A. F. Suprun, A. Yu. Garkushev, A. V. Vyvolokina, S. I. Fokina
{"title":"指标函数在有害信息对象检测与中和模型中的应用","authors":"A. F. Suprun, A. Yu. Garkushev, A. V. Vyvolokina, S. I. Fokina","doi":"10.3103/S0146411624700883","DOIUrl":null,"url":null,"abstract":"<p>This article proposes a new approach to the application of the well-known indicator function method, which is used to simulate the detection and neutralization of suspicious information objects in the information environment of an industrial enterprise, as well as to simulate a security system during operation. Formula dependencies are given for calculating stochastic indicators, allowing us to obtain some objective estimates of the values of time parameters and their influence on the safe functioning of information systems.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1242 - 1249"},"PeriodicalIF":0.6000,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Application of Indicator Functions in Models of Detection and Neutralization of Harmful Information Objects\",\"authors\":\"A. F. Suprun, A. Yu. Garkushev, A. V. Vyvolokina, S. I. Fokina\",\"doi\":\"10.3103/S0146411624700883\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>This article proposes a new approach to the application of the well-known indicator function method, which is used to simulate the detection and neutralization of suspicious information objects in the information environment of an industrial enterprise, as well as to simulate a security system during operation. Formula dependencies are given for calculating stochastic indicators, allowing us to obtain some objective estimates of the values of time parameters and their influence on the safe functioning of information systems.</p>\",\"PeriodicalId\":46238,\"journal\":{\"name\":\"AUTOMATIC CONTROL AND COMPUTER SCIENCES\",\"volume\":\"58 8\",\"pages\":\"1242 - 1249\"},\"PeriodicalIF\":0.6000,\"publicationDate\":\"2025-03-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"AUTOMATIC CONTROL AND COMPUTER SCIENCES\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://link.springer.com/article/10.3103/S0146411624700883\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","FirstCategoryId":"1085","ListUrlMain":"https://link.springer.com/article/10.3103/S0146411624700883","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
Application of Indicator Functions in Models of Detection and Neutralization of Harmful Information Objects
This article proposes a new approach to the application of the well-known indicator function method, which is used to simulate the detection and neutralization of suspicious information objects in the information environment of an industrial enterprise, as well as to simulate a security system during operation. Formula dependencies are given for calculating stochastic indicators, allowing us to obtain some objective estimates of the values of time parameters and their influence on the safe functioning of information systems.
期刊介绍:
Automatic Control and Computer Sciences is a peer reviewed journal that publishes articles on• Control systems, cyber-physical system, real-time systems, robotics, smart sensors, embedded intelligence • Network information technologies, information security, statistical methods of data processing, distributed artificial intelligence, complex systems modeling, knowledge representation, processing and management • Signal and image processing, machine learning, machine perception, computer vision