Abstract: An optimization mathematical model and an algorithm of complexification of the measures providing information security are presented. As an indicator of complexification efficiency, the level of the costs of execution of the tasks of providing the information security of a protected object is used. Thus, the costs of the elaboration (preparation) of these measures and their implementation costs for the information security system are considered separately. The optimization algorithm is based on the common principles of the branch and bound method. Its feature is the proposed algorithm for estimating the bounds for alternative branches. The model has a universal character and may be used when developing the algorithms for supportin...
This article is directed to discuss one of the urgent information security problems in communication...
[[abstract]]We present here two algorithms that calculate the probability of threat and the optimal ...
Open Access journalChoosing an optimal investment in information security is an issue most companies...
At a descriptive level the approach to the construction of an optimal system of complex information ...
The relationship between the concepts of information and economic security in terms of their use in ...
Management is required to understand all information security risks within an organization, and to m...
Management is required to understand all information security risks within an organization, and to m...
Types and complexity of information security related vulnerabilities are growing rapidly and present...
Management is required to understand all information security risks within an organization, and to m...
Most information security algorithms cannot achieve perfect security without incurring severe operat...
In this paper, we present a new quantitative optimization model to support decision makers in determ...
As we have discussed in the problem analysis of this thesis, there are still many challenges regardi...
Information security is becoming an increasingly serious problem faced by many enterprises and organ...
An efficient IT security management relies upon the ability to make a good compromise between the co...
Abstract. The article deals with legal documents in the field of information security, methods of th...
This article is directed to discuss one of the urgent information security problems in communication...
[[abstract]]We present here two algorithms that calculate the probability of threat and the optimal ...
Open Access journalChoosing an optimal investment in information security is an issue most companies...
At a descriptive level the approach to the construction of an optimal system of complex information ...
The relationship between the concepts of information and economic security in terms of their use in ...
Management is required to understand all information security risks within an organization, and to m...
Management is required to understand all information security risks within an organization, and to m...
Types and complexity of information security related vulnerabilities are growing rapidly and present...
Management is required to understand all information security risks within an organization, and to m...
Most information security algorithms cannot achieve perfect security without incurring severe operat...
In this paper, we present a new quantitative optimization model to support decision makers in determ...
As we have discussed in the problem analysis of this thesis, there are still many challenges regardi...
Information security is becoming an increasingly serious problem faced by many enterprises and organ...
An efficient IT security management relies upon the ability to make a good compromise between the co...
Abstract. The article deals with legal documents in the field of information security, methods of th...
This article is directed to discuss one of the urgent information security problems in communication...
[[abstract]]We present here two algorithms that calculate the probability of threat and the optimal ...
Open Access journalChoosing an optimal investment in information security is an issue most companies...