2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T) 2019
DOI: 10.1109/picst47496.2019.9061383
|View full text |Cite
|
Sign up to set email alerts
|

Modeling Cyber Security of Information Systems Smart City Based on the Theory of Games and Markov Processes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 15 publications
0
1
0
Order By: Relevance
“…Conceptually, there has been implemented the DTSS module, which allows, based on available data on the distributed computational networks architecture and information protection system cyber safety aggregate, automatically fulfill selecting the optimal variant of locating available facilities. At the research's present stage there is a possibility to select from three algorithms: 1) modified genetic [12] (GMA); 2) based on the method of branches and boundaries [13] and 3) «greedy» (taking locally optimal decision at every stage of selecting the information protection system for distributed computational networks, based on the assumption, that final decision is, as well, optimal [13]).…”
Section: Design and Approbation Of Decision Taking Support System Mod...mentioning
confidence: 99%
“…Conceptually, there has been implemented the DTSS module, which allows, based on available data on the distributed computational networks architecture and information protection system cyber safety aggregate, automatically fulfill selecting the optimal variant of locating available facilities. At the research's present stage there is a possibility to select from three algorithms: 1) modified genetic [12] (GMA); 2) based on the method of branches and boundaries [13] and 3) «greedy» (taking locally optimal decision at every stage of selecting the information protection system for distributed computational networks, based on the assumption, that final decision is, as well, optimal [13]).…”
Section: Design and Approbation Of Decision Taking Support System Mod...mentioning
confidence: 99%