Please use this identifier to cite or link to this item:
https://dspace.ncfu.ru/handle/20.500.12258/25203Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Mandritsa, I. V. | - |
| dc.contributor.author | Мандрица, И. В. | - |
| dc.contributor.author | Petrenko, V. I. | - |
| dc.contributor.author | Петренко, В. И. | - |
| dc.contributor.author | Minkina, T. V. | - |
| dc.contributor.author | Минкина, Т. В. | - |
| dc.date.accessioned | 2023-09-07T11:44:59Z | - |
| dc.date.available | 2023-09-07T11:44:59Z | - |
| dc.date.issued | 2023 | - |
| dc.identifier.citation | Mandritsa, I.V., Petrenko, V.I., Mandritsa, O.V., Minkina, T.V. Mathematical Concept of a Model for Processing Metadata of Employee’s Psycho-States for Identifying Him as an Internal Violator (Insider) // Lecture Notes in Networks and Systems. - 2023. - 702 LNNS, pp. 189-204. - DOI: 10.1007/978-3-031-34127-4_19 | ru |
| dc.identifier.uri | http://hdl.handle.net/20.500.12258/25203 | - |
| dc.description.abstract | The identification of an internal violator is becoming more and more relevant with the development of information processing technologies, the security of technical and software complexes in information systems is increasing, and the person remains the most vulnerable place. An employee who processes information and has full access to it becomes the target of an attacker, as well as he himself may be an intruder and become a source of leakage of confidential information. The analysis of data about the employee allows us to make assumptions about his emotional state, willingness to honestly do the job. The collected data requires analysis according to their type, and this is what the work is dedicated to. Data from video surveillance cameras is analyzed to identify the time of the employee's appearance and his location during working hours. The metadata obtained is intended to create a model of an internal violator, followed by an assessment of the threat level emanating from the employee. | ru |
| dc.language.iso | en | ru |
| dc.relation.ispartofseries | Lecture Notes in Networks and Systems | - |
| dc.subject | Internal intruder | ru |
| dc.subject | Probability of state | ru |
| dc.subject | Mathematical model | ru |
| dc.subject | Metadata collection | ru |
| dc.title | Mathematical Concept of a Model for Processing Metadata of Employee’s Psycho-States for Identifying Him as an Internal Violator (Insider) | ru |
| dc.type | Статья | ru |
| vkr.inst | Институт цифрового развития | ru |
| Appears in Collections: | Статьи, проиндексированные в SCOPUS, WOS | |
Files in This Item:
| File | Size | Format | |
|---|---|---|---|
| scopusresults 2696 .pdf Restricted Access | 132.36 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.