|
|
Publications in Math-Net.Ru
-
Predicting the results of the R. Cattell test based on the social network user profiles
Informatsionnye Tekhnologii i Vychslitel'nye Sistemy, 2024, no. 1, 56–66
-
Approaches for behavior intensity estimation in groups of heterogeneous individuals: precision and applicability for data with uncertainty
Informatics and Automation, 23:6 (2024), 1730–1753
-
Automating the temperament assessment of online social network users
Dokl. RAN. Math. Inf. Proc. Upr., 514:2 (2023), 235–241
-
Identification of characteristics of employee's individual human capital with data on self-reports of professional skills and personal characteristics
Informatics and Automation, 22:1 (2023), 190–214
-
The use of probabilistic relational models of complex "critical documents - information system - the user - the attacker" for the analysis of security of information systems users from social engineering attacks
Fuzzy Systems and Soft Computing, 10:2 (2015), 209–221
-
Memes and social engineering attacks in virtual space
Tr. SPIIRAN, 30 (2013), 88–121
-
Automated questionnaire based on the questions about the episodes of respondents’ risky behavior: primary analysis of application results
Tr. SPIIRAN, 26 (2013), 175–193
-
Predictor Mining: Data Mining application to Social Computing
Tr. SPIIRAN, 26 (2013), 136–161
-
Acceleration of calculation of an estimate of information system user's security at the expense of improbable ways of socio-engineering attacks elimination
Tr. SPIIRAN, 25 (2013), 171–181
-
SQL representation of relational and probabilistic models of soñio-engineering attacks in problems of calculation of the aggregated estimates of information system’s personnel security taking into account scales of communications between users
Tr. SPIIRAN, 24 (2013), 41–53
-
Risky behavior Poisson model identification: heterogeneous arguments in likelihood
Tr. SPIIRAN, 23 (2012), 157–184
-
Probabilistic graphical models of individual socially significant behavior on the base of incomplete data
Tr. SPIIRAN, 22 (2012), 101–112
-
SQL representation of relational and probabilistic models of socio-engineering attacks in problems of calculation of the aggregated of information system’s personnel’s security estimation
Tr. SPIIRAN, 22 (2012), 31–44
-
Generalized linear regression model for prediction of interval between the interview moment and the last episode of risky behavior on the base of psychosocial and demographic traits
Tr. SPIIRAN, 21 (2012), 80–94
-
Software prototype for information systems’ personnel's protection analysis based on the fragment of user’s vulnerabilities profile.
Tr. SPIIRAN, 21 (2012), 21–40
-
Modeling of socially significant respondents' behavior: analytical and numerical rate estimates based on the episodes near interview in case of information deficiency
Tr. SPIIRAN, 20 (2012), 101–115
-
Likelihood and relational methods for representing “informational system – personnel – critical documents” complex model.
Tr. SPIIRAN, 20 (2012), 57–71
-
Relative importance of predictor variables in analysis of risk behavior determinants (brief review)
Tr. SPIIRAN, 19 (2011), 255–267
-
Quantitative measurements of behavioral displays of user's vulnerabilities associated with socio-engineering attacks
Tr. SPIIRAN, 19 (2011), 34–47
-
Psychological defense as a factor of user's vulnerability in a socio-engineering attacks context
Tr. SPIIRAN, 18 (2011), 74–92
-
Classification of the Psychological Traits Underlying User’s Vulnerabilities to Socio-engeneering Attacks
Tr. SPIIRAN, 17 (2011), 70–99
-
Regression diagnostics in the rate analysis based on data about the last episodes
Tr. SPIIRAN, 17 (2011), 33–46
-
Processing length bias of time intervals between the last episode and the interview
Tr. SPIIRAN, 16 (2011), 160–185
-
Visual toolkit for construction of the models of complex “information system – personnel”, used for imitation of socioengineering attacks
Tr. SPIIRAN, 15 (2010), 231–245
-
Social Psychological Factors That Influence the Information System Users Vulnerability Degree in Regard of Socio-Engineering Attacks
Tr. SPIIRAN, 12 (2010), 200–214
-
Super-short time series’ parameters estimate on the base of granular data about record intervals between episodes
Tr. SPIIRAN, 12 (2010), 170–181
-
Probabilistic distributions of ordinal statistics in the analysis of super-short fuzzy and incomplete time series
Tr. SPIIRAN, 10 (2009), 184–207
-
Risky behavior rate estimates calculation based on Chebychev inequality
Tr. SPIIRAN, 10 (2009), 96–109
-
An approach to comparison of threatening behavior parameters between social groups based upon incomplete and imprecise date
Tr. SPIIRAN, 9 (2009), 252–261
-
Correlations between intentional and psychodynamic characteristics in a model of personality
Tr. SPIIRAN, 9 (2009), 228–251
-
Respondents behaviour intensity estimation under the information deficiency
Tr. SPIIRAN, 7 (2008), 239–254
-
An analysis of information systems security in the context of socio-engineering attacks: position statement
Tr. SPIIRAN, 7 (2008), 170–176
-
Estimation of adherence to HAART among narcoconsumers-patients of the St.-Petersburg AIDS Center statistical models, psychological and socio-demographical factors
Tr. SPIIRAN, 6 (2008), 203–233
-
Modeling of “Personality–Activity–Efficiency” systems based on Bayesian networks: a position statement
Tr. SPIIRAN, 6 (2008), 198–202
-
An analysis of HIV-positive persons' risky behavior in their adaptive style models (based on interviews obtained from the St. Petersburg Aids-Center patients)
Tr. SPIIRAN, 5 (2007), 117–150
© , 2026