RUS  ENG
Full version
PEOPLE

Grusho Nikolai Aleksandrovich

Publications in Math-Net.Ru

  1. Classification of small sets of data of large dimension

    Inform. Primen., 19:3 (2025),  67–72
  2. Machine learning and trust in classification results

    Inform. Primen., 19:2 (2025),  63–68
  3. Analysis of failures by indirect features

    Sistemy i Sredstva Inform., 35:1 (2025),  59–70
  4. Identification of cause-and-effect relationships when covering causes

    Inform. Primen., 18:2 (2024),  54–59
  5. Logic of deception in machine learning

    Inform. Primen., 18:1 (2024),  78–83
  6. Functional safety monitoring of large service systems

    Sistemy i Sredstva Inform., 34:3 (2024),  3–13
  7. Classification by cause-and-effect relationships

    Inform. Primen., 17:3 (2023),  71–75
  8. Complex cause-and-effect relationships

    Inform. Primen., 17:2 (2023),  84–89
  9. Causal relationships in classification problems

    Inform. Primen., 17:1 (2023),  43–49
  10. Automata models of fault propagation and self-healing

    Sistemy i Sredstva Inform., 33:4 (2023),  28–37
  11. Some challenges of critical infrastructure information security monitoring

    Sistemy i Sredstva Inform., 33:3 (2023),  108–116
  12. Classification problem in conditions of distorted cause-and-effect relationships

    Sistemy i Sredstva Inform., 33:1 (2023),  59–67
  13. About the secure architecture of a microservice-based computing system

    Inform. Primen., 16:4 (2022),  87–92
  14. Metadata in secure electronic document management

    Inform. Primen., 16:3 (2022),  97–102
  15. Cause-and-effect chain analysis

    Inform. Primen., 16:2 (2022),  68–74
  16. Detection of distribution drift

    Sistemy i Sredstva Inform., 32:4 (2022),  14–20
  17. Some approaches to network DLP analysis

    Sistemy i Sredstva Inform., 32:2 (2022),  72–80
  18. Search of anomalies in big data

    Sistemy i Sredstva Inform., 32:1 (2022),  160–167
  19. Statistics and clusters for detection of anomalous insertions in Big Data environment

    Inform. Primen., 15:4 (2021),  79–86
  20. Remote monitoring of workflows

    Inform. Primen., 15:3 (2021),  2–8
  21. Hidden impact without malicious code

    Sistemy i Sredstva Inform., 31:2 (2021),  4–15
  22. Support for solving diagnostic type problems

    Sistemy i Sredstva Inform., 31:1 (2021),  69–81
  23. Identifying anomalies using metadata

    Inform. Primen., 14:3 (2020),  76–80
  24. Methods of finding the causes of information technology failures by means of metadata

    Inform. Primen., 14:2 (2020),  33–39
  25. Prevention of mass failure of low-security mobile systems of information support for digital economy

    Sistemy i Sredstva Inform., 30:2 (2020),  21–30
  26. Generation of threats in heterogeneous systems of digital economy

    Sistemy i Sredstva Inform., 30:1 (2020),  46–55
  27. Using metadata to implement multilevel security policy requirements

    Inform. Primen., 13:4 (2019),  85–89
  28. Concepts forming on the basis of small samples

    Inform. Primen., 13:4 (2019),  81–84
  29. Methods of identification of “weak” signs of violations of information security

    Inform. Primen., 13:3 (2019),  3–8
  30. Architectural decisions in the problem of identification of fraud in the analysis of information flows in digital economy

    Inform. Primen., 13:2 (2019),  22–28
  31. Search of empirical causes of failures and errors in computer systems and networks using metadata

    Sistemy i Sredstva Inform., 29:4 (2019),  28–38
  32. Methods of identification of “weak” signs of violations of information security

    Sistemy i Sredstva Inform., 29:3 (2019),  194–201
  33. Methods of protection against mass inactivation of low protected computers of digital economy

    Sistemy i Sredstva Inform., 29:1 (2019),  4–11
  34. Methods of identification of host capture in a distributed information system which is protected on the basis of meta data

    Inform. Primen., 12:4 (2018),  39–43
  35. Parametrization in applied problems of search of empirical reasons

    Inform. Primen., 12:3 (2018),  62–66
  36. Information security on the basis of meta data in enterprise application integration architecture of information systems

    Sistemy i Sredstva Inform., 28:2 (2018),  34–41
  37. Modeling of secure architecture of distributed information systems on the basis of integrated virtualization

    Sistemy i Sredstva Inform., 28:1 (2018),  110–122
  38. Integration of statistical and deterministic methods for analysis of information security

    Inform. Primen., 10:3 (2016),  2–8
  39. Security evaluation in secure architecture of distributed information systems

    Sistemy i Sredstva Inform., 26:4 (2016),  31–37
  40. Architectural vulnerabilities of distributed information systems

    Sistemy i Sredstva Inform., 26:3 (2016),  74–82
  41. Rate of information transfer and capacity in covert channels defined by tags

    Inform. Primen., 9:4 (2015),  85–90
  42. Possibilities of secure architecture creation for dynamically changing information systems

    Sistemy i Sredstva Inform., 25:3 (2015),  78–93
  43. Switching on of new bans in random sequences

    Inform. Primen., 8:4 (2014),  46–52
  44. The analysis of tags in covert channels

    Inform. Primen., 8:4 (2014),  41–45
  45. Covert channels on the wireless networks of the standard 802.11

    Sistemy i Sredstva Inform., 24:3 (2014),  32–43
  46. Secure architecture of distributed systems

    Sistemy i Sredstva Inform., 24:3 (2014),  18–31
  47. Statistical techniques of bans determination of probability measures in discrete spaces

    Inform. Primen., 7:1 (2013),  54–57
  48. Covert channels generated by tags in datagrams

    Sistemy i Sredstva Inform., 23:2 (2013),  6–21
  49. Covert channels generated by tags

    Sistemy i Sredstva Inform., 23:1 (2013),  7–13
  50. Distributed information systems on the base of networks with low channel capacity

    Sistemy i Sredstva Inform., 21:2 (2011),  65–68
  51. Search of the conflicts in security policies: a model of random graphs

    Inform. Primen., 4:3 (2010),  38–41
  52. Theorems on the nonexistence of consistent sequences of criteria in some discrete problems

    Diskr. Mat., 20:2 (2008),  25–31
  53. Complexity and consistency of statistical criteria

    Sistemy i Sredstva Inform., 2008, no. special issue,  32–39
  54. About security and safety of security subsystems in distributed information systems

    Sistemy i Sredstva Inform., 2007, no. 17,  79–85


© Steklov Math. Inst. of RAS, 2026