2022
DOI: 10.28925/2663-4023.2022.15.3552
|View full text |Cite
|
Sign up to set email alerts
|

Development of a Method for Calculating the Protection of Personal Data From the Centrality of the Network

Abstract: A mathematical model has been developed and a study of the model of personal data protection from network clustering coefficient and data transfer intensity in social networks has been carried out. Dependencies of protection of the system from the size of the system (and from the amount of personal data); information security threats from the network clustering factor. A system of linear equations is obtained, which consists of the equation: rate of change of information flow from social network security and c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…Since the system for protecting SM information from the parameters of a specific indicator of its CT [23] is nonlinear, systems of nonlinear differential equations have been developed to study a nonlinear system. When creating a system of nonlinear differential equations to take into account various technical, software, organizational parameters, which in many cases are poorly formalized processes that affect the protection system and do not allow adequate modeling, hard-to-predict factors and solving analysis problems, the following methods were used: principles of fuzzy sets, procedures of fuzzy logic analysis and synthesis.…”
Section: The Research Aimmentioning
confidence: 99%
“…Since the system for protecting SM information from the parameters of a specific indicator of its CT [23] is nonlinear, systems of nonlinear differential equations have been developed to study a nonlinear system. When creating a system of nonlinear differential equations to take into account various technical, software, organizational parameters, which in many cases are poorly formalized processes that affect the protection system and do not allow adequate modeling, hard-to-predict factors and solving analysis problems, the following methods were used: principles of fuzzy sets, procedures of fuzzy logic analysis and synthesis.…”
Section: The Research Aimmentioning
confidence: 99%