Application of the formal model for describing processes of adaptive information security in computer-aided systems

被引:0
|
作者
F. G. Nesteruk
L. G. Nesteruk
G. F. Nesteruk
机构
[1] St. Petersburg State University of Information Technologies,
[2] Mechanics and Optics,undefined
[3] St. Petersburg State University of Economics and Finances,undefined
[4] State Unitary Enterprise “Vektor,undefined
[5] ” Special Center of Software Systems “Spektr,undefined
[6] ”,undefined
来源
关键词
07.05.Mh; 07.05.Tp; 87.17.Aa; 87.18.Snh;
D O I
暂无
中图分类号
学科分类号
摘要
Programming of an adaptive information security system (ISS) is reduced to describing of information fields of neural networks (NN) in the form of batch neural-network programs. A similar description of data-field component makes it possible to study processes of operation and adaptation of neural-network ISS in the composition of computer-aided systems by modeling the interaction of operating data with the information field of NN.
引用
收藏
页码:491 / 501
页数:10
相关论文
共 50 条
  • [21] COMPUTER-AIDED OPTIMAL ADAPTIVE CONTROL SYSTEM FOR THERMAL PROCESSES.
    Sergeyev, A.I.
    Sil'vestrov, A.N.
    Tsyvinskiy, V.G.
    Soviet Automatic Control (English translation of Avtomatika), 1975, 8 (06): : 53 - 56
  • [22] BASIC PROBLEMS OF CONSTRUCTION OF COMPUTER-AIDED SYSTEMS OF INFORMATION FOR ADMINISTRATION
    KINZEL, E
    RZESNITZEK, F
    SCHIEFERDECKER, E
    WEBER, P
    CHEMISCHE TECHNIK, 1975, 27 (01): : 45 - 46
  • [23] Computer-aided information on automation systems in the VEB Kombinat Automatisierungsanlagenbau
    Blackert, Lothar
    Messen, steuern, regeln, 1988, 31 (06): : 273 - 277
  • [24] EVALUATION AND FEEDBACK TECHNIQUES FOR COMPUTER-AIDED INFORMATION HANDLING SYSTEMS
    CULLEY, SJ
    VOGWELL, J
    EFFECTIVE CADCAM, 1989, : 129 - 135
  • [25] Design of a computer-aided system for risk assessment on information systems
    Liao, GY
    Song, CH
    37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 157 - 162
  • [26] A Study on Construction and Security of Computer-Aided Security Schemes
    Jinno, Yasuyoshi
    Tsuchiya, Takashi
    Ohki, Tetsushi
    Takahashi, Kenta
    Ogata, Wakaha
    Nishigaki, Masakatsu
    PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), 2017, : 31 - 36
  • [27] COMPUTER-AIDED NONCONVENTIONAL MACHINING PROCESSES
    EBEID, SJ
    FOURTH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED PRODUCTION ENGINEERING, 1988, : 415 - 420
  • [28] Computer-aided earthmoving systems
    Greene, D.
    Mining Engineering, 1999, 51 (02): : 49 - 52
  • [29] COMPUTER-AIDED INTEGRATED SYSTEMS
    GIBBS, PJ
    CME-CHARTERED MECHANICAL ENGINEER, 1980, 27 (02): : 84 - &
  • [30] COMPUTER-AIDED PLANNING OF MACHINING PROCESSES
    ELHAKIM, MA
    ELAWAM, AM
    INTERNATIONAL JOURNAL OF VEHICLE DESIGN, 1985, 6 (4-5) : 519 - 524