2018 IEEE First International Conference on System Analysis &Amp; Intelligent Computing (SAIC) 2018
DOI: 10.1109/saic.2018.8516747
|View full text |Cite
|
Sign up to set email alerts
|

Application of Petri Networks for Support of Functional Stability of Information Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0
2

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(11 citation statements)
references
References 7 publications
0
9
0
2
Order By: Relevance
“…Formulation of the problem. In software systems, the term «self-healing» implies the presence of any application, service or system that can detect that it is not working properly, and without any human intervention to make the necessary changes to restore itself to normal or design condition [18,20,23]. The same actions can be performed by the system in case of probable failure of its structural elements [5,19,26].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Formulation of the problem. In software systems, the term «self-healing» implies the presence of any application, service or system that can detect that it is not working properly, and without any human intervention to make the necessary changes to restore itself to normal or design condition [18,20,23]. The same actions can be performed by the system in case of probable failure of its structural elements [5,19,26].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Thus, a channel is called hidden if it was not specifically designed and was not originally designed to transmit information in an electronic data processing system, such channels include digital steganography algorithms in spatial and frequency domains based on the impossibility ("weakness" of perception of information as visual system and the human auditory system). Such a container can be images (images, videos), audio and text files [11][12][13][14].. Crypto-infrastructure with a loophole (Backdoor, Trapdoor) is an algorithm that contains some hidden structure (loophole) that ensures the existence of a hidden channel of information transmission; knowledge of this structure allows you to get secret information (for example, about the secret key). Without knowledge of the loophole, the algorithm seems reliable.…”
Section: Literature Analysis and Problem Statementmentioning
confidence: 99%
“…The need for effective intelligence and combat operations in the East of Ukraine contributes to the active introduction of advanced technologies in the development of aviation [1][2][3]. The level of flight safety and the ability to perform a set task are determined by many characteristics [4][5][6][7]. The wide variety of situations that arise in thecourse of control procedure, and the need for prompt adoption of decisions compliant with various quality requirements, necessitate the comprehensive use of a rich armory of mathematical models and methods [8][9][10][11].…”
Section: Introductionmentioning
confidence: 99%