Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 6 publications
0
6
0
Order By: Relevance
“…Therefore, in connection with the antagonism of the goals of the subjects of the information conflict, the dominant strategy for the optimal intellectualization of the fast technological processes will be a strategy based on the minimax principle, i.e. [3] , , , min max t P…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, in connection with the antagonism of the goals of the subjects of the information conflict, the dominant strategy for the optimal intellectualization of the fast technological processes will be a strategy based on the minimax principle, i.e. [3] , , , min max t P…”
Section: Discussionmentioning
confidence: 99%
“…can be achieved by mutual integration of the intellectual resources of managers and modern capabilities of almost unlimited performance of distributed computing [3].…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…It is planned to carry out a complex of organizational changes, build new process models, attract new solutions in the field of information technology, new ways and means of informatization, as well as intellectualize the control processes of traction electric networks of railways [5]. And the implementation of monitoring and forecasting reliability, increasing work efficiency, optimizing power consumption, improving traffic safety and innovating in the creation of information protection methods in computer systems for monitoring and diagnosing electric power systems.…”
Section: Methodsmentioning
confidence: 99%
“…Stasiuk et al , who worked on an intrusion detection framework based on hybrid multi-level data mining, studied the security of personal privacy information. Intrusion detection is a new and effective method for privacy and network system security (Stasiuk et al , 2018). Berz improved the Jelonek algorithm, proposed a modified difference matrix, and then designed a new attribute reduction algorithm to improve the computational efficiency of solving the attribute subset.…”
Section: Literature Reviewmentioning
confidence: 99%