|
|
Publications in Math-Net.Ru |
Citations |
|
2024 |
1. |
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, V. O. Piskovski, E. E. Timonina, S. Ya. Shorgin, “Logic of deception in machine learning”, Inform. Primen., 18:1 (2024), 78–83 |
|
2023 |
2. |
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, D. V. Smirnov, E. E. Timonina, “Classification by cause-and-effect relationships”, Inform. Primen., 17:3 (2023), 71–75 |
3. |
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, E. E. Timonina, S. Ya. Shorgin, “Complex cause-and-effect relationships”, Inform. Primen., 17:2 (2023), 84–89 |
4. |
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, V. V. Kulchenkov, E. E. Timonina, S. Ya. Shorgin, “Causal relationships in classification problems”, Inform. Primen., 17:1 (2023), 43–49 |
5
|
5. |
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, V. O. Piskovski, D. V. Smirnov, E. E. Timonina, “Automata models of fault propagation and self-healing”, Sistemy i Sredstva Inform., 33:4 (2023), 28–37 |
6. |
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, A. A. Zatsarinny, E. E. Timonina, “Some challenges of critical infrastructure information security monitoring”, Sistemy i Sredstva Inform., 33:3 (2023), 108–116 |
7. |
A. A. Grusho, M. I. Zabezhailo, V. V. Kulchenkov, D. V. Smirnov, E. E. Timonina, S. Ya. Shorgin, “Cause-and-effect relationships in analysis of unobservable process properties”, Sistemy i Sredstva Inform., 33:2 (2023), 71–78 |
2
|
8. |
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, A. A. Zatsarinny, E. E. Timonina, S. Ya. Shorgin, “Classification problem in conditions of distorted cause-and-effect relationships”, Sistemy i Sredstva Inform., 33:1 (2023), 59–67 |
1
|
|
2022 |
9. |
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, D. V. Smirnov, E. E. Timonina, S. Ya. Shorgin, “About the secure architecture of a microservice-based computing system”, Inform. Primen., 16:4 (2022), 87–92 |
10. |
A. A. Grusho, N. A. Grusho, E. E. Timonina, “Metadata in secure electronic document management”, Inform. Primen., 16:3 (2022), 97–102 |
11. |
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, A. A. Zatsarinny, E. E. Timonina, S. Ya. Shorgin, “Cause-and-effect chain analysis”, Inform. Primen., 16:2 (2022), 68–74 |
1
|
12. |
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, D. V. Smirnov, E. E. Timonina, S. Ya. Shorgin, “Detection of distribution drift”, Sistemy i Sredstva Inform., 32:4 (2022), 14–20 |
13. |
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, D. V. Smirnov, E. E. Timonina, S. Ya. Shorgin, “Some approaches to network DLP analysis”, Sistemy i Sredstva Inform., 32:2 (2022), 72–80 |
14. |
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, D. V. Smirnov, E. E. Timonina, S. Ya. Shorgin, “Search of anomalies in big data”, Sistemy i Sredstva Inform., 32:1 (2022), 160–167 |
2
|
|
2021 |
15. |
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, D. V. Smirnov, E. E. Timonina, S. Ya. Shorgin, “Statistics and clusters for detection of anomalous insertions in Big Data environment”, Inform. Primen., 15:4 (2021), 79–86 |
4
|
16. |
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, E. E. Timonina, “Remote monitoring of workflows”, Inform. Primen., 15:3 (2021), 2–8 |
1
|
17. |
A. A. Grusho, M. I. Zabezhailo, D. V. Smirnov, E. E. Timonina, “Intelligent analysis of Big Data extendible collections under the limits of process-real time”, Inform. Primen., 15:2 (2021), 36–43 |
