|
|
Publications in Math-Net.Ru
-
The use of probabilistic relational models of complex "critical documents - information system - the user - the attacker" for the analysis of security of information systems users from social engineering attacks
Nechetkie Sistemy i Myagkie Vychisleniya, 10:2 (2015), 209–221
-
Memes and social engineering attacks in virtual space
Tr. SPIIRAN, 30 (2013), 88–121
-
Automated questionnaire based on the questions about the episodes of respondents’ risky behavior: primary analysis of application results
Tr. SPIIRAN, 26 (2013), 175–193
-
Predictor Mining: Data Mining application to Social Computing
Tr. SPIIRAN, 26 (2013), 136–161
-
Acceleration of calculation of an estimate of information system user's security at the expense of improbable ways of socio-engineering attacks elimination
Tr. SPIIRAN, 25 (2013), 171–181
-
Information systems’ user’s protection analysis on the basis of the graphic models containing user’s vulnerabilities profile.
Tr. SPIIRAN, 24 (2013), 54–65
-
SQL representation of relational and probabilistic models of soñio-engineering attacks in problems of calculation of the aggregated estimates of information system’s personnel security taking into account scales of communications between users
Tr. SPIIRAN, 24 (2013), 41–53
-
Monitoring bases of informational system’s personnel’ security from sociotechnical attacks.
Tr. SPIIRAN, 23 (2012), 30–49
-
SQL representation of relational and probabilistic models of socio-engineering attacks in problems of calculation of the aggregated of information system’s personnel’s security estimation
Tr. SPIIRAN, 22 (2012), 31–44
-
Software prototype for information systems’ personnel's protection analysis based on the fragment of user’s vulnerabilities profile.
Tr. SPIIRAN, 21 (2012), 21–40
-
Likelihood and relational methods for representing “informational system – personnel – critical documents” complex model.
Tr. SPIIRAN, 20 (2012), 57–71
-
Quantitative measurements of behavioral displays of user's vulnerabilities associated with socio-engineering attacks
Tr. SPIIRAN, 19 (2011), 34–47
-
Psychological defense as a factor of user's vulnerability in a socio-engineering attacks context
Tr. SPIIRAN, 18 (2011), 74–92
-
Visual toolkit for construction of the models of complex “information system – personnel”, used for imitation of socioengineering attacks
Tr. SPIIRAN, 15 (2010), 231–245
-
Information models of the components of complex “Informative system – personnel”, which is under threat of socioengineering attack
Tr. SPIIRAN, 14 (2010), 50–57
-
Information model of the user, who may be under the threat of socioengineering attack
Tr. SPIIRAN, 13 (2010), 143–155
-
Social Psychological Factors That Influence the Information System Users Vulnerability Degree in Regard of Socio-Engineering Attacks
Tr. SPIIRAN, 12 (2010), 200–214
© , 2024