Skip navigation
Please use this identifier to cite or link to this item: https://libeldoc.bsuir.by/handle/123456789/59494
Full metadata record
DC FieldValueLanguage
dc.contributor.authorNormatov, I. Kh.-
dc.contributor.authorAtazhanov, M.-
dc.contributor.authorKarimov, R.-
dc.coverage.spatialМинскen_US
dc.date.accessioned2025-04-14T07:22:09Z-
dc.date.available2025-04-14T07:22:09Z-
dc.date.issued2025-
dc.identifier.citationNormatov, I. Kh. Development of an algorithmic system for detecting and disarming threats based on functioning tables / I. Kh. Normatov, M. Atazhanov, R. Karimov // Технические средства защиты информации : материалы ХXIII Международной научно-технической конференции, Минск, 08 апреля 2025 года / Белорусский государственный университет информатики и радиоэлектроники [и др.] ; редкол.: О. В. Бойправ [и др.]. – Минск, 2025. – С. 22–26.en_US
dc.identifier.urihttps://libeldoc.bsuir.by/handle/123456789/59494-
dc.description.abstractThe article provides an analysis of known existing systems designed to collect and automatically analyze events of various information in order to identify threats. Their disadvantages are given. An algorithmic model of information security based on tables of functioning is proposed as a mathematical tool for modeling dynamic discrete systems for detecting and neutralizing threats while ensuring information protection. A method for assessing information security risks and ensuring the confidentiality of information resources is given. The features of working with data flows, management and control over them are considered, mathematical solutions for assessing the protection of information resources and various aspects of assessing the economic effectiveness of ensuring the confidentiality of information resources are presented. One of the ways of analyzing the security of the system is proposed - the construction of dynamic tables of functioning. The description of the main functions and requirements of automatic threat detection and neutralization based on the tables of operation based on the functioning tables (FT) is considered.en_US
dc.language.isoenen_US
dc.publisherБГУИРen_US
dc.subjectматериалы конференцийen_US
dc.subjectinformation systemsen_US
dc.subjectinformation securityen_US
dc.subjectcyber threatsen_US
dc.subjectalgorithmsen_US
dc.titleDevelopment of an algorithmic system for detecting and disarming threats based on functioning tablesen_US
dc.typeArticleen_US
Appears in Collections:ТСЗИ 2025

Files in This Item:
File Description SizeFormat 
Normatov_Development.pdf435.43 kBAdobe PDFView/Open
Show simple item record Google Scholar

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.