18. |
A. A. Grusho, D. V. Smirnov, E. E. Timonina, S. Ya. Shorgin, “Enhanced tokenization algorithm for personal data protection”, Sistemy i Sredstva Inform., 31:4 (2021), 135–143 |
1
|
19. |
A. A. Grusho, A. A. Zatsarinny, E. E. Timonina, “Secure scaling of electronic ledgers based on tangles”, Sistemy i Sredstva Inform., 31:3 (2021), 60–69 |
20. |
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, E. E. Timonina, “Hidden impact without malicious code”, Sistemy i Sredstva Inform., 31:2 (2021), 4–15 |
1
|
21. |
M. I. Zabezhailo, A. A. Grusho, N. A. Grusho, E. E. Timonina, “Support for solving diagnostic type problems”, Sistemy i Sredstva Inform., 31:1 (2021), 69–81 |
6
|
|
2020 |
22. |
A. A. Grusho, M. I. Zabezhailo, D. V. Smirnov, E. E. Timonina, “On probabilistic estimates of the validity of empirical conclusions”, Inform. Primen., 14:4 (2020), 3–8 |
1
|
23. |
A. A. Grusho, E. E. Timonina, N. A. Grusho, I. Yu. Teryokhina, “Identifying anomalies using metadata”, Inform. Primen., 14:3 (2020), 76–80 |
1
|
24. |
A. A. Grusho, M. I. Zabezhailo, D. V. Smirnov, E. E. Timonina, S. Ya. Shorgin, “Mathematical statistics in the task of identifying hostile insiders”, Inform. Primen., 14:3 (2020), 71–75 |
1
|
25. |
N. A. Grusho, A. A. Grusho, M. I. Zabezhailo, E. E. Timonina, “Methods of finding the causes of information technology failures by means of metadata”, Inform. Primen., 14:2 (2020), 33–39 |
7
|
26. |
A. A. Grusho, M. I. Zabezhailo, E. E. Timonina, “On causal representativeness of training samples of precedents in diagnostic type tasks”, Inform. Primen., 14:1 (2020), 80–86 |
7
|
27. |
A. A. Grusho, A. V. Nikolaev, V. O. Piskovski, V. V. Senchilo, E. E. Timonina, “End-to-end information security of private cloud computing”, Sistemy i Sredstva Inform., 30:4 (2020), 76–82 |
28. |
I. Yu. Teryokhina, A. A. Grusho, E. E. Timonina, S. Ya. Shorgin, “Constructing process models represented by simple Petri nets”, Sistemy i Sredstva Inform., 30:4 (2020), 61–75 |
29. |
A. A. Grusho, N. A. Grusho, V. V. Senchilo, E. E. Timonina, “Prevention of mass failure of low-security mobile systems of information support for digital economy”, Sistemy i Sredstva Inform., 30:2 (2020), 21–30 |
30. |
A. A. Grusho, A. A. Zatsarinny, E. E. Timonina, “Description of digital economy dynamics using an electronic ledger”, Sistemy i Sredstva Inform., 30:1 (2020), 108–114 |
1
|
31. |
A. A. Grusho, N. A. Grusho, A. V. Nikolaev, V. O. Piskovski, V. V. Senchilo, E. E. Timonina, “Generation of threats in heterogeneous systems of digital economy”, Sistemy i Sredstva Inform., 30:1 (2020), 46–55 |
|
2019 |
32. |
A. A. Grusho, N. A. Grusho, E. E. Timonina, “Using metadata to implement multilevel security policy requirements”, Inform. Primen., 13:4 (2019), 85–89 |
33. |
A. A. Grusho, M. I. Zabezhailo, N. A. Grusho, E. E. Timonina, “Concepts forming on the basis of small samples”, Inform. Primen., 13:4 (2019), 81–84 |
1
|
34. |
A. A. Grusho, N. A. Grusho, E. E. Timonina, “Methods of identification of “weak” signs of violations of information security”, Inform. Primen., 13:3 (2019), 3–8 |
3
|
35. |
A. A. Grusho, M. I. Zabezhailo, N. A. Grusho, E. E. Timonina, “Architectural decisions in the problem of identification of fraud in the analysis of information flows in digital economy”, Inform. Primen., 13:2 (2019), 22–28 |
36. |
