scispace - formally typeset
A

A. F. Suprun

Researcher at Saint Petersburg State Polytechnic University

Publications -  6
Citations -  52

A. F. Suprun is an academic researcher from Saint Petersburg State Polytechnic University. The author has contributed to research in topics: Information security & Swarm intelligence. The author has an hindex of 3, co-authored 6 publications receiving 28 citations.

Papers
More filters
Journal ArticleDOI

The Problem of Innovative Development of Information Security Systems in the Transport Sector

TL;DR: The structure of the process and the model for the formation of strategy and a program of innovative development of the information security system in the transport sector are considered.
Journal ArticleDOI

Prevention of Attacks on Dynamic Routing in Self-Organizing Adhoc Networks Using Swarm Intelligence

TL;DR: The new technology develops the Watchdog method and the method of estimating the packet transfer coefficient (P-Secure) by implementing an ant swarm algorithm for constructing a secure route in the network, in which all nodes are agents for analyzing the security of neighboring nodes.
Journal ArticleDOI

Approach to the Evaluation of the Efficiency of Information Security in Control Systems

TL;DR: A methodological approach to evaluate the efficiency of information security in the information-control subsystem of a complex dynamic system is proposed in this paper, where the degree of realization of possibilities of the controlled dynamic system with consideration of damage prevention expressed in the change in the control cycle duration depending on the destructive actions that damage the completeness, integrity, accuracy, reliability, accessibility, and operability of processing of the information necessary for forming management decisions.
Journal ArticleDOI

A Model of Optimal Complexification of Measures Providing Information Security

TL;DR: In this article, an optimization mathematical model and an algorithm of complexification of the measures providing information security are presented, as an indicator of complexity efficiency, the level of the costs of execution of the tasks of providing the information security of a protected object is used.
Journal ArticleDOI

Detection of anomalies in behavior of the software with usage of Markov chains

TL;DR: This paper reports about software behavior anomalies detection technique using Markov chains as model of normal software behavior as well as a new approach called Markov chain analysis.