|   |  | 
	
	
	
 
	
  
	
	
        
	  
			Publications in Math-Net.Ru
			
				- 
				Analysis of failures by indirect features
 
 Sistemy i Sredstva Inform., 35:1 (2025),  59–70
- 
				To the problem of identifying failures in the information technology infrastructure by monitoring and analyzing indirect data
 
 Sistemy i Sredstva Inform., 34:3 (2024),  14–22
- 
				Functional safety monitoring of large service systems
 
 Sistemy i Sredstva Inform., 34:3 (2024),  3–13
- 
				Classification by cause-and-effect relationships
 
 Inform. Primen., 17:3 (2023),  71–75
- 
				Automata models of fault propagation and self-healing
 
 Sistemy i Sredstva Inform., 33:4 (2023),  28–37
- 
				Cause-and-effect relationships in analysis of unobservable process properties
 
 Sistemy i Sredstva Inform., 33:2 (2023),  71–78
- 
				About the secure architecture of a microservice-based computing system
 
 Inform. Primen., 16:4 (2022),  87–92
- 
				Detection of distribution drift
 
 Sistemy i Sredstva Inform., 32:4 (2022),  14–20
- 
				Some approaches to network DLP analysis
 
 Sistemy i Sredstva Inform., 32:2 (2022),  72–80
- 
				Search of anomalies in big data
 
 Sistemy i Sredstva Inform., 32:1 (2022),  160–167
- 
				Statistics and clusters for detection of anomalous insertions in Big Data environment
 
 Inform. Primen., 15:4 (2021),  79–86
- 
				Intelligent analysis of Big Data extendible collections under the limits of process-real time
 
 Inform. Primen., 15:2 (2021),  36–43
- 
				Enhanced tokenization algorithm for personal data protection
 
 Sistemy i Sredstva Inform., 31:4 (2021),  135–143
- 
				On probabilistic estimates of the validity of empirical conclusions
 
 Inform. Primen., 14:4 (2020),  3–8
- 
				Mathematical statistics in the task of identifying hostile insiders
 
 Inform. Primen., 14:3 (2020),  71–75
- 
				Parametrization in applied problems of search of empirical reasons
 
 Inform. Primen., 12:3 (2018),  62–66
- 
				The model of the set of information spaces in the problem of insider detection
 
 Inform. Primen., 11:4 (2017),  65–69
- 
				About complex authentication
 
 Sistemy i Sredstva Inform., 27:3 (2017),  4–11
- 
				Protection of business logic against zero day attacks
 
 Sistemy i Sredstva Inform., 26:3 (2016),  60–73
 
				
	
	
	
	© , 2025