Matches in SemOpenAlex for { <https://semopenalex.org/work/W2945252251> ?p ?o ?g. }
Showing items 1 to 63 of
63
with 100 items per page.
- W2945252251 abstract "Objectives. Analysis of the existing methodology for the formation of requirements for information protection systems (GIS) from unauthorized access (NSD) to automated systems (AS) revealed a number of significant flaws, the main of which is the following: despite the fact that the considered method undoubtedly has theoretical significance, the same time, it can not claim practical value. This is due to the fact that in this methodology, the studies were carried out not on a specific standard (widely used certified according to the regulations of the Federal Service for Technical and Export Control of Russia) GIS, and the data on threats of unauthorized access given in it do not correspond to reality (morally obsolete), but therefore require a significant upgrade. Accepting the existing methodology as a baseline, the purpose of the article is to develop a private method of forming requirements for GIS from unauthorized access to the AU, which has practical value and allows you to formulate quantitative requirements for a wide class of certified GIS. Method. When writing the article, the methods of system analysis, evolutionary modeling, probability theory and mathematical statistics, mathematical apparatus for modeling dynamic discrete networks (E-networks), and theory of algorithms were used. The methodological basis is a systematic approach. Result. A private methodology has been developed that determines the parameters of the symbolic genetic algorithm (GA) for creating a software package for analysis, evolutionary modeling, and forming quantitative requirements for GIS from un-authorized access to speakers using the Matlab 13 application software to implement GA in the Optimization toolbox programming environment. Conclusion. The proposed private method of forming requirements for GIS from unauthorized access in the AU using GA has a theoretical significance, practical value and allows you to formulate quantitative requirements for a wide class of AS certified in a certain class of security in accordance with the requirements of current regulatory documentation." @default.
- W2945252251 created "2019-05-29" @default.
- W2945252251 creator A5005293098 @default.
- W2945252251 creator A5040444241 @default.
- W2945252251 creator A5067454350 @default.
- W2945252251 date "2019-05-12" @default.
- W2945252251 modified "2023-10-05" @default.
- W2945252251 title "PRIVATE TECHNIQUE OF FORMATION OF REQUIREMENTS TO INFORMATION PROTECTION SYSTEMS FROM UNAUTHORIZED ACCESS TO AUTOMATED BATH SYSTEMS USING GENETIC ALGORITHM" @default.
- W2945252251 cites W2097571405 @default.
- W2945252251 doi "https://doi.org/10.21822/2073-6185-2018-45-3-114-122" @default.
- W2945252251 hasPublicationYear "2019" @default.
- W2945252251 type Work @default.
- W2945252251 sameAs 2945252251 @default.
- W2945252251 citedByCount "0" @default.
- W2945252251 crossrefType "journal-article" @default.
- W2945252251 hasAuthorship W2945252251A5005293098 @default.
- W2945252251 hasAuthorship W2945252251A5040444241 @default.
- W2945252251 hasAuthorship W2945252251A5067454350 @default.
- W2945252251 hasBestOaLocation W29452522511 @default.
- W2945252251 hasConcept C111919701 @default.
- W2945252251 hasConcept C119857082 @default.
- W2945252251 hasConcept C124101348 @default.
- W2945252251 hasConcept C154945302 @default.
- W2945252251 hasConcept C17744445 @default.
- W2945252251 hasConcept C199360897 @default.
- W2945252251 hasConcept C199539241 @default.
- W2945252251 hasConcept C2777212361 @default.
- W2945252251 hasConcept C2777904410 @default.
- W2945252251 hasConcept C2780615140 @default.
- W2945252251 hasConcept C41008148 @default.
- W2945252251 hasConcept C46304622 @default.
- W2945252251 hasConcept C8880873 @default.
- W2945252251 hasConceptScore W2945252251C111919701 @default.
- W2945252251 hasConceptScore W2945252251C119857082 @default.
- W2945252251 hasConceptScore W2945252251C124101348 @default.
- W2945252251 hasConceptScore W2945252251C154945302 @default.
- W2945252251 hasConceptScore W2945252251C17744445 @default.
- W2945252251 hasConceptScore W2945252251C199360897 @default.
- W2945252251 hasConceptScore W2945252251C199539241 @default.
- W2945252251 hasConceptScore W2945252251C2777212361 @default.
- W2945252251 hasConceptScore W2945252251C2777904410 @default.
- W2945252251 hasConceptScore W2945252251C2780615140 @default.
- W2945252251 hasConceptScore W2945252251C41008148 @default.
- W2945252251 hasConceptScore W2945252251C46304622 @default.
- W2945252251 hasConceptScore W2945252251C8880873 @default.
- W2945252251 hasLocation W29452522511 @default.
- W2945252251 hasLocation W29452522512 @default.
- W2945252251 hasOpenAccess W2945252251 @default.
- W2945252251 hasPrimaryLocation W29452522511 @default.
- W2945252251 hasRelatedWork W1587296260 @default.
- W2945252251 hasRelatedWork W2086496881 @default.
- W2945252251 hasRelatedWork W2351372511 @default.
- W2945252251 hasRelatedWork W2370626080 @default.
- W2945252251 hasRelatedWork W2394380923 @default.
- W2945252251 hasRelatedWork W2406631723 @default.
- W2945252251 hasRelatedWork W2525423572 @default.
- W2945252251 hasRelatedWork W2794863555 @default.
- W2945252251 hasRelatedWork W2911390066 @default.
- W2945252251 hasRelatedWork W86608996 @default.
- W2945252251 isParatext "false" @default.
- W2945252251 isRetracted "false" @default.
- W2945252251 magId "2945252251" @default.
- W2945252251 workType "article" @default.