RUS  ENG
Full version
PEOPLE

Tulupyeva Tatiana Valentinovna

Publications in Math-Net.Ru

  1. Predicting the results of the R. Cattell test based on the social network user profiles

    Informatsionnye Tekhnologii i Vychslitel'nye Sistemy, 2024, no. 1,  56–66
  2. Approaches for behavior intensity estimation in groups of heterogeneous individuals: precision and applicability for data with uncertainty

    Informatics and Automation, 23:6 (2024),  1730–1753
  3. Automating the temperament assessment of online social network users

    Dokl. RAN. Math. Inf. Proc. Upr., 514:2 (2023),  235–241
  4. Identification of characteristics of employee's individual human capital with data on self-reports of professional skills and personal characteristics

    Informatics and Automation, 22:1 (2023),  190–214
  5. The use of probabilistic relational models of complex "critical documents - information system - the user - the attacker" for the analysis of security of information systems users from social engineering attacks

    Fuzzy Systems and Soft Computing, 10:2 (2015),  209–221
  6. Memes and social engineering attacks in virtual space

    Tr. SPIIRAN, 30 (2013),  88–121
  7. Automated questionnaire based on the questions about the episodes of respondents’ risky behavior: primary analysis of application results

    Tr. SPIIRAN, 26 (2013),  175–193
  8. Predictor Mining: Data Mining application to Social Computing

    Tr. SPIIRAN, 26 (2013),  136–161
  9. Acceleration of calculation of an estimate of information system user's security at the expense of improbable ways of socio-engineering attacks elimination

    Tr. SPIIRAN, 25 (2013),  171–181
  10. SQL representation of relational and probabilistic models of soñio-engineering attacks in problems of calculation of the aggregated estimates of information system’s personnel security taking into account scales of communications between users

    Tr. SPIIRAN, 24 (2013),  41–53
  11. Risky behavior Poisson model identification: heterogeneous arguments in likelihood

    Tr. SPIIRAN, 23 (2012),  157–184
  12. Probabilistic graphical models of individual socially significant behavior on the base of incomplete data

    Tr. SPIIRAN, 22 (2012),  101–112
  13. SQL representation of relational and probabilistic models of socio-engineering attacks in problems of calculation of the aggregated of information system’s personnel’s security estimation

    Tr. SPIIRAN, 22 (2012),  31–44
  14. Generalized linear regression model for prediction of interval between the interview moment and the last episode of risky behavior on the base of psychosocial and demographic traits

    Tr. SPIIRAN, 21 (2012),  80–94
  15. Software prototype for information systems’ personnel's protection analysis based on the fragment of user’s vulnerabilities profile.

    Tr. SPIIRAN, 21 (2012),  21–40
  16. Modeling of socially significant respondents' behavior: analytical and numerical rate estimates based on the episodes near interview in case of information deficiency

    Tr. SPIIRAN, 20 (2012),  101–115
  17. Likelihood and relational methods for representing “informational system – personnel – critical documents” complex model.

    Tr. SPIIRAN, 20 (2012),  57–71
  18. Relative importance of predictor variables in analysis of risk behavior determinants (brief review)

    Tr. SPIIRAN, 19 (2011),  255–267
  19. Quantitative measurements of behavioral displays of user's vulnerabilities associated with socio-engineering attacks

    Tr. SPIIRAN, 19 (2011),  34–47
  20. Psychological defense as a factor of user's vulnerability in a socio-engineering attacks context

    Tr. SPIIRAN, 18 (2011),  74–92
  21. Classification of the Psychological Traits Underlying User’s Vulnerabilities to Socio-engeneering Attacks

    Tr. SPIIRAN, 17 (2011),  70–99
  22. Regression diagnostics in the rate analysis based on data about the last episodes

    Tr. SPIIRAN, 17 (2011),  33–46
  23. Processing length bias of time intervals between the last episode and the interview

    Tr. SPIIRAN, 16 (2011),  160–185
  24. Visual toolkit for construction of the models of complex “information system – personnel”, used for imitation of socioengineering attacks

    Tr. SPIIRAN, 15 (2010),  231–245
  25. Social Psychological Factors That Influence the Information System Users Vulnerability Degree in Regard of Socio-Engineering Attacks

    Tr. SPIIRAN, 12 (2010),  200–214
  26. Super-short time series’ parameters estimate on the base of granular data about record intervals between episodes

    Tr. SPIIRAN, 12 (2010),  170–181
  27. Probabilistic distributions of ordinal statistics in the analysis of super-short fuzzy and incomplete time series

    Tr. SPIIRAN, 10 (2009),  184–207
  28. Risky behavior rate estimates calculation based on Chebychev inequality

    Tr. SPIIRAN, 10 (2009),  96–109
  29. An approach to comparison of threatening behavior parameters between social groups based upon incomplete and imprecise date

    Tr. SPIIRAN, 9 (2009),  252–261
  30. Correlations between intentional and psychodynamic characteristics in a model of personality

    Tr. SPIIRAN, 9 (2009),  228–251
  31. Respondents behaviour intensity estimation under the information deficiency

    Tr. SPIIRAN, 7 (2008),  239–254
  32. An analysis of information systems security in the context of socio-engineering attacks: position statement

    Tr. SPIIRAN, 7 (2008),  170–176
  33. Estimation of adherence to HAART among narcoconsumers-patients of the St.-Petersburg AIDS Center statistical models, psychological and socio-demographical factors

    Tr. SPIIRAN, 6 (2008),  203–233
  34. Modeling of “Personality–Activity–Efficiency” systems based on Bayesian networks: a position statement

    Tr. SPIIRAN, 6 (2008),  198–202
  35. An analysis of HIV-positive persons' risky behavior in their adaptive style models (based on interviews obtained from the St. Petersburg Aids-Center patients)

    Tr. SPIIRAN, 5 (2007),  117–150


© Steklov Math. Inst. of RAS, 2026