A. A. Grusho, M. I. Zabezhailo, N. A. Grusho, E. E. Timonina, “Search of empirical causes of failures and errors in computer systems and networks using metadata”, Sistemy i Sredstva Inform., 29:4 (2019), 28–38 |
3
|
37. |
A. A. Grusho, A. A. Zatsarinny, E. E. Timonina, “The electronic ledger on the basis of situational centers for digital economy”, Sistemy i Sredstva Inform., 29:2 (2019), 4–11 |
3
|
38. |
A. A. Grusho, N. A. Grusho, E. E. Timonina, “Methods of protection against mass inactivation of low protected computers of digital economy”, Sistemy i Sredstva Inform., 29:1 (2019), 4–11 |
2
|
|
2018 |
39. |
A. A. Grusho, N. A. Grusho, M. V. Levykin, E. E. Timonina, “Methods of identification of host capture in a distributed information system which is protected on the basis of meta data”, Inform. Primen., 12:4 (2018), 39–43 |
3
|
40. |
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, D. V. Smirnov, E. E. Timonina, “Parametrization in applied problems of search of empirical reasons”, Inform. Primen., 12:3 (2018), 62–66 |
7
|
41. |
A. A. Grusho, E. E. Timonina, S. Ya. Shorgin, “Hierarchical method of meta data generation for control of network connections”, Inform. Primen., 12:2 (2018), 44–49 |
9
|
42. |
A. A. Grusho, M. I. Zabezhailo, A. A. Zatsarinny, E. E. Timonina, “On some possibilities of resource management for organizing active counteraction to computer attacks”, Inform. Primen., 12:1 (2018), 62–70 |
4
|
43. |
A. A. Grusho, E. E. Timonina, S. Ya. Shorgin, “Overcoming of protection of a network where connections are controlled by meta data”, Sistemy i Sredstva Inform., 28:4 (2018), 22–30 |
44. |
A. A. Grusho, M. I. Zabezhailo, N. A. Grusho, E. E. Timonina, “Information security on the basis of meta data in enterprise application integration architecture of information systems”, Sistemy i Sredstva Inform., 28:2 (2018), 34–41 |
2
|
45. |
A. A. Grusho, M. I. Zabezhailo, A. A. Zatsarinny, A. V. Nikolaev, V. O. Piskovski, V. V. Senchilo, I. V. Sudarikov, E. E. Timonina, “About the analysis of erratic statuses in the distributed computing systems”, Sistemy i Sredstva Inform., 28:1 (2018), 99–109 |
6
|
|
2017 |
46. |
A. A. Grusho, M. I. Zabezhailo, D. V. Smirnov, E. E. Timonina, “The model of the set of information spaces in the problem of insider detection”, Inform. Primen., 11:4 (2017), 65–69 |
9
|
47. |
A. A. Grusho, M. I. Zabezhailo, D. V. Smirnov, E. E. Timonina, “About complex authentication”, Sistemy i Sredstva Inform., 27:3 (2017), 4–11 |
2
|
48. |
A. A. Grusho, M. I. Zabezhailo, A. A. Zatsarinnyy, A. V. Nikolaev, V. O. Piskovski, E. E. Timonina, “Erroneous states classification in dictributed computing systems and sources of their occurence”, Sistemy i Sredstva Inform., 27:2 (2017), 29–40 |
12
|
|
2016 |
49. |
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, E. E. Timonina, “Integration of statistical and deterministic methods for analysis of information security”, Inform. Primen., 10:3 (2016), 2–8 |
2
|
50. |
A. A. Grusho, N. A. Grusho, E. E. Timonina, “Security evaluation in secure architecture of distributed information systems”, Sistemy i Sredstva Inform., 26:4 (2016), 31–37 |
2
|
51. |
A. A. Grusho, N. A. Grusho, E. E. Timonina, S. Ya. Shorgin, “Architectural vulnerabilities of distributed information systems”, Sistemy i Sredstva Inform., 26:3 (2016), 74–82 |
2
|
|
2015 |
52. |
A. A. Grusho, N. A. Grusho, E. E. Timonina, “Rate of information transfer and capacity in covert channels defined by tags”, Inform. Primen., 9:4 (2015), 85–90 |
