A
A. F. Suprun
Researcher at Saint Petersburg State Polytechnic University
Publications - 6
Citations - 52
A. F. Suprun is an academic researcher from Saint Petersburg State Polytechnic University. The author has contributed to research in topics: Information security & Swarm intelligence. The author has an hindex of 3, co-authored 6 publications receiving 28 citations.
Papers
More filters
Journal ArticleDOI
The Problem of Innovative Development of Information Security Systems in the Transport Sector
TL;DR: The structure of the process and the model for the formation of strategy and a program of innovative development of the information security system in the transport sector are considered.
Journal ArticleDOI
Prevention of Attacks on Dynamic Routing in Self-Organizing Adhoc Networks Using Swarm Intelligence
TL;DR: The new technology develops the Watchdog method and the method of estimating the packet transfer coefficient (P-Secure) by implementing an ant swarm algorithm for constructing a secure route in the network, in which all nodes are agents for analyzing the security of neighboring nodes.
Journal ArticleDOI
Approach to the Evaluation of the Efficiency of Information Security in Control Systems
Peter D. Zegzhda,Vladimir Anisimov,P. V. Sem’yanov,A. F. Suprun,E. G. Anisimov,T. N. Saurenko,V. P. Los +6 more
TL;DR: A methodological approach to evaluate the efficiency of information security in the information-control subsystem of a complex dynamic system is proposed in this paper, where the degree of realization of possibilities of the controlled dynamic system with consideration of damage prevention expressed in the change in the control cycle duration depending on the destructive actions that damage the completeness, integrity, accuracy, reliability, accessibility, and operability of processing of the information necessary for forming management decisions.
Journal ArticleDOI
A Model of Optimal Complexification of Measures Providing Information Security
TL;DR: In this article, an optimization mathematical model and an algorithm of complexification of the measures providing information security are presented, as an indicator of complexity efficiency, the level of the costs of execution of the tasks of providing the information security of a protected object is used.
Journal ArticleDOI
Detection of anomalies in behavior of the software with usage of Markov chains
TL;DR: This paper reports about software behavior anomalies detection technique using Markov chains as model of normal software behavior as well as a new approach called Markov chain analysis.