RUS  ENG
Full version
PEOPLE

Azarov Artur Alexandrovich

Publications in Math-Net.Ru

  1. The use of probabilistic relational models of complex "critical documents - information system - the user - the attacker" for the analysis of security of information systems users from social engineering attacks

    Nechetkie Sistemy i Myagkie Vychisleniya, 10:2 (2015),  209–221
  2. Memes and social engineering attacks in virtual space

    Tr. SPIIRAN, 30 (2013),  88–121
  3. Automated questionnaire based on the questions about the episodes of respondents’ risky behavior: primary analysis of application results

    Tr. SPIIRAN, 26 (2013),  175–193
  4. Predictor Mining: Data Mining application to Social Computing

    Tr. SPIIRAN, 26 (2013),  136–161
  5. Acceleration of calculation of an estimate of information system user's security at the expense of improbable ways of socio-engineering attacks elimination

    Tr. SPIIRAN, 25 (2013),  171–181
  6. Information systems’ user’s protection analysis on the basis of the graphic models containing user’s vulnerabilities profile.

    Tr. SPIIRAN, 24 (2013),  54–65
  7. SQL representation of relational and probabilistic models of soñio-engineering attacks in problems of calculation of the aggregated estimates of information system’s personnel security taking into account scales of communications between users

    Tr. SPIIRAN, 24 (2013),  41–53
  8. Monitoring bases of informational system’s personnel’ security from sociotechnical attacks.

    Tr. SPIIRAN, 23 (2012),  30–49
  9. SQL representation of relational and probabilistic models of socio-engineering attacks in problems of calculation of the aggregated of information system’s personnel’s security estimation

    Tr. SPIIRAN, 22 (2012),  31–44
  10. Software prototype for information systems’ personnel's protection analysis based on the fragment of user’s vulnerabilities profile.

    Tr. SPIIRAN, 21 (2012),  21–40
  11. Likelihood and relational methods for representing “informational system – personnel – critical documents” complex model.

    Tr. SPIIRAN, 20 (2012),  57–71
  12. Quantitative measurements of behavioral displays of user's vulnerabilities associated with socio-engineering attacks

    Tr. SPIIRAN, 19 (2011),  34–47
  13. Psychological defense as a factor of user's vulnerability in a socio-engineering attacks context

    Tr. SPIIRAN, 18 (2011),  74–92
  14. Visual toolkit for construction of the models of complex “information system – personnel”, used for imitation of socioengineering attacks

    Tr. SPIIRAN, 15 (2010),  231–245
  15. Information models of the components of complex “Informative system – personnel”, which is under threat of socioengineering attack

    Tr. SPIIRAN, 14 (2010),  50–57
  16. Information model of the user, who may be under the threat of socioengineering attack

    Tr. SPIIRAN, 13 (2010),  143–155
  17. Social Psychological Factors That Influence the Information System Users Vulnerability Degree in Regard of Socio-Engineering Attacks

    Tr. SPIIRAN, 12 (2010),  200–214


© Steklov Math. Inst. of RAS, 2024