|
|
Publications in Math-Net.Ru
-
Classification of small sets of data of large dimension
Inform. Primen., 19:3 (2025), 67–72
-
Machine learning and trust in classification results
Inform. Primen., 19:2 (2025), 63–68
-
Analysis of failures by indirect features
Sistemy i Sredstva Inform., 35:1 (2025), 59–70
-
Identification of cause-and-effect relationships when covering causes
Inform. Primen., 18:2 (2024), 54–59
-
Logic of deception in machine learning
Inform. Primen., 18:1 (2024), 78–83
-
Functional safety monitoring of large service systems
Sistemy i Sredstva Inform., 34:3 (2024), 3–13
-
Classification by cause-and-effect relationships
Inform. Primen., 17:3 (2023), 71–75
-
Complex cause-and-effect relationships
Inform. Primen., 17:2 (2023), 84–89
-
Causal relationships in classification problems
Inform. Primen., 17:1 (2023), 43–49
-
Automata models of fault propagation and self-healing
Sistemy i Sredstva Inform., 33:4 (2023), 28–37
-
Some challenges of critical infrastructure information security monitoring
Sistemy i Sredstva Inform., 33:3 (2023), 108–116
-
Classification problem in conditions of distorted cause-and-effect relationships
Sistemy i Sredstva Inform., 33:1 (2023), 59–67
-
About the secure architecture of a microservice-based computing system
Inform. Primen., 16:4 (2022), 87–92
-
Metadata in secure electronic document management
Inform. Primen., 16:3 (2022), 97–102
-
Cause-and-effect chain analysis
Inform. Primen., 16:2 (2022), 68–74
-
Detection of distribution drift
Sistemy i Sredstva Inform., 32:4 (2022), 14–20
-
Some approaches to network DLP analysis
Sistemy i Sredstva Inform., 32:2 (2022), 72–80
-
Search of anomalies in big data
Sistemy i Sredstva Inform., 32:1 (2022), 160–167
-
Statistics and clusters for detection of anomalous insertions in Big Data environment
Inform. Primen., 15:4 (2021), 79–86
-
Remote monitoring of workflows
Inform. Primen., 15:3 (2021), 2–8
-
Hidden impact without malicious code
Sistemy i Sredstva Inform., 31:2 (2021), 4–15
-
Support for solving diagnostic type problems
Sistemy i Sredstva Inform., 31:1 (2021), 69–81
-
Identifying anomalies using metadata
Inform. Primen., 14:3 (2020), 76–80
-
Methods of finding the causes of information technology failures by means of metadata
Inform. Primen., 14:2 (2020), 33–39
-
Prevention of mass failure of low-security mobile systems of information support for digital economy
Sistemy i Sredstva Inform., 30:2 (2020), 21–30
-
Generation of threats in heterogeneous systems of digital economy
Sistemy i Sredstva Inform., 30:1 (2020), 46–55
-
Using metadata to implement multilevel security policy requirements
Inform. Primen., 13:4 (2019), 85–89
-
Concepts forming on the basis of small samples
Inform. Primen., 13:4 (2019), 81–84
-
Methods of identification of “weak” signs of violations of information security
Inform. Primen., 13:3 (2019), 3–8
-
Architectural decisions in the problem of identification of fraud in the analysis of information flows in digital economy
Inform. Primen., 13:2 (2019), 22–28
-
Search of empirical causes of failures and errors in computer systems and networks using metadata
Sistemy i Sredstva Inform., 29:4 (2019), 28–38
-
Methods of identification of “weak” signs of violations of information security
Sistemy i Sredstva Inform., 29:3 (2019), 194–201
-
Methods of protection against mass inactivation of low protected computers of digital economy
Sistemy i Sredstva Inform., 29:1 (2019), 4–11
-
Methods of identification of host capture in a distributed information system which is protected on the basis of meta data
Inform. Primen., 12:4 (2018), 39–43
-
Parametrization in applied problems of search of empirical reasons
Inform. Primen., 12:3 (2018), 62–66
-
Information security on the basis of meta data in enterprise application integration architecture of information systems
Sistemy i Sredstva Inform., 28:2 (2018), 34–41
-
Modeling of secure architecture of distributed information systems on the basis of integrated virtualization
Sistemy i Sredstva Inform., 28:1 (2018), 110–122
-
Integration of statistical and deterministic methods for analysis of information security
Inform. Primen., 10:3 (2016), 2–8
-
Security evaluation in secure architecture of distributed information systems
Sistemy i Sredstva Inform., 26:4 (2016), 31–37
-
Architectural vulnerabilities of distributed information systems
Sistemy i Sredstva Inform., 26:3 (2016), 74–82
-
Rate of information transfer and capacity in covert channels defined by tags
Inform. Primen., 9:4 (2015), 85–90
-
Possibilities of secure architecture creation for dynamically changing information systems
Sistemy i Sredstva Inform., 25:3 (2015), 78–93
-
Switching on of new bans in random sequences
Inform. Primen., 8:4 (2014), 46–52
-
The analysis of tags in covert channels
Inform. Primen., 8:4 (2014), 41–45
-
Covert channels on the wireless networks of the standard 802.11
Sistemy i Sredstva Inform., 24:3 (2014), 32–43
-
Secure architecture of distributed systems
Sistemy i Sredstva Inform., 24:3 (2014), 18–31
-
Statistical techniques of bans determination of probability measures in discrete spaces
Inform. Primen., 7:1 (2013), 54–57
-
Covert channels generated by tags in datagrams
Sistemy i Sredstva Inform., 23:2 (2013), 6–21
-
Covert channels generated by tags
Sistemy i Sredstva Inform., 23:1 (2013), 7–13
-
Distributed information systems on the base of networks with low channel capacity
Sistemy i Sredstva Inform., 21:2 (2011), 65–68
-
Search of the conflicts in security policies: a model of random graphs
Inform. Primen., 4:3 (2010), 38–41
-
Theorems on the nonexistence of consistent sequences of criteria in some discrete problems
Diskr. Mat., 20:2 (2008), 25–31
-
Complexity and consistency of statistical criteria
Sistemy i Sredstva Inform., 2008, no. special issue, 32–39
-
About security and safety of security subsystems in distributed information systems
Sistemy i Sredstva Inform., 2007, no. 17, 79–85
© , 2026