|
|
Publications in Math-Net.Ru
-
Analysis of time of committing nearest malicious attack in information security system using apparatus of rare regenerating processes
Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2020, no. 2, 34–44
-
Network models of malwear proliferation processes
Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2018, no. 4, 73–79
-
Optimization of quantity of passenger transport facilities in urban transport subject to waiting loss
Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2018, no. 2, 7–16
-
Systematic approach to the composition of control functions in the information security systems
Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2018, no. 1, 71–80
-
Alternative assessment of significance of the results of expert assessment in strict ranking method
Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2016, no. 4, 109–117
-
Network traffic routing algorithm taking into account safety requirements
Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2016, no. 2, 35–41
-
Choice of optimal levels of gravitation in social and economic systems based on the principles of gravitation
Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2016, no. 1, 81–89
-
Analysis of the structure of the subsystem of data collection in the system of support of holding sport competitions (by the example of tennis)
Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2015, no. 2, 45–52
-
Analysis of the parameters of information security of the automated systems based on the specified expert assessments
Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2015, no. 1, 33–39
-
Asymptotic behavior of alternative of concordance coefficient
Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2014, no. 1, 153–160
-
Alternative of coefficient of concordance
Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2013, no. 2, 158–167
-
Assessment of the degree of acceptability of the optimization methods for solution of the information security problems
Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2013, no. 1, 90–99
-
Formation of the structure of the methods minimizing total costs of the solution of management problems
Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2012, no. 2, 156–160
-
Formalization of the problem of resources distribution among various functions of information security control
Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2012, no. 1, 112–117
-
Estimation of conformity degree of the problem solution method by means of its antecedent characteristics
Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2012, no. 1, 62–68
-
About arrangement of the components of the information transmission system according to the degree of their influence on reliability and safety of computer-aided system operation
Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2010, no. 2, 172–175
-
About the application of multicriterion search methods in the sphere of information security
Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2010, no. 1, 67–72
-
Classification of functions and problems of a university based on Sagatovski’s method
Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2009, no. 1, 7–17
© , 2024