RUS  ENG
Full version
PEOPLE

Tulupyev Alexander Lvovich

Publications in Math-Net.Ru

  1. Application of tertiary structure of algebraic bayesian network in the problem of a posteriori inference

    Vestn. YuUrGU. Ser. Vych. Matem. Inform., 12:1 (2023),  61–88
  2. Identification of Deterioration caused by AHF, MADS or CE by RR and QT Data Classification

    Informatics and Automation, 21:2 (2022),  311–338
  3. A model for estimating the posting frequency in an online social media with incomplete data using objective determinants of users' behaviour

    Nechetkie Sistemy i Myagkie Vychisleniya, 16:2 (2021),  77–95
  4. Algebraic bayesian networks: checking backbone connectivity.

    Vestnik of Saint Petersburg University. Mathematics. Mechanics. Astronomy, 8:2 (2021),  305–316
  5. Local and global probabilistic-logic inference in algebraic bayesian networks: a matrix-vector description and issues of sensitivity

    Nechetkie Sistemy i Myagkie Vychisleniya, 12:2 (2017),  133–150
  6. Graph structures in relational databases, constraint satisfaction and Bayesian networks

    Nechetkie Sistemy i Myagkie Vychisleniya, 10:2 (2015),  155–179
  7. Model for socially significant behavior rate estimate: consistency diagnostics

    Nechetkie Sistemy i Myagkie Vychisleniya, 10:1 (2015),  93–107
  8. Complexity statistical estimates of straightforward and greedy algorithms for algebraic Baesian networks syntesis

    Nechetkie Sistemy i Myagkie Vychisleniya, 10:1 (2015),  75–91
  9. Memes and social engineering attacks in virtual space

    Tr. SPIIRAN, 30 (2013),  88–121
  10. Minimal join graph subsets synthesis system

    Tr. SPIIRAN, 27 (2013),  200–244
  11. Approaches for algebraic Bayesian networks primary structure cyclicity elimination

    Tr. SPIIRAN, 26 (2013),  216–233
  12. Automated questionnaire based on the questions about the episodes of respondents’ risky behavior: primary analysis of application results

    Tr. SPIIRAN, 26 (2013),  175–193
  13. Predictor Mining: Data Mining application to Social Computing

    Tr. SPIIRAN, 26 (2013),  136–161
  14. Algorithm for minimal join graph’s randomized synthesis

    Tr. SPIIRAN, 25 (2013),  221–234
  15. Sibling criterion for cyclicity of minimal joint graphs

    Tr. SPIIRAN, 25 (2013),  190–203
  16. Acceleration of calculation of an estimate of information system user's security at the expense of improbable ways of socio-engineering attacks elimination

    Tr. SPIIRAN, 25 (2013),  171–181
  17. Decoding algorithm for binary linear hidden Markov models represented in the form of algebraic Bayesian networks

    Tr. SPIIRAN, 24 (2013),  165–177
  18. SQL representation of relational and probabilistic models of soñio-engineering attacks in problems of calculation of the aggregated estimates of information system’s personnel security taking into account scales of communications between users

    Tr. SPIIRAN, 24 (2013),  41–53
  19. Posteriori inference in tertiary polystructure of an algebraic Bayesian network

    Tr. SPIIRAN, 23 (2012),  343–356
  20. Risky behavior Poisson model identification: heterogeneous arguments in likelihood

    Tr. SPIIRAN, 23 (2012),  157–184
  21. Algorithm for Detection Algebraic Bayesian Network Primary Structure Acyclicity Based on Number of Minimal Join Graph Edges Estimating

    Tr. SPIIRAN, 22 (2012),  205–223
  22. Probabilistic graphical models of individual socially significant behavior on the base of incomplete data

    Tr. SPIIRAN, 22 (2012),  101–112
  23. SQL representation of relational and probabilistic models of socio-engineering attacks in problems of calculation of the aggregated of information system’s personnel’s security estimation

    Tr. SPIIRAN, 22 (2012),  31–44
  24. Algebraic Bayesian Network Secondary Structure Cycles Elimination Based on its Quaternary Structure Analysis

    Tr. SPIIRAN, 21 (2012),  143–156
  25. Generalized linear regression model for prediction of interval between the interview moment and the last episode of risky behavior on the base of psychosocial and demographic traits

    Tr. SPIIRAN, 21 (2012),  80–94
  26. Software prototype for information systems’ personnel's protection analysis based on the fragment of user’s vulnerabilities profile.

    Tr. SPIIRAN, 21 (2012),  21–40
  27. Algebraic Bayesian network: non-linear optimization problem in local posteriori inference with atomic stochastic evidence

    Tr. SPIIRAN, 20 (2012),  200–215
  28. Representation of multinomial linear hidden Markov models in the form of algebraic Bayesian networks

    Tr. SPIIRAN, 20 (2012),  186–199
  29. Modeling of socially significant respondents' behavior: analytical and numerical rate estimates based on the episodes near interview in case of information deficiency

    Tr. SPIIRAN, 20 (2012),  101–115
  30. Likelihood and relational methods for representing “informational system – personnel – critical documents” complex model.

