Influence and betweenness in flow models of complex network systems

O Polishchuk - Data-Centric Business and Applications: ICT Systems …, 2021 - Springer
This paper provides the analysis for functional approaches of complex network systems
research. In order to study the behavior of these systems the flow adjacency matrices were …

Vulnerability of complex network structures and systems

OD Polishchuk - Cybernetics and Systems Analysis, 2020 - Springer
Structural and functional approaches to the determination of vulnerability of complex
network structures and systems to negative internal and external influences are considered …

Systems of Information Security Indicators for Industrial Enterprises

RR Fatkieva - Automatic Documentation and Mathematical …, 2019 - Springer
This article analyzes the performance features of network operation in enterprises. A
multilevel model of a network interaction structure and a system of information security …

Flow Characteristics and Cores of Complex Network and Multiplex Type Systems

O Polishchuk - arXiv preprint arXiv:1702.02730, 2017 - arxiv.org
Subject of research is complex networks and network systems. The network system is
defined as a complex network in which flows are moved. Classification of flows in the …

Information technologies for analysis and modeling of computer network's development

N Ivanushchak, N Kunanets, V Pasichnyk - Data-Centric Business and …, 2021 - Springer
One of the key problems to provide the secure management of complex computer networks
is testing, which requires a functional depiction of such systems by a corresponding …

[PDF][PDF] Research of distribution of information flows in a network

RL Politanskyi, OL Zarytska, MV Vistak… - Mathematical …, 2021 - jnas.nbuv.gov.ua
The algorithm for determining information flows in the network is developed and studied,
taking into account restrictions on the input and output flows values in each node of the …

Application of intelligent methods of information representation to manage information security risks in secure multiservice special-purpose networks

SA Ageev - Informatics and Automation, 2015 - mathnet.ru
The article considers main methods to use intelligent techniques and algorithms,
synthesized on their basis, as well as examinesdata presentation of network monitoring for …

Cybersecurity graph model of information resources

AV Nesterenko, IE Netesin - Journal of automation and …, 2020 - dl.begellhouse.com
With the growing activity of cyberattacks on automated information systems, the task of
determining the priority of building protective equipment is becoming increasingly relevant …

Mathematical model to describe the inter-structural relationship between different systems

AA Sorokin, VN Dmitriev… - 2015 International Siberian …, 2015 - ieeexplore.ieee.org
The authors propose a topological model based on graph theory and focused on studying
infocommunication systems. A distinguishing feature of the model is that it suggests using …

Principles of implementation and estimation of influence factors in network centric systems

EA Trahtengerts, AF Pashchenko - 2017 IEEE 11th …, 2017 - ieeexplore.ieee.org
Rapid development of technical means and information technologies has created a new
control concept-network centric. It arose in the military environment, but quickly captured …