Inform. Primen., 13:4 (2019),  85–89
  39. Concepts forming on the basis of small samples

    Inform. Primen., 13:4 (2019),  81–84
  40. Methods of identification of “weak” signs of violations of information security

    Inform. Primen., 13:3 (2019),  3–8
  41. Architectural decisions in the problem of identification of fraud in the analysis of information flows in digital economy

    Inform. Primen., 13:2 (2019),  22–28
  42. Search of empirical causes of failures and errors in computer systems and networks using metadata

    Sistemy i Sredstva Inform., 29:4 (2019),  28–38
  43. The electronic ledger on the basis of situational centers for digital economy

    Sistemy i Sredstva Inform., 29:2 (2019),  4–11
  44. Methods of protection against mass inactivation of low protected computers of digital economy

    Sistemy i Sredstva Inform., 29:1 (2019),  4–11
  45. Methods of identification of host capture in a distributed information system which is protected on the basis of meta data

    Inform. Primen., 12:4 (2018),  39–43
  46. Parametrization in applied problems of search of empirical reasons

    Inform. Primen., 12:3 (2018),  62–66
  47. Hierarchical method of meta data generation for control of network connections

    Inform. Primen., 12:2 (2018),  44–49
  48. On some possibilities of resource management for organizing active counteraction to computer attacks

    Inform. Primen., 12:1 (2018),  62–70
  49. Overcoming of protection of a network where connections are controlled by meta data

    Sistemy i Sredstva Inform., 28:4 (2018),  22–30
  50. Information security on the basis of meta data in enterprise application integration architecture of information systems

    Sistemy i Sredstva Inform., 28:2 (2018),  34–41
  51. About the analysis of erratic statuses in the distributed computing systems

    Sistemy i Sredstva Inform., 28:1 (2018),  99–109
  52. The model of the set of information spaces in the problem of insider detection

    Inform. Primen., 11:4 (2017),  65–69
  53. About complex authentication

    Sistemy i Sredstva Inform., 27:3 (2017),  4–11
  54. Erroneous states classification in dictributed computing systems and sources of their occurence

    Sistemy i Sredstva Inform., 27:2 (2017),  29–40
  55. Integration of statistical and deterministic methods for analysis of information security

    Inform. Primen., 10:3 (2016),  2–8
  56. Security evaluation in secure architecture of distributed information systems

    Sistemy i Sredstva Inform., 26:4 (2016),  31–37
  57. Architectural vulnerabilities of distributed information systems

    Sistemy i Sredstva Inform., 26:3 (2016),  74–82
  58. Rate of information transfer and capacity in covert channels defined by tags

    Inform. Primen., 9:4 (2015),  85–90
  59. Possibilities of secure architecture creation for dynamically changing information systems

    Sistemy i Sredstva Inform., 25:3 (2015),  78–93
  60. Switching on of new bans in random sequences

    Inform. Primen., 8:4 (2014),  46–52
  61. The analysis of tags in covert channels

    Inform. Primen., 8:4 (2014),  41–45
  62. Secure architecture of distributed systems

    Sistemy i Sredstva Inform., 24:3 (2014),  18–31
  63. Statistical techniques of bans determination of probability measures in discrete spaces

    Inform. Primen., 7:1 (2013),  54–57
  64. Covert channels generated by tags in datagrams

    Sistemy i Sredstva Inform., 23:2 (2013),  6–21
  65. Attacks on the centralized systems of intrusion detection

    Sistemy i Sredstva Inform., 23:1 (2013),  33–42
  66. Random graphs model for description of interactions in the network

    Inform. Primen., 6:4 (2012),  57–60
  67. Prohibitions in discrete probabilistic statistical problems

    Diskr. Mat., 23:2 (2011),  53–58
  68. Search of the conflicts in security policies: a model of random graphs

    Inform. Primen., 4:3 (2010),  38–41
  69. Theorems on the nonexistence of consistent sequences of criteria in some discrete problems

    Diskr. Mat., 20:2 (2008),  25–31
  70. Existence of consistent test sequences at the complex null hypotheses in discrete statistical problems

    Inform. Primen., 2:2 (2008),  64–66
  71. Complexity and consistency of statistical criteria

    Sistemy i Sredstva Inform., 2008, no. special issue,  32–39
  72. About security and safety of security subsystems in distributed information systems

    Sistemy i Sredstva Inform., 2007, no. 17,  79–85
  73. Some relations between discrete statistical problems and properties of probability measures on topological spaces

    Diskr. Mat., 18:4 (2006),  128–136
  74. Estimation of the time required to organize a secret channel

    Diskr. Mat., 15:2 (2003),  40–46
  75. Optimal estimation for a finite population of unknown size

    Mat. Zametki, 31:4 (1982),  633–640
  76. On the estimation of the size of a finite population

    Teor. Veroyatnost. i Primenen., 27:2 (1982),  380–384
  77. Estimation in sampling from a finite population

    Mat. Zametki, 28:4 (1980),  623–633


© Steklov Math. Inst. of RAS, 2026