RUS  ENG
Full version
JOURNALS // Vestnik of Astrakhan State Technical University. Series: Management, Computer Sciences and Informatics // Archive

Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2017 Number 1, Pages 48–61 (Mi vagtu466)

This article is cited in 1 paper

COMPUTER SOFTWARE AND COMPUTING EQUIPMENT

The final grade if there are several evaluation options using the example of information security problems

G. A. Popov, A. G. Popov

Astrakhan State Technical University

Abstract: The problem of choosing the most acceptable variant of expert estimating parameters of objects in a situation where there are multiple results is considered. The procedure for assessing the acceptability of the results of expert estimation when solving a particular problem was built. Based on comparison of acceptability assessments it was suggested to choose the most acceptable result. Set of indicators was formed on the basis of which the degree of acceptability was estimated and the expressions for the integral index of acceptability were given. Five possible methods of expert data were described. On the example of one of the tasks of information security sphere the procedure for using these methods and comparing the obtained results were shown. As an example, the task of assessing the vulnerability of individual PC components in relation to information security threats was considered. The most effective method of treatment of expert linguistic data type — a method based on randomization of expert assessments and attraction of the maximum likelihood method was detected. The expert data processing method, which takes into account the degree of competence of the experts only on the basis of affixed assessments, has been proposed. The procedure of formation of the final result of the expert assessment was described in the presence of several variants of expert evaluation of set of objects on a given group of indicators by integrating all the results in one integrated one. These obtained procedures can be used to process the results of the expert evaluation of objects of any nature.

Keywords: expert evaluation, processing method, vulnerability of computer components, integrated indicator of the result acceptability.

UDC: [614.23:616.71]:519.8

Received: 26.12.2016



© Steklov Math. Inst. of RAS, 2024