    Tr. SPIIRAN, 20 (2012),  57–71
  31. A posteriori probabilistic estimates in algebraic Bayesian networks

    Vestnik S.-Petersburg Univ. Ser. 10. Prikl. Mat. Inform. Prots. Upr., 2012, no. 2,  51–59
  32. Relative importance of predictor variables in analysis of risk behavior determinants (brief review)

    Tr. SPIIRAN, 19 (2011),  255–267
  33. Algorithm for detection of algebraic Bayesian network primary structure acyclicity based on its quaternary structure

    Tr. SPIIRAN, 19 (2011),  128–145
  34. Quantitative measurements of behavioral displays of user's vulnerabilities associated with socio-engineering attacks

    Tr. SPIIRAN, 19 (2011),  34–47
  35. The Algebraic Bayesian Network Tertiary Structure

    Tr. SPIIRAN, 18 (2011),  164–187
  36. Knowledge and reasoning with uncertainty modeling: matrix-and-vector calculus for local reconciliation of truth estimates

    Tr. SPIIRAN, 18 (2011),  108–135
  37. Psychological defense as a factor of user's vulnerability in a socio-engineering attacks context

    Tr. SPIIRAN, 18 (2011),  74–92
  38. The Algebraic Bayesian Network Minimal Join Graphs Cycles Analysis

    Tr. SPIIRAN, 17 (2011),  151–173
  39. Classification of the Psychological Traits Underlying User’s Vulnerabilities to Socio-engeneering Attacks

    Tr. SPIIRAN, 17 (2011),  70–99
  40. Regression diagnostics in the rate analysis based on data about the last episodes

    Tr. SPIIRAN, 17 (2011),  33–46
  41. Term of Rib Cage in Application to the Algebraic Bayesian Network Join Graphs Analysis

    Tr. SPIIRAN, 16 (2011),  186–205
  42. Processing length bias of time intervals between the last episode and the interview

    Tr. SPIIRAN, 16 (2011),  160–185
  43. Algebraic bayesian network maximal join graph cliques structual analysis

    Vestnik TVGU. Ser. Prikl. Matem. [Herald of Tver State University. Ser. Appl. Math.], 2011, no. 20,  139–151
  44. Visual toolkit for construction of the models of complex “information system – personnel”, used for imitation of socioengineering attacks

    Tr. SPIIRAN, 15 (2010),  231–245
  45. The cardinal number of a minimal join graph set

    Tr. SPIIRAN, 15 (2010),  136–161
  46. A Bayesian belief network directed cycle with multinomial random variables

    Tr. SPIIRAN, 14 (2010),  170–186
  47. Join graph edges in context of algebraic Bayesian network minimal join graph cliques comparative analysis

    Tr. SPIIRAN, 14 (2010),  132–149
  48. Information models of the components of complex “Informative system – personnel”, which is under threat of socioengineering attack

    Tr. SPIIRAN, 14 (2010),  50–57
  49. Information model of the user, who may be under the threat of socioengineering attack

    Tr. SPIIRAN, 13 (2010),  143–155
  50. An observed sequence probability estimate in binary linear hidden Markov models with posterior inference in algebraic Bayesian networks

    Tr. SPIIRAN, 13 (2010),  122–142
  51. Algebraic Bayesian networks minimal join graphcliques comparative analysis

    Tr. SPIIRAN, 13 (2010),  87–105
  52. Social Psychological Factors That Influence the Information System Users Vulnerability Degree in Regard of Socio-Engineering Attacks

    Tr. SPIIRAN, 12 (2010),  200–214
  53. Representation of binary linear hidden Markov models in the form of algebraic Bayesian networks

    Tr. SPIIRAN, 12 (2010),  134–150
  54. Algebraic Bayesian networks secondary structure analysis features

    Tr. SPIIRAN, 12 (2010),  97–118
  55. Synthesis of a joint graph with minimal number of edges: an algorithm formalization and a proof of correctness

    Tr. SPIIRAN, 11 (2009),  142–157
  56. Minimal joint graph structure synthesis

    Tr. SPIIRAN, 11 (2009),  104–129
  57. Probabilistic distributions of ordinal statistics in the analysis of super-short fuzzy and incomplete time series

    Tr. SPIIRAN, 10 (2009),  184–207
  58. Risky behavior rate estimates calculation based on Chebychev inequality

    Tr. SPIIRAN, 10 (2009),  96–109
  59. An approach to comparison of threatening behavior parameters between social groups based upon incomplete and imprecise date

    Tr. SPIIRAN, 9 (2009),  252–261
  60. Algebraic Bayesian networks: an implementation of probabilistic-logic inference in a system of Java-programs

    Tr. SPIIRAN, 8 (2009),  191–232
  61. Respondents behaviour intensity estimation under the information deficiency

    Tr. SPIIRAN, 7 (2008),  239–254
  62. An analysis of information systems security in the context of socio-engineering attacks: position statement

    Tr. SPIIRAN, 7 (2008),  170–176
  63. A local machine learning task in algebraical Bayesian networks: a probabilistic-logic approach

    Tr. SPIIRAN, 7 (2008),  11–25
  64. Estimation of adherence to HAART among narcoconsumers-patients of the St.-Petersburg AIDS Center statistical models, psychological and socio-demographical factors

    Tr. SPIIRAN, 6 (2008),  203–233
  65. Modeling of “Personality–Activity–Efficiency” systems based on Bayesian networks: a position statement

    Tr. SPIIRAN, 6 (2008),  198–202
  66. Matrix-vector equations for local probabilistic logic inference in algebraic Bayesian network

    Tr. SPIIRAN, 6 (2008),  131–139
  67. An analysis of HIV-positive persons' risky behavior in their adaptive style models (based on interviews obtained from the St. Petersburg Aids-Center patients)

    Tr. SPIIRAN, 5 (2007),  117–150
  68. Local a priori inference in algebraic Bayesian network: a set of basic algorithms

    Tr. SPIIRAN, 5 (2007),  100–111
  69. A representation for local and global structures of an algebraical Bayesian network in java applications

    Tr. SPIIRAN, 5 (2007),  71–99
  70. A Method for Uncertain Knowledge Pattern Base Ñonstruction and Analysis

    Tr. SPIIRAN, 1:1 (2002),  258–271


© Steklov Math. Inst. of RAS, 2025