53. |
A. A. Grusho, N. A. Grusho, E. E. Timonina, S. Ya. Shorgin, “Possibilities of secure architecture creation for dynamically changing information systems”, Sistemy i Sredstva Inform., 25:3 (2015), 78–93 |
9
|
|
2014 |
54. |
A. A. Grusho, N. A. Grusho, E. E. Timonina, “Switching on of new bans in random sequences”, Inform. Primen., 8:4 (2014), 46–52 |
1
|
55. |
A. A. Grusho, N. A. Grusho, E. E. Timonina, “The analysis of tags in covert channels”, Inform. Primen., 8:4 (2014), 41–45 |
4
|
56. |
A. A. Grusho, N. A. Grusho, E. E. Timonina, S. Ya. Shorgin, “Secure architecture of distributed systems”, Sistemy i Sredstva Inform., 24:3 (2014), 18–31 |
10
|
|
2013 |
57. |
A. A. Grusho, N. A. Grusho, E. E. Timonina, “Statistical techniques of bans determination of probability measures in discrete spaces”, Inform. Primen., 7:1 (2013), 54–57 |
5
|
58. |
A. A. Grusho, N. A. Grusho, E. E. Timonina, “Covert channels generated by tags in datagrams”, Sistemy i Sredstva Inform., 23:2 (2013), 6–21 |
2
|
59. |
A. A. Timonina, E. E. Timonina, “Attacks on the centralized systems of intrusion detection”, Sistemy i Sredstva Inform., 23:1 (2013), 33–42 |
|
2012 |
60. |
A. A. Grusho, E. E. Timonina, “Random graphs model for description of interactions in the network”, Inform. Primen., 6:4 (2012), 57–60 |
|
2011 |
61. |
A. A. Grusho, E. E. Timonina, “Prohibitions in discrete probabilistic statistical problems”, Diskr. Mat., 23:2 (2011), 53–58 ; Discrete Math. Appl., 21:3 (2011), 275–281 |
22
|
|
2010 |
62. |
A. A. Grusho, N. A. Grusho, E. E. Timonina, “Search of the conflicts in security policies: a model of random graphs”, Inform. Primen., 4:3 (2010), 38–41 |
|
2008 |
63. |
A. A. Grusho, N. A. Grusho, E. E. Timonina, “Theorems on the nonexistence of consistent sequences of criteria in some discrete problems”, Diskr. Mat., 20:2 (2008), 25–31 |
3
|
64. |
A. A. Grusho, E. E. Timonina, V. M. Chentsov, “Existence of consistent test sequences at the complex null hypotheses in discrete statistical problems”, Inform. Primen., 2:2 (2008), 64–66 |
65. |
Alexander Grusho, Nick Grusho, Elena Timonina, “Complexity and consistency of statistical criteria”, Sistemy i Sredstva Inform., 2008, no. special issue, 32–39 |
|
2007 |
66. |
A. A. Grusho, N. A. Grusho, E. E. Timonina, “About security and safety of security subsystems in distributed information systems”, Sistemy i Sredstva Inform., 2007, no. 17, 79–85 |
|
2006 |
67. |
A. A. Grusho, E. E. Timonina, “Some relations between discrete statistical problems and properties of probability measures on topological spaces”, Diskr. Mat., 18:4 (2006), 128–136 ; Discrete Math. Appl., 16:6 (2006), 547–554 |
8
|
|
2003 |
68. |
A. A. Grusho, E. E. Timonina, “Estimation of the time required to organize a secret channel”, Diskr. Mat., 15:2 (2003), 40–46 ; Discrete Math. Appl., 13:3 (2003), 257–263 |
5
|
|
1982 |
69. |
G. I. Ivchenko, E. E. Timonina, “Optimal estimation for a finite population of unknown size”, Mat. Zametki, 31:4 (1982), 633–640 ; Math. Notes, 31:4 (1982), 322–326 |
1
|
70. |
G. I. Ivčenko, E. E. Timonina, “On the estimation of the size of a finite population”, Teor. Veroyatnost. i Primenen., 27:2 (1982), 380–384 ; Theory Probab. Appl., 27:2 (1983), 403–406 |
6
|
|
1980 |
71. |
G. I. Ivchenko, E. E. Timonina, “Estimation in sampling from a finite population”, Mat. Zametki, 28:4 (1980), 623–633 ; Math. Notes, 28:4 (1980), 771–776 |
2
|
|
Organisations |
|
|
|
|