2022
DOI: 10.17762/ijcnis.v13i1.4882
|View full text |Cite
|
Sign up to set email alerts
|

Method of Determining Trust and Protection of Personal Data in Social Networks

Abstract: The analysis of parameters of social networks (information transfer to other users, traffic density, probability of network construction) is carried out.  Three variants of solving the equation near the steady state of the system are considered.  The protection of personal data increases from the growing factors of trust in information.Mathematical modeling of the dependence of personal data protection on trust is performed. The results obtained in the article showed that the protection of personal data is dir… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 19 publications
0
5
0
Order By: Relevance
“…In article [1], a nonlinear system of differential equations describing the SM protection system is developed and studied. Studies indicate that the system's security level increases with the growth of trust between actors and their reputation.…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…In article [1], a nonlinear system of differential equations describing the SM protection system is developed and studied. Studies indicate that the system's security level increases with the growth of trust between actors and their reputation.…”
Section: Literature Reviewmentioning
confidence: 99%
“…where 2 L , 3 L etc., 2 K , 3 K etc.some linear operators. Similarly, to [1,2,4], we use the method of sequential approximation and introduce nonlinear components of (3), taking into account the slight nonlinearity of the information security system:…”
Section: Research On the System Of Combating Hazardsmentioning
confidence: 99%
See 1 more Smart Citation
“…In modern technical literature, the scientific problems of enterprise information security related, in particular, to the improvement of attack graphs for monitoring cybersecurity, handling of inaccuracies, cycle processing, display of incidents, and automatic selection of protective measures were investigated in the works of O.A. Lapteva [11][12][13][14], E.M. Galakhova [15], O.V. Kapustyan [16], S.P.…”
Section: Literature Analysismentioning
confidence: 99%
“…As a criterion for quantifying the minimum marginal variance of the carrier frequency of the packet input signals of the telecommunications network, it is advisable to use the lower Cramer-Rao lower bound (Cramer-Rao lower bound), the calculation of which for the telecommunications network is given in [20]. To ensure the reliability and reliability of the input data package in high-speed control systems of telecommunications networks can be a method of improving the synchronization system of the input device of the telecommunications network, which is covered in [21,22].…”
Section: Estimation Of Influence Of Throughput Of a Control Channel A...mentioning
confidence: 99%