Vestnik of Astrakhan State Technical University. Series: Management, Computer Sciences and Informatics
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive
Impact factor

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Vestnik of Astrakhan State Technical University. Series: Management, Computer Sciences and Informatics, 2014, Number 2, Pages 28–37 (Mi vagtu311)  

This article is cited in 2 scientific papers (total in 2 papers)

COMPUTER SOFTWARE AND COMPUTING EQUIPMENT

The procedure of evaluation of indicators of malicious penetration in the structure of the automated monitoring system of physical security of the protected object

S. V. Belov, A. V. Melnikov

Astrakhan State Technical University
Full-text PDF (479 kB) Citations (2)
References:
Abstract: This paper proposes to present a state of the physical security of an object in the form of an oriented weighted graph that displays the possible routes of malicious intrusion to the protected property values. On the basis of graphical representation the problems of estimating the average expected time to the nearest point of the possible penetration into the protection object and identifying the most vulnerable intruder routes to the protected values are solved. The suggested formalized methods of the analysis of the characteristics that describe the level of security allow more objectively and accurately assess the state of security at the protected facility. In particular, the algorithm of identification of the most vulnerable links and facilities that can implement effective options to improve the safety of the facility is developed. This algorithm is used as a separate unit within the automated control system security. The assessments of the moments of the most possible increase of malicious activity on the object of protection enable better protection to the object through the application of additional protective equipment at intervals of possible rise in malicious activity.
Keywords: physical security; object protection; penetration time; route penetration; automated control of the security system.
Received: 14.03.2014
Document Type: Article
UDC: 654.9:004.7.056
BBC: 32.885:32.94-5
Language: Russian
Citation: S. V. Belov, A. V. Melnikov, “The procedure of evaluation of indicators of malicious penetration in the structure of the automated monitoring system of physical security of the protected object”, Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2014, no. 2, 28–37
Citation in format AMSBIB
\Bibitem{BelMel14}
\by S.~V.~Belov, A.~V.~Melnikov
\paper The procedure of evaluation of indicators of malicious penetration in the structure of the automated monitoring system of physical security of the protected object
\jour Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics
\yr 2014
\issue 2
\pages 28--37
\mathnet{http://mi.mathnet.ru/vagtu311}
Linking options:
  • https://www.mathnet.ru/eng/vagtu311
  • https://www.mathnet.ru/eng/vagtu/y2014/i2/p28
  • This publication is cited in the following 2 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Вестник Астраханского государственного технического университета. Серия: Управление, вычислительная техника и информатика
    Statistics & downloads:
    Abstract page:125
    Full-text PDF :59
    References:29
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024